Skip to main content
Log in

Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time, the robustness and matching accuracy of speech signal under complex noise are low, which will cause serious deviations in authentication. In order to solve the above problems, this paper proposes an encrypted speech perceptual hashing authentication algorithm based on improved two-dimensional Henon chaotic map (2D-Henon) encryption and harmonic product spectrum (HPS). Firstly, the algorithm sets the key for the improved 2D-Henon and transforms the original speech to encrypted speech. And then, feature extraction is performed on the encrypted speech signal to obtain the HPS feature matrix, and perform mapping and dimensionality reduction on the HPS matrix. Finally, the threshold is selected for binarization, and the perceptual hashing sequence is constructed. Experimental results show that the algorithm adopts encrypted speech perceptual hashing sequence, which improves the security of hashing sequence storage. The encrypted speech signal can reduce the amplitude of signal change, which has strong discrimination and robustness, and also has better matching accuracy against complex noise.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Chen N, Zhu J, Xiao H D, Yuan W H, Wang Y, Lin J J (2013) Robust audio hashing scheme based on cochleagram and cross recurrence analysis. Electron Lett

  2. Chen N, Wan W (2010) Robust speech hash function. ETRI J 32,2(2010-04-07) 32(2):345–347

    MathSciNet  Google Scholar 

  3. Ge S, Zhao S, Li C, Li J (2018) Low-resolution face recognition in the wild via selective knowledge distillation. IEEE Trans Image Process PP(4):1–1

    MathSciNet  Google Scholar 

  4. Gupta B B, Yamaguchi S, Agrawal D P (2017) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl:1–6

  5. Hammad M, Wang K (2018) Parallel score fusion of ecg and fingerprint for human authentication based on convolution neural network. Comput Secur 81

  6. He S, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703–718

    Article  Google Scholar 

  7. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1)

  8. Huang Y B, Wang Y, Zhang Q Y, Zhang W Z, Fan M H Multi-format speech biohashing based on spectrogram. Multimed Tools Appl:1–21

  9. Huang Y, Hou H, Wang Y, Zhang Y, Fan M (2020) A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition. IEEE Access 8:34140–34152

    Article  Google Scholar 

  10. Huang Y, Wang Y (2019) Multi-format speech perception hashing algorithm based on frequency band variance. In: 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP)

  11. Jin HG, Kim HS, Cho YK (2019) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315–323

    Google Scholar 

  12. Kang Q, Liu X, Yao Y, Wang Z, Li Y (2016) Efficient authentication and access control of message dissemination over vehicular ad hoc network. Neurocomputing 181(C):132–138

    Article  Google Scholar 

  13. Kumar N, Rawat M (2020) Rp-lpp : a random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(12)

  14. Kumar P, Mukherjee S, Saini R, Kaushik P, Roy P P, Dogra D P (2019) Multimodal gait recognition with inertial sensor data and video using evolutionary algorithm. IEEE Trans Fuzzy Syst 27(5):956– 965

    Article  Google Scholar 

  15. Leonov G A (2018) Lyapunov functions in the global analysis of chaotic systems. Ukr Math J:1–25

  16. Li J, Wang H, Jing Y (2015) Audio perceptual hashing based on nmf and mdct coefficients. Chin J Electron 24(3):579–588

    Article  Google Scholar 

  17. Li W T, Wang H (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. Beijing Univ Posts Telecomm 38(2):89–93

    Google Scholar 

  18. Mendelson A (2019) Security and privacy in the age of big data and machine learning. Computer 52(12):65–70

    Article  Google Scholar 

  19. Peng L, Zhang J, Liu M, Hu A (2020) Deep learning based rf fingerprint identification using differential constellation trace figure. IEEE Trans Veh Technol 69(1):1091–1095

    Article  Google Scholar 

  20. Prasasti A L, Novamizanti L, Razik M I (2019) Identification of baby cry with discrete wavelet transform, mel frequency cepstral coefficient and principal component analysis. J Phys Conf Ser 1367(1):012061 (12pp)

    Google Scholar 

  21. Prathosh A P, Ananthapadmanabha T V, Ramakrishnan A G (2013) Epoch extraction based on integrated linear prediction residual using plosion index. IEEE Trans Audio Speech Lang Process 21(12):2471–2480

