Skip to main content

Advertisement

Log in

SCAN-speech biometric template protection based on genus-2 hyper elliptic curve

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Rapid growth in the mobile technology manifolds the usage of mobile devices. It leads to the development and popularity of mobile application in diversified domains like finance, commerce, and government services. Extensive services can be explored conveniently and cost-effectively from these applications using speaker recognition based authentication to determine the identity of the individuals requesting service. Speech template that is stored in these mobile devices necessitates the prime concern of preserving the private data from unauthorized access and privacy breaches. It is highly feasible to prove the authenticity of the person using speech as a biometric to ensure that the rendered services are accessed only by the legitimate user. If the speech template stored in the database for comparison is compromised, then the authentication process will become obsolete. This issue had motivated the need for highly secured, faster and lightweight model named as (SCAN) - Speech biometriC templAte protectioN system based on the genus-2 hyper elliptic curve. Mobile devices are smaller in size and often restricted by memory and power constraints. Hence it requires a cryptosystem with lesser key size offering the higher degree of security and guard against sophisticated attacks. The proposed SCAN system provides the complete solution for this challenge uniquely by designing genus-2 hyper elliptic curve cryptosystem for speech template. The elaborate analysis from the results traces ideal values for MSE, PSNR, BRT, and EUD. This ratifies the suitability of this work that craves for higher encryption and decryption reliability. It offers high resistance to various attacks as it involves HECC that comes under the category of discrete logarithmic problem. This SCAN system can also reap the benefit of light weight processing, better ERR and authentication accuracy with induced parallelism.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Ali Z et al (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76–87

    Article  Google Scholar 

  2. Billeb S et al (2015) Biometric template protection for speaker recognition based on universal background models. IET Biomet 4.2:116–126

    Article  Google Scholar 

  3. Chee K-Y et al (2018) Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recogn 76:273–287

    Article  Google Scholar 

  4. Feng YC, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. Biometric Technology for Human Identification V. Vol. 6944. International Society for Optics and Photonics

  5. Hermansky H, Morgan N (1994) RASTA processing of speech. IEEE Trans Speech Audio Process 2.4:578–589

    Article  Google Scholar 

  6. Hermansky H et al. (1986) Perceptually-based processing in automatic speech recognition. Acoust Speech Signal Process. IEEE Int Conf ICASSP'86 11. IEEE

  7. Hermansky H et al. (1991) The challenge of inverse-E: the RASTA-PLP method. Signals, Systems and Computers. 1991 Conference Record of the Twenty-Fifth Asilomar Conference on. IEEE

  8. Inthavisas K, Lopresti D (2011) Speech cryptographic key regeneration based on the password. Biometrics (IJCB), 2011 International Joint Conference on. IEEE

  9. Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45.11:87–92

    Article  Google Scholar 

  10. Jain AK, Ross A, Uludag U (2005) Biometric template security: challenges and solutions. Sign Process Conf 2005 13th European. IEEE

  11. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Sign Process 2008:113

    Google Scholar 

  12. Jin Z et al (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50–62

    Article  Google Scholar 

  13. Johnson RC, Scheirer WJ, Boult TE (2013) Secure voice-based authentication for mobile devices: vaulted voice verification. Biometric and Surveillance Technology for Human and Activity Identification X. Vol. 8712. International Society for Optics and Photonics

  14. Juels A, Madhu S (2006) A fuzzy vault scheme. Des Codes Crypt 38.2:237–257

    Article  MathSciNet  MATH  Google Scholar 

  15. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. Proceedings of the 6th ACM conference on Computer and communications security. ACM

  16. Lan X, Ma AJ, Yuen PC, Chellappa R (2015) Joint sparse representation and robust feature-level fusion for multi-cue visual tracking. IEEE Trans Image Process 24(12):5826–5841

    Article  MathSciNet  MATH  Google Scholar 

  17. Lan X, Zhang S, Yuen PC (2016) Robust joint discriminative feature learning for visual tracking. IJCAI: 3403–3410

  18. Lan, X, Yuen PC, Chellappa R (2017) Robust MIL-based feature template learning for object tracking. AAAI: 4118–4125

  19. Lan X, Zhang S, Yuen PC, Chellappa R (2018) Learning common and feature-specific patterns: a novel multiple-sparse-representation-based tracker. IEEE Trans Image Process 27(4):2022–2037

    Article  MathSciNet  MATH  Google Scholar 

  20. Lan X, Ye M, Zhang S, Zhou H, Yuen PC (2018) Modality-correlation-aware sparse representation for RGB-infrared object tracking. Pattern Recogn Lett

  21. Lan X, Ye M, Zhang S, Yuen PC (2018) Robust collaborative discriminative learning for RGB-infrared tracking. AAAI

  22. Mwema J, Kimwele M, Kimani S (2015) A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates. Int J Comput Trends Technol 20.1:12–18

    Article  Google Scholar 

  23. Mwema J, Kimani S, Kimwele M (2015) A study of approaches and measures aimed at securing biometric fingerprint templates in verification and identification systems. Int J Comput Appl Technol Res 4.2:108–119

    Google Scholar 

  24. Nandakumar K, Jain AK (2015) Biometric template protection: Bridging the performance gap between theory and practice. IEEE Signal Process Mag 32.5:88–100

    Article  Google Scholar 

  25. Pauline M et al. (2016) Multi-bit allocation: preparing voice biometrics for template protection. Odyssey

  26. Rabiner LR, Juang B-H (1993) Fundamentals of speech recognition Vol. 14. PTR Prentice Hall, Englewood cliffs

    Google Scholar 

  27. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Sec 2011.1:3

    Article  Google Scholar 

  28. Revathi A, Venkataramani Y (2011) Speaker independent continuous speech and isolated digit recognition using VQ and HMM. Commun Signal Process (ICCSP), 2011 Int Conf IEEE

  29. Soutar C et al. (1999) Biometric encryption ICSA Guide to Cryptography: 649–675

  30. Unar JA, Seng WC, Abbasi A (2014) A review of biometric technology along with trends and prospects. Pattern Recogn 47.8:2673–2688

    Article  Google Scholar 

  31. Weng A (2003) Constructing hyperelliptic curves of genus two suitable for cryptography. Math Comput 72.241:435–458

    MATH  Google Scholar 

  32. Zhu H-H, He Q-H, Li Y-X (2012) A two-step hybrid approach for voiceprint-biometric template protection. Machine Learning and Cybernetics (ICMLC), 2012 International Conf 2. IEEE

Download references

Acknowledgements

This part of this research work is supported by Department of Science and Technology (DST), Science and Engineering Board (SERB), Government of India under the ECR grant (ECR/2017/000679/ES)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Sasikaladevi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sasikaladevi, N., Geetha, K., Revathi, A. et al. SCAN-speech biometric template protection based on genus-2 hyper elliptic curve. Multimed Tools Appl 78, 18339–18361 (2019). https://doi.org/10.1007/s11042-019-7208-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7208-1

Keywords