Skip to main content

Privacy Protection of Digital Speech Based on Homomorphic Encryption

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

  • 1444 Accesses

Abstract

This paper presents a digital speech encryption scheme based on homomorphic encryption, which uses a symmetrical key cryptosystem (MORE-method) with probabilistic statistics and fully homomorphic properties to encrypt speech signals. In the proposed scheme, each sample of speech signal is firstly multiplied one weight, and then encrypted, the normalization is exploited to make the data expend lossy compression. Finally, a recombination method of the cipher-text is proposed to obtain the corresponding speech cipher-text with good performances. Experimental results show that the proposed scheme is homomorphism, which has strong diffusibility and a large key-space. What’s more, it is robustness to statistical analysis attacks, decreased the residual intelligibility as small as possible. Moreover, the encrypted speech can be decrypted completely. Compared with two dimensional chaotic and Paillier cryptosystem, the proposed scheme is more security and lower complexity, so the proposed scheme especially meets the sensitive speech security in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  2. Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98-D(4), 902–910 (2015)

    Article  Google Scholar 

  3. Kanhe, A., Aghila, G., Kiran, C.Y.S., Ramesh, C.H., Jadav, G., Gowtham Raj, M.: Robust audio steganography based on advanced encryption standards in temporal domain. In: IEEE ICACCI 2015, pp. 1449–1453 (2015)

    Google Scholar 

  4. Eldin, S.M.S., Khamis, S.A., Hassanin, A.A.I.M., Alsharqawy, M.A.: New audio encryption package for TV cloud computing. Int. J. Speech Technol. 18(1), 131–142 (2015)

    Article  Google Scholar 

  5. Mostafa, A., Soliman, N.F., Abdalluh, M., EI-samie, F.E.A.: Speech encryption using two dimensional chaotic maps. In: IEEE ICENCO 2015, pp. 235–240 (2015)

    Google Scholar 

  6. Zeng, L., Zhang, X., Chen, L., Fan, Z., Wang, Y.: Scrambling-based speech encryption via compressed sensing. EURASIP J. Adv. Signal Process. http://asp.eurasipjournals.com/content/2012/1/257

  7. Wang, H., Zhou, L., Zhang, W., Liu, S.: Watermarking-based perceptual hashing search over encrypted speech. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 423–434. Springer, Heidelberg (2014). doi:10.1007/978-3-662-43886-2_30

    Google Scholar 

  8. García-Martínez, M., Ontañón-García, L.J., Campos-Cantón, E., Celikovský, S.: Hyperchaotic encryption based on multi-scroll piecewise linear systems. Appl. Math. Comput. 270, 413–424 (2015)

    MathSciNet  Google Scholar 

  9. Shortell, T., Shokoufandeh, A.: Secure signal processing using fully homomorphic encryption. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2015. LNCS, vol. 9386, pp. 93–104. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25903-1_9

    Chapter  Google Scholar 

  10. Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. PP, 1 (2015)

    Article  Google Scholar 

  11. Yang, P., Gui, X., An, J., Tian, F., Wang, J.: An encrypted image editing scheme based on homomorphic encryption. In: IEEE INFOCOM Workshops, pp. 109–110 (2015)

    Google Scholar 

  12. Zhang, Y., Zhuo, L., Peng, Y., Zhang, J.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: 19th International Conference on Digital Signal Processing, pp. 269–274. IEEE (2014)

    Google Scholar 

  13. Li, Y., Zhou, J., Li, Y., Au, O.C.: Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique. In: IEEE GlobalSIP, pp. 800–804 (2015)

    Google Scholar 

  14. Hendriks, R.C., Erkin, Z., Gerkmann, T.: Privacy-preserving distributed speech enhancement for wireless: sensor networks by processing in the encrypted domain. In: IEEE ICASSP, pp. 7005–7009 (2013)

    Google Scholar 

  15. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  16. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  17. Kipnis, A., Hibshoosh, E.: Efficient methods for practical fully homomorphic symmetric key encryption, randomization and verification. http://eprint.iacr.org/2012/637

  18. Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)

    Article  MATH  Google Scholar 

  19. ECRYPT II yearly report on algorithms and keysizes. In: European Network of Excellence in Cryptology. http://cordis.europa.eu/docs/projects/cnect/6/216676/080/deliverables/002-DSPA20

  20. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Shi, C., Wang, H., Qian, Q., Wang, H. (2016). Privacy Protection of Digital Speech Based on Homomorphic Encryption. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics