Abstract
Existing biohashing authentication schemes usually store bioinformation in the cloud, whose storage method can face the problems of bioinformation leakage and tampering, and single point of failure. To address the above problems, a ciphertext speech biohashing authentication scheme based on chaotic system and improved public chain is proposed. First, the fusion features are extracted and generated with the inner product of 3D chaotic system to generate the biohashing sequence. Second, the original speech is encrypted and uploaded to the InterPlanetary file system and then, uploaded to the blockchain after the data are encrypted. Finally, the server matches the hash sequence queried on the chain with the to-be-authenticated hash at the user’s end using the Hamming distance. The experimental results show that the biohashing algorithm in this paper has better distinguishability, robustness, security and time efficiency. The key space of the speech encryption algorithm is \({2^{256}}\), which can well resist the exhaustive attack and ensure the security during speech authentication. In this paper, the combination of on-chain and off-chain storage of speech information can prevent the problem of bioinformation leakage and tampering, as well as avoiding the problem of single point of failure.

























Similar content being viewed by others
Data availability
The datasets analyzed during this study can be found at TIMIT (Texas Instruments and MIT) and TTS (Text-to-Speech).
References
Dahabiyeh L, Constantinides P (2022) Legitimating digital technologies in industry exchange fields: the case of digital signatures. Inf Organ 32(1):100392
Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157–166
Niu X-M, Jiao Y-H (2008) An overview of perceptual hashing. Acta Electon Sinica 36(7):1405
Lai Y, Jin Z, Wong K, Tistarelli M (2021) Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans Inf Forensics Secur 16:3170–3185
Prabakaran D, Shyamala R (2019) A review on performance of voice feature extraction techniques. In: 2019 3rd International Conference on Computing and Communications Technologies (ICCCT), IEEE, pp. 221–231
Ramaiah VS, Rao RR (2016) Multi-speaker activity detection using zero crossing rate. In: 2016 International Conference on Communication and Signal Processing (ICCSP), IEEE, pp. 0023–0026
Huang H, Chen X-X (2006) Speech formant frequency estimation based on hilbert-huang transform. J Zhejiang Univ Eng Sci 40(11):1926
Escola JPL, Souza UB, Cunha Brito L (2022) Discrete wavelet transform in digital audio signal processing: a case study of programming languages performance analysis. Computers Electr Eng 104:108439
Chowdhury A, Ross A (2019) Fusing MFCC and LPC features using 1d triplet CNN for speaker recognition in severely degraded audio signals. IEEE Trans Inf Forensics Secur 15:1616–1629
Liu JLH, Shao YB (2022) Language identification based on GFCC and energy operator cepstrum. J Yunnan Univ 44(2):254–261
Zhang Q-Y, Hu W-Y, Huang Y-B, Qiao S-B (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77:1555–1581
Huang Y-B, Pu X-R, Zhang Q-Y (2022) Perceptual hash secure speech authentication system based on an improved chained des in the cloud environment. Int J Net Secur 24(5):933–946
Morampudi MK, Prasad MV, Raju U (2021) Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor. Appl Intel 1:1–14
Zhang X, Liu J (2020) Multi-factor authentication protocol based on hardware fingerprint and biometrics. Netinfo Security 20(8):9–15
Li J, Zhang J (2021) A study of voice print recognition technology. In: 2021 International Wireless Communications and Mobile Computing (IWCMC), IEEE, pp. 1802–1808
Ramya S, Sheeba R, Aravind P, Gnanaprakasam S, Gokul M, Santhish S (2022) Face biometric authentication system for ATM using deep learning. In: 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp. 1446–1451
Prabakaran D, Ramachandran S (2022) Multi-factor authentication for secured financial transactions in cloud environment. CMC-Comput Mater Cont 70(1):1781–1798
Heidari H, Chalechale A (2022) Biometric authentication using a deep learning approach based on different level fusion of finger knuckle print and fingernail. Expert Syst Appl 191:116278
