Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 01期
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [21] An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
    Youn, Taek-Young
    Lee, Changhoon
    Park, Young-Ho
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 353 - 357
  • [22] A remote password authentication scheme based on the digital signature method
    Hwang, MS
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 70 (04) : 657 - 666
  • [23] A Fuzzy-based CAC Scheme for Cellular Networks Considering Security
    Kolici, Vladi
    Inaba, Takaaki
    Lala, Algenti
    Mino, Gjergji
    Sakamoto, Shinji
    Barolli, Leonard
    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 368 - 373
  • [24] Security enhancement for the timestamp-based password authentication scheme using smart cards
    Shen, JJ
    Lin, CW
    Hwang, MS
    COMPUTERS & SECURITY, 2003, 22 (07) : 591 - 595
  • [25] ROI-Fuzzy Based Medical Data Authentication Scheme for Smart Healthcare System
    Singh, Kamred Udham
    Kumar, Lalan
    Bhatia, Surbhi
    Kumar, Ankit
    Almutairi, Alhanof Khalid
    Shah, Mohd Asif
    IEEE ACCESS, 2022, 10 : 132121 - 132131
  • [26] Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things
    Zhang, Qingyang
    Zhou, Xiaolong
    Zhong, Hong
    Cui, Jie
    Li, Jiaxin
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7895 - 7907
  • [27] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01) : 497 - 522
  • [28] Security enhancement for the fingerprint-based remote user authentication scheme using smart cards
    Tang, YL
    Lin, CW
    Hwang, MS
    CCCT 2003, VOL 1, PROCEEDINGS: COMPUTING/INFORMATION SYSTEMS AND TECHNOLOGIES, 2003, : 104 - 107
  • [29] ISDA-BAN: interoperability and security based data authentication scheme for body area network
    Kiyani, Faisal
    Qureshi, Kashif Naseer
    Ghafoor, Kayhan Zrar
    Jeon, Gwanggil
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (04): : 2429 - 2442
  • [30] CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs
    Moni, Shafika Showkat
    Manivannan, D.
    INTERNET OF THINGS, 2022, 20