Skip to main content
Log in

Novel secured speech communication for person authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Biometrics is the common method of securely and efficiently identifying and authenticating individuals by using unique biological features. Some common biometrics is fingerprint, speech, iris and signature. In this paper, the cryptosystem is proposed to enhance security and conserve the transmission bandwidth in implementing an authentication system The design of speech based secured authentication systems include the extraction of features from speech, creation of templates and testing procedures to authenticate the persons. The speaker recognition system is formed using Mel Frequency Cepstral coefficients (MFCC) and Recurrent Neural network (RNN) based machine learning technique. For developing a training system, MFCC features are extracted from the training data set. The RNN network is trained with features and a speakers’ template is created for each speaker. In testing phase to ensure security in speech based authentication, MFCC features are extracted from the test speech set and these features are encrypted before it gets transmitted through the unsecured channel. The proposed crypto system is developed based on 3D logistic chaotic map and DNA operation. Firstly, MFCC features derived from the test speech set are concatenated and subjected to first level diffusion and confused using 3D logistic map. The resultant is encoded as a DNA sequence E(n), using any one of the eight rules for encoding DNA. The DNA XOR operation is performed between E(n) and 3D logistic map DNA sequence L(n). Finally, the encrypted feature set is attained by DNA decoding. In the test phase, the proposed system decrypts the features and is matched with a stored trained model to locate the identity of the speaker. Overall accuracy is 88% for the text independent and 96% for the text dependent person authentication system tested with genuine utterances. This research is extended to estimate the performance against attacks utterance and propose system is assessed with respect to rejection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Algorithm 1
Fig. 9
Algorithm 2
Algorithm 3
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

All relevant data are within the article and its supporting information files

References

  1. Das RK, Jelil S, Mahadeva Prasanna SR (2017) Development of Multi-Level Speech based Person Authentication System. J Signal Process Syst 88(3):259–271. https://doi.org/10.1007/s11265-016-1148-z

    Article  Google Scholar 

  2. Das BB, Ram SK, Pati B, Panigrahi CR, Babu KS, Mohapatra RK (2021) SVM and ensemble-SVM in EEG-based person identification. In: Panigrahi CR, Pati B, Mohapatra P, Buyya R, Li KC (eds) Progress in advanced computing and intelligent engineering. Advances in intelligent systems and computing, vol 1199. Springer, Singapore. https://doi.org/10.1007/978-981-15-6353-9_13

    Chapter  Google Scholar 

  3. David JH, Till RJ A Simple Generalization of the Area Under the ROC Curve for Multiple Class Classification Problems. Int J Mach Learn 45(2):171–186. https://doi.org/10.1023/A:1010920819831

  4. Dellwo V, French P, He L (2018) Voice biometrics for forensic speaker recognition applications. In: Frühholz S, Berlin P (eds) The Oxford Handbook of Voice Perception. Oxford University Press, Oxford, pp 777–798

    Google Scholar 

  5. El Ayadi M, Hassan A-KSO, Abdel-Naby A, Elgendy OA (2017) Text-independent speaker identification using robust statistics estimation. Int J Speech Commun 92:52–63. https://doi.org/10.1016/j.specom.2017.05.005

    Article  Google Scholar 

  6. Elsafty AH, Tolba MF, Said LA, Madiana AH, Radwan AG (2020) Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU Int J Electron Commun 125:153347. https://doi.org/10.1016/j.aeue.2020.153347

    Article  Google Scholar 

  7. Enayatifar R, Abdullah AH, FauziIsnin I (2014) Chaos based image encryption using hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93. https://doi.org/10.1016/j.optlaseng.2013.12.003

    Article  Google Scholar 

  8. Ergünay SK, Khoury E, Lazaridis A et al (2015) ‘On the vulnerability of speaker verification to realistic voice spoofing’, Int Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), https://doi.org/10.1109/BTAS.2015.7358783

  9. Farsana FJ, Gopakumar K (2017) Private key encryption of speech signal based on three dimensional chaotic map. Int Conf Commun Signal Process. https://doi.org/10.1080/19393555.2016.1212954

  10. Hochreiter S, Schmidhuber J (1997) Long Short-Term Memory. Neural Comput 9(8) (November 1997):1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735

    Article  Google Scholar 

  11. Jiang Y, Tang S (2018) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Syst 24:355–363. https://doi.org/10.1007/s00530-017-0565-6

    Article  Google Scholar 

  12. Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Sec Appl 50:102428. https://doi.org/10.1016/j.jisa.2019.102428

    Article  Google Scholar 

  13. Juhong A, Purahong B, Suwan S, Pitavirooj C (2019) Biometrics Based on Facial Landmark with Application in Person Identification. In: Lhotska, L., Sukupova, L., Lacković, I., Ibbott, G. (eds) World Congress on Medical Physics and Biomedical Engineering 2018. IFMBE proceedings, vol 68/1. Springer, Singapore https://doi.org/10.1007/978-981-10-9035-6_30

  14. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21. https://doi.org/10.1109/7384.963463

    Article  Google Scholar 

  15. Lakshmanan S, Velliyan P, Attia A, Chalabi NE (2022) Finger knuckle pattern person authentication system based on monogenic and LPQ features. Pattern Anal Applic 25:395–407. https://doi.org/10.1007/s10044-021-01047-y

    Article  Google Scholar 

  16. Lakshmi C, Ravi VM, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Con(dif)fused voice to convey secret: a dual-domain approach. Multimedia Syst 26:301–311. https://doi.org/10.1007/s00530-019-00644-6