Chen T-F, Huang Y-B, Pu X-R, Yan S-H, Zhang Q-Y (2023) Encrypted speech biohashing authentication algorithm based on 4d hyperchaotic bao system and feature fusion. Multimed Tool Appl 82(11):16767–16792
Fu Liyu WY, Gehao Lu (2022) Overview of research and development of blockchain technology. Comput Sci 49(6A):447–461
Gorkhali A, Li L, Shrestha A (2020) Blockchain: a literature review. J Manag Anal 7(3):321–343
Jia X, Luo M, Wang H, Shen J, He D (2022) A blockchain-assisted privacy-aware authentication scheme for internet of medical things. IEEE Internet Things J 9(21):21838–21850
Wang B, Jiawei S, Wang W, Zhao P (2022) Image copyright protection based on blockchain and zero-watermark. IEEE Trans Netw Sci Eng 9(4):2188–2199
Ghimire S, Choi JY, Lee B (2019) Using blockchain for improved video integrity verification. IEEE Trans Multimed 22(1):108–121
Kumar R, Tripathi R, Marchang N, Srivastava G, Gadekallu TR, Xiong NN (2021) A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J Parallel Distrib Comput 152:128–143
Shi C, Wang H, Hu Y, Li X (2021) A novel NMF-based authentication scheme for encrypted speech in cloud computing. Multimed Tools Appl 80(17):25773–25798
Patil L.K, Popat K.A (2023) Comparative analysis of several approaches of encoding audio files. In: Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II, Springer, pp. 128–143
Abouelkheir E, El-Sherbiny S (2022) Enhancement of speech encryption/decryption process using RSA algorithm variants. Human-centric Comput Inf Sci 12
Al-Hazaimeh OM (2021) A new speech encryption algorithm based on dual shuffling hénon chaotic map. Int J Electr Comput Eng 11(3):2203
Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103:2019–2042
Kumar A, Dua M (2023) Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding. Appl Acoust 203:109196
Wang H, Zhou L, Zhang W, Liu S (2014) Watermarking-based perceptual hashing search over encrypted speech. In: Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers 12, Springer, pp. 423–434
Kaur M, Girdhar A, Kaur M (2010) Multimodal biometric system using speech and signature modalities. Int J Comput Appl 5(12):13–16
Liu Z, Cao Y, Lin K (2023) A watermarking-based authentication and recovery scheme for encrypted audio. Multimed Tools Appl 2:1–19
Zhang Q-Y, Hu W-J, Qiao S-B, Huang Y-B (2017) Speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio. Int J Netw Secur 19(5):752–760
Zhang J, Tang W (2012) A novel bounded 4d chaotic system. Nonlinear Dyn 67(4):2455–2465
Shimada I, Nagashima T (1979) A numerical approach to ergodic problem of dissipative dynamical systems. Progress Theoret Phys 61(6):1605–1616
Liu H, Luo X, Liu H, Xia X (2021) Merkle tree: a fundamental component of blockchains. In: 2021 International Conference on Electronic Information Engineering and Computer Science (EIECS), IEEE, pp. 556–561
Gan Z-H, Chai X-I, Han D-J, Chen Y-R (2019) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111–7130
Sambas A, Vaidyanathan S, Zhang X, Koyuncu I, Bonny T, Tuna M, Alçin M, Zhang S, Sulaiman IM, Awwal AM et al (2022) A novel 3d chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, FPGA implementation and its image encryption. IEEE Access 10:68057–68074
Acknowledgements
This work is supported by the Gansu Provincial Science and Technology Plan Project Grant (No. 21JR7RA120), Gansu Provincial Young Doctoral Fund Grant (2022QB-033), and the National Natural Science Foundation of China Grant (No. 61862041).
Author information
Authors and Affiliations
Contributions
YH and BW contributed to methods, system models, software, experiments, and writing original manuscript. XP and YL and QZ contributed to investigation, supervision, and writing review and editing. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interests in the publication of this paper.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Huang, Y., Wang, B., Pu, X. et al. Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. J Supercomput 80, 6661–6698 (2024). https://doi.org/10.1007/s11227-023-05693-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05693-3