Abstract
With the increasing popularity of biometric identity authentication in important key authentication applications, biometric key generation technology has attracted more and more attention. How to extract secure, stable and high-strength keys from biometrics has become a key research direction of biometric key generation technology. However, the proposed biometric key generation technology can not meet the security requirements as a key, that is, the key is easy to be cracked, resulting in unpredictable consequences. This paper presents a framework of voiceprint key generation based on deep neural network, which is mainly composed of voiceprint feature extraction model and fuzzy extraction model. The voiceprint feature extraction model is based on the deep neural network, and the sigmoid layer is added at the end of the neural network. This operation makes the features extracted by the neural network have high accuracy and low error recognition rate after binary quantization. The voiceprint database used in this paper is aishell-wakeup-1 wakeup word database. The voiceprint key generation model proposed in this paper generates the key on the voiceprint database with the generation intensity of more than 1000bit, the accuracy rate of more than 93%, and the error recognition rate of less than 0.001%. These data can prove that the voiceprint key generation model proposed in this paper can meet the needs of users for generation strength and security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhu, H.H., He, Q.H., Li, Y.X.: A two-step hybrid approach for voiceprint-biometric template protection. In: 2012 International Conference on Machine Learning and Cybernetics, vol. 2, pp. 560–565. IEEE (2012)
Wang, S., Hu, J.: Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn. 47(3), 1321–1329 (2014)
Wu, Z., Tian, L., Li, P., et al.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433, 431–447 (2018)
Wu, Z., Lv, Z., Kang, J., et al.: Fingerprint bio-key generation based on a deep neural network. Int. J. Intell. Syst. 37(7), 4329–4358 (2021)
Kaur, M.: Multimodal based fuzzy vault using iris retina and fingervein. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–5. IEEE (2013)
Leng, L., Teoh, A.B.J.: Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48(7), 2290–2303 (2015)
Sandhya, M., Prasad, M.V.N.K.: k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection. In: 2015 International Conference on Biometrics (ICB), pp. 386–393. IEEE (2015)
Moi, S.H., Yong, P.Y.: A modified reed Solomon error correction codes for multimodal biometrics recognition. In: 2017 3rd International Conference on Control, Automation and Robotics (ICCAR), pp. 418–422. IEEE (2017)
Wu, Z., Yang, J., Zhang, J., et al.: Multibiometric fusion authentication in wireless multimedia environment using dynamic Bayesian method. Secur. Commun. Netw. 2018, 1–12 (2018)
Gupta, K., Walia, G.S., Sharma, K.: Novel approach for multimodal feature fusion to generate cancelable biometric. Visual Comput. 37(6), 1401–1413 (2021)
Choudhury, S.H., Kumar, A., Laskar, S.H.: Biometric authentication through unification of finger dorsal biometric traits. Inf. Sci. 497, 202–218 (2019)
Roy, N.D., Biswas, A.: Fast and robust retinal biometric key generation using deep neural nets. Multimedia Tools Appl. 79(9), 6823–6843 (2020)
Wang, R., Han, C., Wu, Y., et al.: Fingerprint classification based on depth neural network. arXiv preprint arXiv:1409.5188 (2014)
Wu, Z., Wang, Y., Zhang, J.: Fouling and damaged fingerprint recognition based on deep learning. J. Electron. Inf. Technol. 39(7), 1585–1591 (2017)
Variani, E., Lei, X., McDermott, E., et al.: Deep neural networks for small footprint text-dependent speaker verification. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4052–4056. IEEE (2014)
Boles, A., Rad, P.: Voice biometrics: deep learning-based voiceprint authentication system. In: 2017 12th System of Systems Engineering Conference (SoSE), pp. 1–6. IEEE (2017)
Sun, C., Yang, Y., Wen, C., et al.: Voiceprint identification for limited dataset using the deep migration hybrid model based on transfer learning. Sensors 18(7), 2399 (2018)
Gulati, A., Qin, J., Chiu, C.C., et al.: Conformer: convolution-augmented transformer for speech recognition. arXiv preprint arXiv:2005.08100 (2020)
Sheng, W., Chen, S., Xiao, G., et al.: A biometric key generation method based on semisupervised data clustering. IEEE Trans. Syst. Man Cybern. Syst. 45(9), 1205–1217 (2015)
Wang, Y., Li, B., Zhang, Y., et al.: A secure biometric key generation mechanism via deep learning and its application. Appl. Sci. 11(18), 8497 (2021)
Wang, P., You, L., Hu, G., et al.: Biometric key generation based on generated intervals and two-layer error correcting technique. Pattern Recogn. 111, 107733 (2021)
Ibrahim, A.J., Jauro, U.A.: Bio-metric encryption of data using voice recognition. Autom. Control Intell. Syst. 9(3), 89 (2021)
Deng, J., Guo, J., Xue, N., et al.: Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690–4699 (2019)
Qin, X., Bu, H., Li, M.: HI-MIA: a far-field text-dependent speaker verification database and the baselines. In: 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2020, pp. 7609–7613. IEEE (2020)
Desplanques, B., Thienpondt, J., Demuynck, K.: ECAPA-TDNN: emphasized channel attention, propagation and aggregation in TDNN based speaker verification. arXiv preprint arXiv:2005.07143 (2020)
Zhang, Q., Wang, X., Yuan, J., et al.: A hierarchical group key agreement protocol using orientable attributes for cloud computing. Inf. Sci. 480, 55–69 (2019)
Zhang, Q., Gan, Y., Liu, L., et al.: An authenticated asymmetric group key agreement based on attribute encryption. J. Netw. Comput. Appl. 123, 1–10 (2018)
Panchal, G., Samanta, D., Das, A.K., et al.: Designing secure and efficient biometric-based secure access mechanism for cloud services. IEEE Trans. Cloud Comput. 10, 749–761 (2020)
Zhang, J., Bai, W., Wang, X.: Identity-based data storage scheme with anonymous key generation in fog computing. Soft. Comput. 24(8), 5561–5571 (2020)
Tian, H., Nan, F., Jiang, H., et al.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107–125 (2019)
Sammoud, A., Chalouf, M.A., Hamdi, O., et al.: A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis. Comput. Secur. 96, 101838 (2020)
Mahendran, R.K., Velusamy, P.: A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Comput. Commun. 153, 545–552 (2020)
Hong, S., Zeng, Y.: A health assessment framework of lithium-ion batteries for cyber defense. Appl. Soft Comput. 101, 107067 (2021)
Ren, L., Zhao, L., Hong, S., et al.: Remaining useful life prediction for lithium-ion battery: a deep learning approach. IEEE Access 6, 50587–50598 (2018)
Chung, J.S., Huh, J., Mun, S., et al.: In defence of metric learning for speaker recognition. arXiv preprint arXiv:2003.11982 (2020)
Acknowledgements
This research is supported by Key Projects of NSFC Joint Fund of China (No. U1866209), National Natural Science Foundation of China (No. 61772162), National Key R &D Program of China (No. 2018YFB0804102).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Lv, Z., Wu, Z., Chen, J. (2023). Short Speech Key Generation Technology Based on Deep Learning. In: Xu, Y., Yan, H., Teng, H., Cai, J., Li, J. (eds) Machine Learning for Cyber Security. ML4CS 2022. Lecture Notes in Computer Science, vol 13656. Springer, Cham. https://doi.org/10.1007/978-3-031-20099-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-031-20099-1_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20098-4
Online ISBN: 978-3-031-20099-1
eBook Packages: Computer ScienceComputer Science (R0)