Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 01期
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [31] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Mariem Bouchaala
    Cherif Ghazel
    Leila Azouz Saidane
    The Journal of Supercomputing, 2022, 78 : 497 - 522
  • [32] ISDA-BAN: interoperability and security based data authentication scheme for body area network
    Faisal Kiyani
    Kashif Naseer Qureshi
    Kayhan Zrar Ghafoor
    Gwanggil Jeon
    Cluster Computing, 2023, 26 : 2429 - 2442
  • [33] Security of Shen et al.'s timestamp-based password authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
  • [34] A High-security-level Iris Cryptosystem Based on Fuzzy Commitment and Soft Reliability Extraction
    Lin, Kuo-Chun
    Chen, Yen-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1770 - 1784
  • [35] A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
    Nghiem, Thao P.
    Cho, Tae Ho
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (05) : 441 - 450
  • [36] Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments
    Pan, Jeng-Shyang
    Tso, Raylin
    Wu, Mu-En
    Chen, Chien-Ming
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 59 - 69
  • [37] A CAC Scheme based on Fuzzy Logic for Cellular Networks Considering Security and Priority Parameters
    Inaba, Takaaki
    Sakamoto, Shinji
    Kolici, Vladi
    Mino, Gjergji
    Barolli, Leonard
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 340 - 346
  • [38] Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function
    Kim, Youngil
    Choi, Younsung
    Won, Dongho
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [39] An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs
    Wang, Liangliang
    Xu, Jiangwei
    Qin, Baodong
    Wen, Mi
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 292 - 307
  • [40] BAKA: Biometric Authentication and Key Agreement Scheme Based on Fuzzy Extractor for Wireless Body Area Networks
    Zhang, Shiwen
    Yan, Ziwei
    Liang, Wei
    Li, Kuan-Ching
    Dobre, Ciprian
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5118 - 5128