Abstract
The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time, the robustness and matching accuracy of speech signal under complex noise are low, which will cause serious deviations in authentication. In order to solve the above problems, this paper proposes an encrypted speech perceptual hashing authentication algorithm based on improved two-dimensional Henon chaotic map (2D-Henon) encryption and harmonic product spectrum (HPS). Firstly, the algorithm sets the key for the improved 2D-Henon and transforms the original speech to encrypted speech. And then, feature extraction is performed on the encrypted speech signal to obtain the HPS feature matrix, and perform mapping and dimensionality reduction on the HPS matrix. Finally, the threshold is selected for binarization, and the perceptual hashing sequence is constructed. Experimental results show that the algorithm adopts encrypted speech perceptual hashing sequence, which improves the security of hashing sequence storage. The encrypted speech signal can reduce the amplitude of signal change, which has strong discrimination and robustness, and also has better matching accuracy against complex noise.
Similar content being viewed by others
References
Chen N, Zhu J, Xiao H D, Yuan W H, Wang Y, Lin J J (2013) Robust audio hashing scheme based on cochleagram and cross recurrence analysis. Electron Lett
Chen N, Wan W (2010) Robust speech hash function. ETRI J 32,2(2010-04-07) 32(2):345–347
Ge S, Zhao S, Li C, Li J (2018) Low-resolution face recognition in the wild via selective knowledge distillation. IEEE Trans Image Process PP(4):1–1
Gupta B B, Yamaguchi S, Agrawal D P (2017) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl:1–6
Hammad M, Wang K (2018) Parallel score fusion of ecg and fingerprint for human authentication based on convolution neural network. Comput Secur 81
He S, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703–718
Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1)
Huang Y B, Wang Y, Zhang Q Y, Zhang W Z, Fan M H Multi-format speech biohashing based on spectrogram. Multimed Tools Appl:1–21
Huang Y, Hou H, Wang Y, Zhang Y, Fan M (2020) A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition. IEEE Access 8:34140–34152
Huang Y, Wang Y (2019) Multi-format speech perception hashing algorithm based on frequency band variance. In: 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP)
Jin HG, Kim HS, Cho YK (2019) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315–323
Kang Q, Liu X, Yao Y, Wang Z, Li Y (2016) Efficient authentication and access control of message dissemination over vehicular ad hoc network. Neurocomputing 181(C):132–138
Kumar N, Rawat M (2020) Rp-lpp : a random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(12)
Kumar P, Mukherjee S, Saini R, Kaushik P, Roy P P, Dogra D P (2019) Multimodal gait recognition with inertial sensor data and video using evolutionary algorithm. IEEE Trans Fuzzy Syst 27(5):956– 965
Leonov G A (2018) Lyapunov functions in the global analysis of chaotic systems. Ukr Math J:1–25
Li J, Wang H, Jing Y (2015) Audio perceptual hashing based on nmf and mdct coefficients. Chin J Electron 24(3):579–588
Li W T, Wang H (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. Beijing Univ Posts Telecomm 38(2):89–93
Mendelson A (2019) Security and privacy in the age of big data and machine learning. Computer 52(12):65–70
Peng L, Zhang J, Liu M, Hu A (2020) Deep learning based rf fingerprint identification using differential constellation trace figure. IEEE Trans Veh Technol 69(1):1091–1095
Prasasti A L, Novamizanti L, Razik M I (2019) Identification of baby cry with discrete wavelet transform, mel frequency cepstral coefficient and principal component analysis. J Phys Conf Ser 1367(1):012061 (12pp)
Prathosh A P, Ananthapadmanabha T V, Ramakrishnan A G (2013) Epoch extraction based on integrated linear prediction residual using plosion index. IEEE Trans Audio Speech Lang Process 21(12):2471–2480
Qian, Qing, Wang, Hongxia, Sun, Xingming, Cui, Yunhe, Huan, and S (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommunication Systems Modeling Analysis Design & Management
Qinghua L, Malin L, Krüger DM, Sebastian D, Johan (2019) Long time-scale atomistic simulations of the structure and dynamics of transcription factor-dna recognition. J Phys Chem B
Qiuyu Z, Pengfei X, Yibo H, Ruihong D, Zhongping Y (2018) An efficient speech perceptual hashing authentication algorithm based on dwt and symmetric ternary string. Int J Inf Commun Technol 12(1-2):31–50
Sathiyamurthi P, Ramakrishnan S (2019) Testing and analysis of chen chaotic mapping for speech cryptography. J Test Eval 47(4):20170283
Shi C, Li X, Wang H (2020) A novel integrity authentication algorithm based on perceptual speech hash and learned dictionaries. IEEE Access PP(99):1–1
Shukla M K, Sharma B B (2018) Control and synchronization of a class of uncertain fractional order chaotic systems via adaptive backstepping control. Asian Journal of Control
Siniscalchi S M, Svendsen TR, Lee C H (2014) An artificial neural network approach to automatic speech processing. Neurocomputing 140:326–338
Sumarno L (2018) Chord recognition using segment averaging feature extraction with simplified harmonic product spectrum and logarithmic scaling. Int J Electr Eng Inf 10(4)
Ullah S, Mumtaz Z, Liu S, Abubaqr M, Mahboob A, Madni H A (2019) Single-equipment with multiple-application for an automated robot-car control system. Sensors 19(3). https://doi.org/10.3390/s19030662
Wang Y, Huang Y B, Zhang R, Zhang Q Y (2020) Multi-format speech biohashing based on energy to zero ratio and improved lp-mmse parameter fusion. Multimed Tools Appl:1–24
Wang Z, Guo L, Adjouadi M (2016) Wavelet decomposition and phase encoding of temporal signals using spiking neurons. Neurocomputing 173 (JAN.15PT.3):1203–1210
Yongbing Z, Baoquan M I, Liang Z, Tao Z (2019) Speech perceptual hashing algorithm based on short-term auto-correlation for speech authentication. Radio Engineering
Zhang, Qiu-yu, Qiao, Si-bin, Huang, Yi-bo, Tao (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimedia Tools & Applications
Zhang Q Y, Hu W J, Huang Y B, Qiao S B (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1–27
Zhang Q Y, Li G L, Huang Y B (2020) An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction. Multimed Tools Appl 79(21)
Zhang QY, Qiao S, Zhang T, Huang Y (2017) Multi-format audio perception hashing algorithms based on zero ratio. J Huazhong Univ Sci Technol Natural Sci Ed 45(9):33–38
Zhang Q Y, Zhang T, Qiao S B, Wu D F (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. Int J Netw Secur 21 (2):259–268
Zhang Q Y, Zhou L, Zhang T, Zhang D H (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimedia Tools and Applications
Zhao S, Zhang B, Philip Chen C L (2019) Joint deep convolutional feature representation for hyperspectral palmprint recognition. Inf Sci 489:167–181
Zhou L, Rodrigues J J P C, Wang H, Martini M, Leung V C M (2019) 5g multimedia communications: Theory, technology, and application. IEEE MultiMedia 26(1):8–9
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No.61862041), Science and Technology Program of Gansu Province of China (No.21JR7RA120).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Huang, Yb., Chen, Tf., Zhang, Qy. et al. Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum. Multimed Tools Appl 81, 25829–25852 (2022). https://doi.org/10.1007/s11042-022-12746-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12746-x