    Article  Google Scholar 

  22. Qian, Qing, Wang, Hongxia, Sun, Xingming, Cui, Yunhe, Huan, and S (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommunication Systems Modeling Analysis Design & Management

  23. Qinghua L, Malin L, Krüger DM, Sebastian D, Johan (2019) Long time-scale atomistic simulations of the structure and dynamics of transcription factor-dna recognition. J Phys Chem B

  24. Qiuyu Z, Pengfei X, Yibo H, Ruihong D, Zhongping Y (2018) An efficient speech perceptual hashing authentication algorithm based on dwt and symmetric ternary string. Int J Inf Commun Technol 12(1-2):31–50

    Google Scholar 

  25. Sathiyamurthi P, Ramakrishnan S (2019) Testing and analysis of chen chaotic mapping for speech cryptography. J Test Eval 47(4):20170283

    Article  Google Scholar 

  26. Shi C, Li X, Wang H (2020) A novel integrity authentication algorithm based on perceptual speech hash and learned dictionaries. IEEE Access PP(99):1–1

    Google Scholar 

  27. Shukla M K, Sharma B B (2018) Control and synchronization of a class of uncertain fractional order chaotic systems via adaptive backstepping control. Asian Journal of Control

  28. Siniscalchi S M, Svendsen TR, Lee C H (2014) An artificial neural network approach to automatic speech processing. Neurocomputing 140:326–338

    Article  Google Scholar 

  29. Sumarno L (2018) Chord recognition using segment averaging feature extraction with simplified harmonic product spectrum and logarithmic scaling. Int J Electr Eng Inf 10(4)

  30. Ullah S, Mumtaz Z, Liu S, Abubaqr M, Mahboob A, Madni H A (2019) Single-equipment with multiple-application for an automated robot-car control system. Sensors 19(3). https://doi.org/10.3390/s19030662

  31. Wang Y, Huang Y B, Zhang R, Zhang Q Y (2020) Multi-format speech biohashing based on energy to zero ratio and improved lp-mmse parameter fusion. Multimed Tools Appl:1–24

  32. Wang Z, Guo L, Adjouadi M (2016) Wavelet decomposition and phase encoding of temporal signals using spiking neurons. Neurocomputing 173 (JAN.15PT.3):1203–1210

    Article  Google Scholar 

  33. Yongbing Z, Baoquan M I, Liang Z, Tao Z (2019) Speech perceptual hashing algorithm based on short-term auto-correlation for speech authentication. Radio Engineering

  34. Zhang, Qiu-yu, Qiao, Si-bin, Huang, Yi-bo, Tao (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimedia Tools & Applications

  35. Zhang Q Y, Hu W J, Huang Y B, Qiao S B (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1–27

    Google Scholar 

  36. Zhang Q Y, Li G L, Huang Y B (2020) An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction. Multimed Tools Appl 79(21)

  37. Zhang QY, Qiao S, Zhang T, Huang Y (2017) Multi-format audio perception hashing algorithms based on zero ratio. J Huazhong Univ Sci Technol Natural Sci Ed 45(9):33–38

    Google Scholar 

  38. Zhang Q Y, Zhang T, Qiao S B, Wu D F (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. Int J Netw Secur 21 (2):259–268

    Google Scholar 

  39. Zhang Q Y, Zhou L, Zhang T, Zhang D H (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimedia Tools and Applications

  40. Zhao S, Zhang B, Philip Chen C L (2019) Joint deep convolutional feature representation for hyperspectral palmprint recognition. Inf Sci 489:167–181

    Article  MathSciNet  Google Scholar 

  41. Zhou L, Rodrigues J J P C, Wang H, Martini M, Leung V C M (2019) 5g multimedia communications: Theory, technology, and application. IEEE MultiMedia 26(1):8–9

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No.61862041), Science and Technology Program of Gansu Province of China (No.21JR7RA120).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-bo Huang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Yb., Chen, Tf., Zhang, Qy. et al. Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum. Multimed Tools Appl 81, 25829–25852 (2022). https://doi.org/10.1007/s11042-022-12746-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12746-x

Keywords

Navigation