Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 01期
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [11] Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization
    Khelifi, Fouad
    Jiang, Jianmin
    IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (01) : 43 - 46
  • [12] Security Analysis of a NTRU-based Mutual Authentication Scheme
    Tso, Raylin
    Jheng, Yi-Shio
    2016 18TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2016,
  • [13] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [14] A novel security scheme for behavioral authentication systems based on keystroke dynamics
    Salem, Asma
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2019, 2 (02):
  • [15] Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
    Hussain, Sajid
    Chaudhry, Shehzad Ashraf
    Alomari, Osama Ahmad
    Alsharif, Mohammed H.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4431 - 4438
  • [16] A security authentication method based on trust evaluation in VANETs
    Zhou, Ao
    Li, Jinglin
    Sun, Qibo
    Fan, Cunqun
    Lei, Tao
    Yang, Fangchun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015, : 1 - 8
  • [17] An ID-based authentication scheme to achieve the security of smart card
    Xu N.
    Huang H.
    Li Z.
    Wang Y.
    Sha C.
    International Journal of Security and Networks, 2018, 13 (01) : 42 - 50
  • [18] A security authentication method based on trust evaluation in VANETs
    Ao Zhou
    Jinglin Li
    Qibo Sun
    Cunqun Fan
    Tao Lei
    Fangchun Yang
    EURASIP Journal on Wireless Communications and Networking, 2015
  • [19] Security authentication scheme based on chebyshev chaotic mapping for library network
    Xiao, Wei
    Liu, Baisong
    Yin, Wenting
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 109 : 262 - 269
  • [20] Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security
    Dai, Wanying
    Li, Beibei
    Du, Qingyun
    Zhu, Ziqing
    Liu, Ao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8982 - 8997