Skip to main content
Log in

Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily cause the hashing sequence to be leaked. At the same time, the algorithm’s robustness and matching accuracy under background noise are too low, leading to serious deviation in the authentication process. Therefore, this paper proposed an encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion. Firstly, the algorithm encrypts the original speech by setting the key to the 4D hyperchaotic Bao system and transforms it into encrypted speech. Secondly, the preprocessed encrypted speech is processed by discrete wavelet transform (DWT) and spectral entropy to obtain the feature fusion matrix of the speech, and the pseudo-random matrix is generated by using two-dimensional Logistic ICMIC cascade mapping (2D-LICM). Then the feature fusion matrix and pseudo-random matrix are projected and mapped to construct the biometric template. Finally, the threshold is selected for binarization, and the Biohashing sequence is generated and uploaded to the cloud. In this way, a one-to-one correspondence is established between the encrypted speech and the hashing sequence. The experimental results show that the algorithm can directly extract the authentication digest from the encrypted speech. During the authentication process, the download and decryption of the speech data is not required, which improves the security of the hashing sequence storage. The encrypted speech can reduce the amplitude of signal change, has strong discrimination and robustness, and can resist complex background noise and has good real-time performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Bochen B, Liu Z, Xu JP (2009) New chaotic system and its hyperchaos generation. J Syst Eng Electron 20(6):1179–1187

    Google Scholar 

  2. Cao C, Sun KH, Liu W (2017) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  3. Chen N, Wan WG (2010) Robust speech hash function. ETRI J 32(2):345–347

    Article  Google Scholar 

  4. Chen YZ, Wo Y, Xie R, Wu CD (2019) Deep secure quantization: On secure biometric hashing against similarity-based attacks - sciencedirect. Signal Process 154:314–323

    Article  Google Scholar 

  5. Cornelius G, Gerard C, Nazim D, Nigel C (2017) Privacy preserving encrypted phonetic search of speech data. In: IEEE international conference on acoustics, pp 6414–6418

  6. Gaurav D, Amandeep K (2019) Stoa: A bio-inspired based optimization algorithm for industrial engineering problems. Appl Artif Intell 82:148–174

    Article  Google Scholar 

  7. Gaurav D, Vijay K (2018) Emperor penguin optimizer: A bio-inspired algorithm for engineering problems. Knowl-Based Syst 159:20–50

    Article  Google Scholar 

  8. Ge S, Zhao S, li C, Li J (2018) Low-resolution face recognition in the wild via selective knowledge distillation. IEEE Trans Image Process 28 (4):2051–2062

    Article  MathSciNet  Google Scholar 

  9. He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inform Syst 14(3):703–718

    Article  Google Scholar 

  10. Huang YB, Hou HX, Wang Y, Zhang Y (2020) A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition. IEEE Access 8:34140–34152

    Article  Google Scholar 

  11. Huang YB, Wang Y, Zhang Q, Zhang WZ (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79 (33-34):24889–24909

    Article  Google Scholar 

  12. Kang Q, Liu X, Yao Y, Wang Z, Li Y (2016) Efficient authentication and access control of message dissemination over vehicular ad hoc network. Neurocomputing 181:132–138

    Article  Google Scholar 

  13. Kim HG, Cho HS, Kim JY (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315–323

    Article  Google Scholar 

  14. Kumar R, Gaurav D (2021) A comparative study of fuzzy optimization through fuzzy number. Int J Mod Res 1(1):1–14

    MathSciNet  Google Scholar 

  15. Kumar P, Mukherjee S, Saini R, Kaushik P (2019) Multimodal gait recognition with inertial sensor data and video using evolutionary algorithm. IEEE Trans Fuzzy Syst 27(5):956–965

    Article  Google Scholar 

  16. Kumar N, Rawat M (2020) Rp-lpp: A random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(12):2363–2381

    Article  Google Scholar 

  17. Kumar SM, Sharma BB (2018) Control and synchronization of a class of uncertain fractional order chaotic systems via adaptive backstepping control. Asian Journal of Control 20(2):707–720

    Article  MathSciNet  MATH  Google Scholar 

  18. Leonov GA (2018) Lyapunov functions in the global analysis of chaotic systems. Ukr Math J 70:42–66

    Article  MathSciNet  MATH  Google Scholar 

  19. Li JF, Wang HX, Jing Y (2015) Audio perceptual hashing based on nmf and mdct coefficients. Chin J Electron 24(3):579–588

    Article  Google Scholar 

  20. Li JF, Wu T, Wang H (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. J Beijing Univ Posts Telecommun 38 (2):89–93

