Skip to main content

Short Speech Key Generation Technology Based on Deep Learning

  • Conference paper
  • First Online:
  • 798 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13656))

Abstract

With the increasing popularity of biometric identity authentication in important key authentication applications, biometric key generation technology has attracted more and more attention. How to extract secure, stable and high-strength keys from biometrics has become a key research direction of biometric key generation technology. However, the proposed biometric key generation technology can not meet the security requirements as a key, that is, the key is easy to be cracked, resulting in unpredictable consequences. This paper presents a framework of voiceprint key generation based on deep neural network, which is mainly composed of voiceprint feature extraction model and fuzzy extraction model. The voiceprint feature extraction model is based on the deep neural network, and the sigmoid layer is added at the end of the neural network. This operation makes the features extracted by the neural network have high accuracy and low error recognition rate after binary quantization. The voiceprint database used in this paper is aishell-wakeup-1 wakeup word database. The voiceprint key generation model proposed in this paper generates the key on the voiceprint database with the generation intensity of more than 1000bit, the accuracy rate of more than 93%, and the error recognition rate of less than 0.001%. These data can prove that the voiceprint key generation model proposed in this paper can meet the needs of users for generation strength and security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhu, H.H., He, Q.H., Li, Y.X.: A two-step hybrid approach for voiceprint-biometric template protection. In: 2012 International Conference on Machine Learning and Cybernetics, vol. 2, pp. 560–565. IEEE (2012)

    Google Scholar 

  2. Wang, S., Hu, J.: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn. 47(3), 1321–1329 (2014)

    Article  Google Scholar 

  3. Wu, Z., Tian, L., Li, P., et al.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433, 431–447 (2018)

    Article  Google Scholar 

  4. Wu, Z., Lv, Z., Kang, J., et al.: Fingerprint bio-key generation based on a deep neural network. Int. J. Intell. Syst. 37(7), 4329–4358 (2021)

    Article  Google Scholar 

  5. Kaur, M.: Multimodal based fuzzy vault using iris retina and fingervein. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–5. IEEE (2013)

    Google Scholar 

  6. Leng, L., Teoh, A.B.J.: Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48(7), 2290–2303 (2015)

    Article  Google Scholar 

  7. Sandhya, M., Prasad, M.V.N.K.: k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection. In: 2015 International Conference on Biometrics (ICB), pp. 386–393. IEEE (2015)

    Google Scholar 

  8. Moi, S.H., Yong, P.Y.: A modified reed Solomon error correction codes for multimodal biometrics recognition. In: 2017 3rd International Conference on Control, Automation and Robotics (ICCAR), pp. 418–422. IEEE (2017)

    Google Scholar 

  9. Wu, Z., Yang, J., Zhang, J., et al.: Multibiometric fusion authentication in wireless multimedia environment using dynamic Bayesian method. Secur. Commun. Netw. 2018, 1–12 (2018)

    Google Scholar 

  10. Gupta, K., Walia, G.S., Sharma, K.: Novel approach for multimodal feature fusion to generate cancelable biometric. Visual Comput. 37(6), 1401–1413 (2021)

    Article  Google Scholar 

  11. Choudhury, S.H., Kumar, A., Laskar, S.H.: Biometric authentication through unification of finger dorsal biometric traits. Inf. Sci. 497, 202–218 (2019)

    Article  Google Scholar 

  12. Roy, N.D., Biswas, A.: Fast and robust retinal biometric key generation using deep neural nets. Multimedia Tools Appl. 79(9), 6823–6843 (2020)

    Article  Google Scholar 

  13. Wang, R., Han, C., Wu, Y., et al.: Fingerprint classification based on depth neural network. arXiv preprint arXiv:1409.5188 (2014)

  14. Wu, Z., Wang, Y., Zhang, J.: Fouling and damaged fingerprint recognition based on deep learning. J. Electron. Inf. Technol. 39(7), 1585–1591 (2017)

    Google Scholar 

  15. Variani, E., Lei, X., McDermott, E., et al.: Deep neural networks for small footprint text-dependent speaker verification. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4052–4056. IEEE (2014)

    Google Scholar 

  16. Boles, A., Rad, P.: Voice biometrics: deep learning-based voiceprint authentication system. In: 2017 12th System of Systems Engineering Conference (SoSE), pp. 1–6. IEEE (2017)

