Skip to main content
Log in

Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Existing biohashing authentication schemes usually store bioinformation in the cloud, whose storage method can face the problems of bioinformation leakage and tampering, and single point of failure. To address the above problems, a ciphertext speech biohashing authentication scheme based on chaotic system and improved public chain is proposed. First, the fusion features are extracted and generated with the inner product of 3D chaotic system to generate the biohashing sequence. Second, the original speech is encrypted and uploaded to the InterPlanetary file system and then, uploaded to the blockchain after the data are encrypted. Finally, the server matches the hash sequence queried on the chain with the to-be-authenticated hash at the user’s end using the Hamming distance. The experimental results show that the biohashing algorithm in this paper has better distinguishability, robustness, security and time efficiency. The key space of the speech encryption algorithm is \({2^{256}}\), which can well resist the exhaustive attack and ensure the security during speech authentication. In this paper, the combination of on-chain and off-chain storage of speech information can prevent the problem of bioinformation leakage and tampering, as well as avoiding the problem of single point of failure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

Data availability

The datasets analyzed during this study can be found at TIMIT (Texas Instruments and MIT) and TTS (Text-to-Speech).

References

  1. Dahabiyeh L, Constantinides P (2022) Legitimating digital technologies in industry exchange fields: the case of digital signatures. Inf Organ 32(1):100392

    Article  Google Scholar 

  2. Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157–166

    Article  Google Scholar 

  3. Niu X-M, Jiao Y-H (2008) An overview of perceptual hashing. Acta Electon Sinica 36(7):1405

    Google Scholar 

  4. Lai Y, Jin Z, Wong K, Tistarelli M (2021) Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans Inf Forensics Secur 16:3170–3185

    Article  Google Scholar 

  5. Prabakaran D, Shyamala R (2019) A review on performance of voice feature extraction techniques. In: 2019 3rd International Conference on Computing and Communications Technologies (ICCCT), IEEE, pp. 221–231

  6. Ramaiah VS, Rao RR (2016) Multi-speaker activity detection using zero crossing rate. In: 2016 International Conference on Communication and Signal Processing (ICCSP), IEEE, pp. 0023–0026

  7. Huang H, Chen X-X (2006) Speech formant frequency estimation based on hilbert-huang transform. J Zhejiang Univ Eng Sci 40(11):1926

    Google Scholar 

  8. Escola JPL, Souza UB, Cunha Brito L (2022) Discrete wavelet transform in digital audio signal processing: a case study of programming languages performance analysis. Computers Electr Eng 104:108439

    Article  Google Scholar 

  9. Chowdhury A, Ross A (2019) Fusing MFCC and LPC features using 1d triplet CNN for speaker recognition in severely degraded audio signals. IEEE Trans Inf Forensics Secur 15:1616–1629

    Article  Google Scholar 

  10. Liu JLH, Shao YB (2022) Language identification based on GFCC and energy operator cepstrum. J Yunnan Univ 44(2):254–261

    Google Scholar 

  11. Zhang Q-Y, Hu W-Y, Huang Y-B, Qiao S-B (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77:1555–1581

    Article  Google Scholar 

  12. Huang Y-B, Pu X-R, Zhang Q-Y (2022) Perceptual hash secure speech authentication system based on an improved chained des in the cloud environment. Int J Net Secur 24(5):933–946

    Google Scholar 

  13. Morampudi MK, Prasad MV, Raju U (2021) Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor. Appl Intel 1:1–14

    Google Scholar 

  14. Zhang X, Liu J (2020) Multi-factor authentication protocol based on hardware fingerprint and biometrics. Netinfo Security 20(8):9–15

    Google Scholar 

  15. Li J, Zhang J (2021) A study of voice print recognition technology. In: 2021 International Wireless Communications and Mobile Computing (IWCMC), IEEE, pp. 1802–1808

  16. Ramya S, Sheeba R, Aravind P, Gnanaprakasam S, Gokul M, Santhish S (2022) Face biometric authentication system for ATM using deep learning. In: 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp. 1446–1451

  17. Prabakaran D, Ramachandran S (2022) Multi-factor authentication for secured financial transactions in cloud environment. CMC-Comput Mater Cont 70(1):1781–1798

    Google Scholar 

  18. Heidari H, Chalechale A (2022) Biometric authentication using a deep learning approach based on different level fusion of finger knuckle print and fingernail. Expert Syst Appl 191:116278

    Article  Google Scholar 

  19. Chen T-F, Huang Y-B, Pu X-R, Yan S-H, Zhang Q-Y (2023) Encrypted speech biohashing authentication algorithm based on 4d hyperchaotic bao system and feature fusion. Multimed Tool Appl 82(11):16767–16792

    Article  Google Scholar 

  20. Fu Liyu WY, Gehao Lu (2022) Overview of research and development of blockchain technology. Comput Sci 49(6A):447–461

    Google Scholar 

  21. Gorkhali A, Li L, Shrestha A (2020) Blockchain: a literature review. J Manag Anal 7(3):321–343

    Google Scholar 

  22. Jia X, Luo M, Wang H, Shen J, He D (2022) A blockchain-assisted privacy-aware authentication scheme for internet of medical things. IEEE Internet Things J 9(21):21838–21850

    Article  Google Scholar 

  23. Wang B, Jiawei S, Wang W, Zhao P (2022) Image copyright protection based on blockchain and zero-watermark. IEEE Trans Netw Sci Eng 9(4):2188–2199

    Article  Google Scholar 

  24. Ghimire S, Choi JY, Lee B (2019) Using blockchain for improved video integrity verification. IEEE Trans Multimed 22(1):108–121

    Article  Google Scholar 

  25. Kumar R, Tripathi R, Marchang N, Srivastava G, Gadekallu TR, Xiong NN (2021) A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J Parallel Distrib Comput 152:128–143

    Article  Google Scholar 

  26. Shi C, Wang H, Hu Y, Li X (2021) A novel NMF-based authentication scheme for encrypted speech in cloud computing. Multimed Tools Appl 80(17):25773–25798

    Article  Google Scholar 

  27. Patil L.K, Popat K.A (2023) Comparative analysis of several approaches of encoding audio files. In: Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II, Springer, pp. 128–143

  28. Abouelkheir E, El-Sherbiny S (2022) Enhancement of speech encryption/decryption process using RSA algorithm variants. Human-centric Comput Inf Sci 12

  29. Al-Hazaimeh OM (2021) A new speech encryption algorithm based on dual shuffling hénon chaotic map. Int J Electr Comput Eng 11(3):2203

    Google Scholar 

  30. Naskar PK, Bhattacharyya S, Chaudhuri A (2021) An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn 103:2019–2042

    Article  Google Scholar 

  31. Kumar A, Dua M (2023) Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding. Appl Acoust 203:109196

    Article  Google Scholar 

  32. Wang H, Zhou L, Zhang W, Liu S (2014) Watermarking-based perceptual hashing search over encrypted speech. In: Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers 12, Springer, pp. 423–434

  33. Kaur M, Girdhar A, Kaur M (2010) Multimodal biometric system using speech and signature modalities. Int J Comput Appl 5(12):13–16

    Google Scholar 

  34. Liu Z, Cao Y, Lin K (2023) A watermarking-based authentication and recovery scheme for encrypted audio. Multimed Tools Appl 2:1–19

    CAS  Google Scholar 

  35. Zhang Q-Y, Hu W-J, Qiao S-B, Huang Y-B (2017) Speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio. Int J Netw Secur 19(5):752–760

    Google Scholar 

  36. Zhang J, Tang W (2012) A novel bounded 4d chaotic system. Nonlinear Dyn 67(4):2455–2465

    Article  MathSciNet  Google Scholar 

  37. Shimada I, Nagashima T (1979) A numerical approach to ergodic problem of dissipative dynamical systems. Progress Theoret Phys 61(6):1605–1616

    Article  MathSciNet  ADS  Google Scholar 

  38. Liu H, Luo X, Liu H, Xia X (2021) Merkle tree: a fundamental component of blockchains. In: 2021 International Conference on Electronic Information Engineering and Computer Science (EIECS), IEEE, pp. 556–561

  39. Gan Z-H, Chai X-I, Han D-J, Chen Y-R (2019) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111–7130

    Article  Google Scholar 

  40. Sambas A, Vaidyanathan S, Zhang X, Koyuncu I, Bonny T, Tuna M, Alçin M, Zhang S, Sulaiman IM, Awwal AM et al (2022) A novel 3d chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, FPGA implementation and its image encryption. IEEE Access 10:68057–68074

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Gansu Provincial Science and Technology Plan Project Grant (No. 21JR7RA120), Gansu Provincial Young Doctoral Fund Grant (2022QB-033), and the National Natural Science Foundation of China Grant (No. 61862041).

Author information

Authors and Affiliations

Authors

Contributions

YH and BW contributed to methods, system models, software, experiments, and writing original manuscript. XP and YL and QZ contributed to investigation, supervision, and writing review and editing. All authors reviewed the manuscript.

Corresponding author

Correspondence to Yibo Huang.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interests in the publication of this paper.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Y., Wang, B., Pu, X. et al. Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. J Supercomput 80, 6661–6698 (2024). https://doi.org/10.1007/s11227-023-05693-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05693-3

Keywords

Navigation