    Article  Google Scholar 

  17. Li Y, Li X, Jin X et al (2015) “An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map,” in Applications and Techniques in Information Security, vol. 557 of Communications in Computer and Information Science, pp 3–13, Springer Berlin Heidelberg, Berlin, Heidelberg, https://doi.org/10.1007/978-3-662-48683-2_1

  18. Mosa E, Messiha NW, Zahran O, Fathi E, El-Samie A (2011) Chaotic encryption of speech signals. Int J Speech Technol 14:285–296. https://doi.org/10.1007/s10772-011-9103-7

    Article  Google Scholar 

  19. Mostafa N Soliman F, Abdalluh M, Abd El-samie FE (2015) "Speech encryption using two dimensional chaotic maps," 2015 11th International Computer Engineering Conference (ICENCO), Cairo, pp. 235–240. https://doi.org/10.1109/ICENCO.2015.7416354

  20. Nagakrishnan R, Revathi A (2018) “A Robust Speech Encryption System Based on DNA addition and Chaotic Maps”, 18th International Conference on Intelligent Systems Design and Applications, Volume 1, pp 1070-1080, https://doi.org/10.1007/978-3-030-16657-1_100

  21. Nagakrishnan R, Revathi A (2020) A robust cryptosystem to enhance the security in speech based person authentication. Multimed Tools Appl 79:20795–20819. https://doi.org/10.1007/s11042-020-08846-1

    Article  Google Scholar 

  22. Nagakrishnan R, Revathi A (2022) Generic speech based person authentication system with genuine and spoofed utterances: different feature sets and models. Multimed Tools Appl 81:1179–1208. https://doi.org/10.1007/s11042-021-11365-2

    Article  Google Scholar 

  23. Patro KAK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Sec Appl 46:23–41. https://doi.org/10.1016/j.jisa.2019.02.006

    Article  Google Scholar 

  24. Peacocke RD, Graf DH (1990) An introduction to speech and speaker recognition. J Comput 23(8):26–33. https://doi.org/10.1016/B978-0-08-051574-8.50057-1

    Article  Google Scholar 

  25. Resmi P, Reshika R, Sri Madhava Raja N, Arunmozhi S, Rao VS (2021) An automated person authentication system with photo to sketch matching technique. In: Satapathy S, Zhang YD, Bhateja V, Majhi R (eds) Intelligent data engineering and analytics. Advances in intelligent systems and computing, vol 1177. Springer, Singapore. https://doi.org/10.1007/978-981-15-5679-1_63

    Chapter  Google Scholar 

  26. Revathi A, Jeyalakshmi C, Thenmozhi K (2018) Digital speech watermarking to enhance the security using speech as a biometric for person authentication. Int J Speech Technol 21(4):1021–10314. https://doi.org/10.1007/s10772-018-09563-9

    Article  Google Scholar 

  27. Revathi A, Jeyalakshmi C, Thenmozhi K (2019) Person Authentication using speech as a biometric against play back attacks. J Multimed Tools Appl 78(2):1569–1582. https://doi.org/10.1007/s11042-018-6258-0

    Article  Google Scholar 

  28. Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 20:1–11. https://doi.org/10.1186/s13636-017-0118-0

    Article  Google Scholar 

  29. Sathiyamurthi P, Ramakrishnan S (2022) Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimed Tools Appl 81:6331–6349. https://doi.org/10.1007/s11042-021-11757-4

    Article  Google Scholar 

  30. Sayed WS, Tolba MF, Radwan AG, Abd-El-Hafiz SK (2018) "Speech encryption using generalized modified chaotic logistic and tent maps," 2018 IEEE International Conference on Industrial Technology (ICIT), Lyon, pp. 1526–1531. https://doi.org/10.1109/ICIT.2018.8352407

  31. Sheela SJ, Suresh KV, Tandur D (2017, 2017) A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding. J Comput Netw Commun:1–12. https://doi.org/10.1155/2017/2721910

  32. Sheela SJ, Suresh KV, Tandur D (2017) “Chaos based speech encryption using modified Henon map”, Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, https://doi.org/10.1109/ICECCT.2017.8117918

  33. Singh N (2019) Voice biometric: revolution in field of security. CSI Commun 42(8):24–25

    Google Scholar 

  34. Tharwat A (2018) Classification assessment methods. Appl Comput Inf 17:168–192. https://doi.org/10.1016/j.aci.2018.08.003

    Article  Google Scholar 

  35. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidisciplinary Journals in Science And Technology, Journal Of Selected Areas in Telecommunications (JSAT) 2:31–38

    Google Scholar 

  36. Yoo I-C, Lim H, Yook D (2015) Formant Based Robust Voice Activity Detection. IEEE/ ACM Trans Audio Speech Lang Process 23(12):2238–2224. https://doi.org/10.1109/TASLP.2015.2476762

    Article  Google Scholar 

  37. Zhao X, Wang Y, Wang D (2014) Robust speaker identification in noisy and reverberant conditions. IEEE/ACM Trans Audio Speech Lang Process 22(4):836–845. https://doi.org/10.1109/ICASSP.2014.6854352

    Article  Google Scholar 

Download references

Code availability

The code that supports the findings of this study is available from the corresponding authors on reasonable request.

Funding

The authors want to publish a research paper in a reputable publication. This research is not supported by any funding schemes or organisations.

Author information

Authors and Affiliations

Authors

Contributions

R.Nagakrishnan and A. Revathi contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript.

Corresponding author

Correspondence to A. Revathi.

Ethics declarations

Conflict of interest

The authors have declared that there is no conflict of interest exists.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nagakrishnan, R., Revathi, A. Novel secured speech communication for person authentication. Multimed Tools Appl 82, 24771–24801 (2023). https://doi.org/10.1007/s11042-022-14246-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14246-4

Keywords

Navigation