    Google Scholar 

  17. Sun, C., Yang, Y., Wen, C., et al.: Voiceprint identification for limited dataset using the deep migration hybrid model based on transfer learning. Sensors 18(7), 2399 (2018)

    Article  Google Scholar 

  18. Gulati, A., Qin, J., Chiu, C.C., et al.: Conformer: convolution-augmented transformer for speech recognition. arXiv preprint arXiv:2005.08100 (2020)

  19. Sheng, W., Chen, S., Xiao, G., et al.: A biometric key generation method based on semisupervised data clustering. IEEE Trans. Syst. Man Cybern. Syst. 45(9), 1205–1217 (2015)

    Article  Google Scholar 

  20. Wang, Y., Li, B., Zhang, Y., et al.: A secure biometric key generation mechanism via deep learning and its application. Appl. Sci. 11(18), 8497 (2021)

    Article  Google Scholar 

  21. Wang, P., You, L., Hu, G., et al.: Biometric key generation based on generated intervals and two-layer error correcting technique. Pattern Recogn. 111, 107733 (2021)

    Article  Google Scholar 

  22. Ibrahim, A.J., Jauro, U.A.: Bio-metric encryption of data using voice recognition. Autom. Control Intell. Syst. 9(3), 89 (2021)

    Google Scholar 

  23. Deng, J., Guo, J., Xue, N., et al.: Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690–4699 (2019)

    Google Scholar 

  24. Qin, X., Bu, H., Li, M.: HI-MIA: a far-field text-dependent speaker verification database and the baselines. In: 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2020, pp. 7609–7613. IEEE (2020)

    Google Scholar 

  25. Desplanques, B., Thienpondt, J., Demuynck, K.: ECAPA-TDNN: emphasized channel attention, propagation and aggregation in TDNN based speaker verification. arXiv preprint arXiv:2005.07143 (2020)

  26. Zhang, Q., Wang, X., Yuan, J., et al.: A hierarchical group key agreement protocol using orientable attributes for cloud computing. Inf. Sci. 480, 55–69 (2019)

    Article  MATH  Google Scholar 

  27. Zhang, Q., Gan, Y., Liu, L., et al.: An authenticated asymmetric group key agreement based on attribute encryption. J. Netw. Comput. Appl. 123, 1–10 (2018)

    Article  Google Scholar 

  28. Panchal, G., Samanta, D., Das, A.K., et al.: Designing secure and efficient biometric-based secure access mechanism for cloud services. IEEE Trans. Cloud Comput. 10, 749–761 (2020)

    Article  Google Scholar 

  29. Zhang, J., Bai, W., Wang, X.: Identity-based data storage scheme with anonymous key generation in fog computing. Soft. Comput. 24(8), 5561–5571 (2020)

    Article  MATH  Google Scholar 

  30. Tian, H., Nan, F., Jiang, H., et al.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107–125 (2019)

    Article  Google Scholar 

  31. Sammoud, A., Chalouf, M.A., Hamdi, O., et al.: A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis. Comput. Secur. 96, 101838 (2020)

    Article  Google Scholar 

  32. Mahendran, R.K., Velusamy, P.: A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Comput. Commun. 153, 545–552 (2020)

    Article  Google Scholar 

  33. Hong, S., Zeng, Y.: A health assessment framework of lithium-ion batteries for cyber defense. Appl. Soft Comput. 101, 107067 (2021)

    Article  Google Scholar 

  34. Ren, L., Zhao, L., Hong, S., et al.: Remaining useful life prediction for lithium-ion battery: a deep learning approach. IEEE Access 6, 50587–50598 (2018)

    Article  Google Scholar 

  35. Chung, J.S., Huh, J., Mun, S., et al.: In defence of metric learning for speaker recognition. arXiv preprint arXiv:2003.11982 (2020)

Download references

Acknowledgements

This research is supported by Key Projects of NSFC Joint Fund of China (No. U1866209), National Natural Science Foundation of China (No. 61772162), National Key R &D Program of China (No. 2018YFB0804102).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhendong Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lv, Z., Wu, Z., Chen, J. (2023). Short Speech Key Generation Technology Based on Deep Learning. In: Xu, Y., Yan, H., Teng, H., Cai, J., Li, J. (eds) Machine Learning for Cyber Security. ML4CS 2022. Lecture Notes in Computer Science, vol 13656. Springer, Cham. https://doi.org/10.1007/978-3-031-20099-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20099-1_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20098-4

  • Online ISBN: 978-3-031-20099-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics