Abstract
Biometrics is the common method of securely and efficiently identifying and authenticating individuals by using unique biological features. Some common biometrics is fingerprint, speech, iris and signature. In this paper, the cryptosystem is proposed to enhance security and conserve the transmission bandwidth in implementing an authentication system The design of speech based secured authentication systems include the extraction of features from speech, creation of templates and testing procedures to authenticate the persons. The speaker recognition system is formed using Mel Frequency Cepstral coefficients (MFCC) and Recurrent Neural network (RNN) based machine learning technique. For developing a training system, MFCC features are extracted from the training data set. The RNN network is trained with features and a speakers’ template is created for each speaker. In testing phase to ensure security in speech based authentication, MFCC features are extracted from the test speech set and these features are encrypted before it gets transmitted through the unsecured channel. The proposed crypto system is developed based on 3D logistic chaotic map and DNA operation. Firstly, MFCC features derived from the test speech set are concatenated and subjected to first level diffusion and confused using 3D logistic map. The resultant is encoded as a DNA sequence E(n), using any one of the eight rules for encoding DNA. The DNA XOR operation is performed between E(n) and 3D logistic map DNA sequence L(n). Finally, the encrypted feature set is attained by DNA decoding. In the test phase, the proposed system decrypts the features and is matched with a stored trained model to locate the identity of the speaker. Overall accuracy is 88% for the text independent and 96% for the text dependent person authentication system tested with genuine utterances. This research is extended to estimate the performance against attacks utterance and propose system is assessed with respect to rejection rate.
Similar content being viewed by others
Data availability
All relevant data are within the article and its supporting information files
References
Das RK, Jelil S, Mahadeva Prasanna SR (2017) Development of Multi-Level Speech based Person Authentication System. J Signal Process Syst 88(3):259–271. https://doi.org/10.1007/s11265-016-1148-z
Das BB, Ram SK, Pati B, Panigrahi CR, Babu KS, Mohapatra RK (2021) SVM and ensemble-SVM in EEG-based person identification. In: Panigrahi CR, Pati B, Mohapatra P, Buyya R, Li KC (eds) Progress in advanced computing and intelligent engineering. Advances in intelligent systems and computing, vol 1199. Springer, Singapore. https://doi.org/10.1007/978-981-15-6353-9_13
David JH, Till RJ A Simple Generalization of the Area Under the ROC Curve for Multiple Class Classification Problems. Int J Mach Learn 45(2):171–186. https://doi.org/10.1023/A:1010920819831
Dellwo V, French P, He L (2018) Voice biometrics for forensic speaker recognition applications. In: Frühholz S, Berlin P (eds) The Oxford Handbook of Voice Perception. Oxford University Press, Oxford, pp 777–798
El Ayadi M, Hassan A-KSO, Abdel-Naby A, Elgendy OA (2017) Text-independent speaker identification using robust statistics estimation. Int J Speech Commun 92:52–63. https://doi.org/10.1016/j.specom.2017.05.005
Elsafty AH, Tolba MF, Said LA, Madiana AH, Radwan AG (2020) Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application. AEU Int J Electron Commun 125:153347. https://doi.org/10.1016/j.aeue.2020.153347
Enayatifar R, Abdullah AH, FauziIsnin I (2014) Chaos based image encryption using hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93. https://doi.org/10.1016/j.optlaseng.2013.12.003
Ergünay SK, Khoury E, Lazaridis A et al (2015) ‘On the vulnerability of speaker verification to realistic voice spoofing’, Int Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), https://doi.org/10.1109/BTAS.2015.7358783
Farsana FJ, Gopakumar K (2017) Private key encryption of speech signal based on three dimensional chaotic map. Int Conf Commun Signal Process. https://doi.org/10.1080/19393555.2016.1212954
Hochreiter S, Schmidhuber J (1997) Long Short-Term Memory. Neural Comput 9(8) (November 1997):1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
Jiang Y, Tang S (2018) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Syst 24:355–363. https://doi.org/10.1007/s00530-017-0565-6
Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Sec Appl 50:102428. https://doi.org/10.1016/j.jisa.2019.102428
Juhong A, Purahong B, Suwan S, Pitavirooj C (2019) Biometrics Based on Facial Landmark with Application in Person Identification. In: Lhotska, L., Sukupova, L., Lacković, I., Ibbott, G. (eds) World Congress on Medical Physics and Biomedical Engineering 2018. IFMBE proceedings, vol 68/1. Springer, Singapore https://doi.org/10.1007/978-981-10-9035-6_30
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21. https://doi.org/10.1109/7384.963463
Lakshmanan S, Velliyan P, Attia A, Chalabi NE (2022) Finger knuckle pattern person authentication system based on monogenic and LPQ features. Pattern Anal Applic 25:395–407. https://doi.org/10.1007/s10044-021-01047-y
Lakshmi C, Ravi VM, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Con(dif)fused voice to convey secret: a dual-domain approach. Multimedia Syst 26:301–311. https://doi.org/10.1007/s00530-019-00644-6
Li Y, Li X, Jin X et al (2015) “An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map,” in Applications and Techniques in Information Security, vol. 557 of Communications in Computer and Information Science, pp 3–13, Springer Berlin Heidelberg, Berlin, Heidelberg, https://doi.org/10.1007/978-3-662-48683-2_1
Mosa E, Messiha NW, Zahran O, Fathi E, El-Samie A (2011) Chaotic encryption of speech signals. Int J Speech Technol 14:285–296. https://doi.org/10.1007/s10772-011-9103-7
Mostafa N Soliman F, Abdalluh M, Abd El-samie FE (2015) "Speech encryption using two dimensional chaotic maps," 2015 11th International Computer Engineering Conference (ICENCO), Cairo, pp. 235–240. https://doi.org/10.1109/ICENCO.2015.7416354
Nagakrishnan R, Revathi A (2018) “A Robust Speech Encryption System Based on DNA addition and Chaotic Maps”, 18th International Conference on Intelligent Systems Design and Applications, Volume 1, pp 1070-1080, https://doi.org/10.1007/978-3-030-16657-1_100
Nagakrishnan R, Revathi A (2020) A robust cryptosystem to enhance the security in speech based person authentication. Multimed Tools Appl 79:20795–20819. https://doi.org/10.1007/s11042-020-08846-1
Nagakrishnan R, Revathi A (2022) Generic speech based person authentication system with genuine and spoofed utterances: different feature sets and models. Multimed Tools Appl 81:1179–1208. https://doi.org/10.1007/s11042-021-11365-2
Patro KAK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Sec Appl 46:23–41. https://doi.org/10.1016/j.jisa.2019.02.006
Peacocke RD, Graf DH (1990) An introduction to speech and speaker recognition. J Comput 23(8):26–33. https://doi.org/10.1016/B978-0-08-051574-8.50057-1
Resmi P, Reshika R, Sri Madhava Raja N, Arunmozhi S, Rao VS (2021) An automated person authentication system with photo to sketch matching technique. In: Satapathy S, Zhang YD, Bhateja V, Majhi R (eds) Intelligent data engineering and analytics. Advances in intelligent systems and computing, vol 1177. Springer, Singapore. https://doi.org/10.1007/978-981-15-5679-1_63
Revathi A, Jeyalakshmi C, Thenmozhi K (2018) Digital speech watermarking to enhance the security using speech as a biometric for person authentication. Int J Speech Technol 21(4):1021–10314. https://doi.org/10.1007/s10772-018-09563-9
Revathi A, Jeyalakshmi C, Thenmozhi K (2019) Person Authentication using speech as a biometric against play back attacks. J Multimed Tools Appl 78(2):1569–1582. https://doi.org/10.1007/s11042-018-6258-0
Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio Speech Music Process 20:1–11. https://doi.org/10.1186/s13636-017-0118-0
Sathiyamurthi P, Ramakrishnan S (2022) Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimed Tools Appl 81:6331–6349. https://doi.org/10.1007/s11042-021-11757-4
Sayed WS, Tolba MF, Radwan AG, Abd-El-Hafiz SK (2018) "Speech encryption using generalized modified chaotic logistic and tent maps," 2018 IEEE International Conference on Industrial Technology (ICIT), Lyon, pp. 1526–1531. https://doi.org/10.1109/ICIT.2018.8352407
Sheela SJ, Suresh KV, Tandur D (2017, 2017) A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding. J Comput Netw Commun:1–12. https://doi.org/10.1155/2017/2721910
Sheela SJ, Suresh KV, Tandur D (2017) “Chaos based speech encryption using modified Henon map”, Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, https://doi.org/10.1109/ICECCT.2017.8117918
Singh N (2019) Voice biometric: revolution in field of security. CSI Commun 42(8):24–25
Tharwat A (2018) Classification assessment methods. Appl Comput Inf 17:168–192. https://doi.org/10.1016/j.aci.2018.08.003
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidisciplinary Journals in Science And Technology, Journal Of Selected Areas in Telecommunications (JSAT) 2:31–38
Yoo I-C, Lim H, Yook D (2015) Formant Based Robust Voice Activity Detection. IEEE/ ACM Trans Audio Speech Lang Process 23(12):2238–2224. https://doi.org/10.1109/TASLP.2015.2476762
Zhao X, Wang Y, Wang D (2014) Robust speaker identification in noisy and reverberant conditions. IEEE/ACM Trans Audio Speech Lang Process 22(4):836–845. https://doi.org/10.1109/ICASSP.2014.6854352
Code availability
The code that supports the findings of this study is available from the corresponding authors on reasonable request.
Funding
The authors want to publish a research paper in a reputable publication. This research is not supported by any funding schemes or organisations.
Author information
Authors and Affiliations
Contributions
R.Nagakrishnan and A. Revathi contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors have declared that there is no conflict of interest exists.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Nagakrishnan, R., Revathi, A. Novel secured speech communication for person authentication. Multimed Tools Appl 82, 24771–24801 (2023). https://doi.org/10.1007/s11042-022-14246-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-14246-4