    Google Scholar 

  21. Liao QH, Lüking M, Krüger DM, Deindl S (2019) Long time-scale atomistic simulations of the structure and dynamics of transcription factor-dna recognition. J Phys Chem B 123(17):3576–3590

    Article  Google Scholar 

  22. Liu WH, Zhu CX, Sun K (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  23. Mendelson A (2019) Security and privacy in the age of big data and machine learning. Computer 52(12):65–70

    Article  Google Scholar 

  24. Mohamed H, Wang KQ (2019) Parallel score fusion of ecg and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107–122

    Article  Google Scholar 

  25. Ning-Chen HD, Zhu J, Lin J (2013) Xiao Robust audio hashing scheme based on cochleagram and cross recurrence analysis. Electron Lett 49(1):7–8

    Article  Google Scholar 

  26. Peng L, Zhang J, Liu M, Hu A (2019) Deep learning based rf fingerprint identification using differential constellation trace figure. IEEE Trans Veh Technol 69(1):1091–1095

    Article  Google Scholar 

  27. Prathosh AP, Ananthapadmanabha TV, Ramakrishnan AG (2013) Epoch extraction based on integrated linear prediction residual using plosion index. EEE Transactions on Audio Speech and Language Processing 21 (12):2471–2480

    Article  Google Scholar 

  28. Qian Q, Wang HX, Sun X, Cui YH (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67(4):635–649

    Article  Google Scholar 

  29. Shadi A, Bani YM, Adel TW (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724

    Article  Google Scholar 

  30. Siniscalchi SM, Svendsen T, Lee CH (2014) An artificial neural network approach to automatic speech processing. Neurocomputing 140:326–338

    Article  Google Scholar 

  31. Ullah S, Mumtaz Z, Liu S, Abubaqr M, Mahboob A, Madni HA (2019) Single-equipment with multiple-application for an automated robot-car control system. Sensors 19(3):662

    Article  Google Scholar 

  32. Wang L, Li CR (2010) An improved speech endpoint detection method based on adaptive band-partition spectral entropy. Comput Simul 27(12):373–375

    MathSciNet  Google Scholar 

  33. Wang Z, Guo L, Adjouadi M (2015) Wavelet decomposition and phase encoding of temporal signals using spiking neurons. Neurocomputing 173 (3):1203–1210

    Google Scholar 

  34. Zhang QY, Ge ZX, Zhou L, Zhang Y (2019) An efficient retrieval algorithm of encrypted speech based on inverse fast 2 fourier-transform and measurement matrix. Turk J Electr Eng Comput Sci 27(3):1719–1736

    Article  Google Scholar 

  35. Zhang QY, Hu WJ, Huang Y, Qiao SB (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1–27

    Article  Google Scholar 

  36. Zhang YB, Mi BQ, Zhou L, Zhang T (2019) Speech perceptual hashing algorithm based on short-term auto-correlation for speech authentication. Radio Eng 49(10):899–904

    Google Scholar 

  37. Zhang QY, Qiao SB, Zhang T, Huang YB (2017) Perceptual hashing authentication algorithm for multi-format audio based on energy to zero ratio. Journal of Huazhong University of Science and Technology(Nature Science Edition) 45(9):33–38

    Google Scholar 

  38. Zhang QY, Qiao SB, Huang Y, Zhang T (2019) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653–21669

    Article  Google Scholar 

  39. Zhao S, Zhang B, Philip Chen CL (2019) Joint deep convolutional feature representation for hyperspectral palmprint recognition. Inf Sci 489:167–181

    Article  MathSciNet  Google Scholar 

  40. Zhang QY, Zhang T, Qiao S (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. Int J Netw Secur 21(2):259–268

    Google Scholar 

  41. Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78:17825–17846

    Article  Google Scholar 

  42. Zheng Y, Cao Y, Chang CH (2018) Facial biohashing based user-device physical unclonable function for bring your own device security. In: 2018 ieee international conference on consumer electronics (ICCE).

  43. Zhou ZY, Zhou Y, Philip-Chen CL (2013) A new series-wound framework for generating 1d chaotic maps. In: 2013 IEEE digital signal processing and signal processing education meeting (DSP/SPE)

  44. Zhou L, Rodrigues J (2019) Honggang-wang, and Maria-G-Martini. 5g multimedia communications: theory, technology, and application. IEEE MultiMedia 26(1):8–9

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No.61862041), Youth Science and Technology Fund of Gansu Province of China(No.21JR7RA120).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-bo Huang.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, Tf., Huang, Yb., Pu, Xr. et al. Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion. Multimed Tools Appl 82, 16767–16792 (2023). https://doi.org/10.1007/s11042-022-13933-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13933-6

Keywords

Navigation