Abstract
In order to satisfy the requirements of retrieval time-efficiency and security for encrypted speech data retrieval in the cloud environment, and to improve the impact of noise on the robustness and discrimination for the speech perceptual hashing scheme, an encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction is proposed in this paper. The speech owner first processes the original speech file by pre-processing, framing, and adding window. The features of the original speech file is extracted by Chirp-Z transform combined with the sparse random matrix to construct a hash sequence. Then encrypt the original speech file based on the m sequence and upload it to the cloud to ensure the security of information. By processing the speech perceptual hashing feature, the speech features are re-extracted, and the speech is evenly classified by k-means clustering technique. The binary string of several hundred bits is converted into a decimal number. Finally, the second feature is stored in system hash index table of the cloud. When the user retrieves, the query speech is denoised and the hash sequence is extracted. Then the secondary features of the hash sequence are extracted and matched with the encrypted speech features in the cloud system hash index table to obtain the retrieval result. The experimental results show that the proposed algorithm greatly compresses the information capacity of speech features, significantly improves the retrieval time-efficiency, with strong robustness and discrimination, and has a good retrieval effect on noisy speech.
Similar content being viewed by others
References
Goli-Malekabadi Z, Sargolzaei-Javan M, Akbari MK (2016) An effective model for store and retrieve big health data in cloud computing. Comput Methods Prog Biomed 132:75–82. https://doi.org/10.1016/j.cmpb.2016.04.016
Thangavel M, Varalakshmi P, Renganayaki S, Subhapriya GR, Preethi T, Zeenath Banu A (2016) SMCSRC—secure multimedia content storage and retrieval in cloud. In: 2016 international conference on International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp 1–6. https://doi.org/10.1109/ICRTIT.2016.7569581
Zhang Y (2016) Research on speech verification for mobile devices. ME, Harbin Institute of Technology (in Chinese), Harbin, China
Wang H, Zhou L, Zhang W, Liu S (2013) Watermarking-based perceptual hashing search over encrypted speech. In: International workshop on digital watermarking. Springer Berlin Heidelberg, pp 423–434. https://doi.org/10.1007/978-3-662-43886-2_3
Zhang X, Wang Y, Zeng Z, Niu B (2015) An efficient filtering-and-refining retrieval method for big audio data. J Comput Res Dev (in Chinese) 52(9):2025–2032. https://doi.org/10.7544/issn1000-1239.2015.20140694
Chen N, Xiao HD, Zhu J (2014) Robust audio fingerprinting based on GammaChirp frequency cepstral coefficients and chroma. Electron Lett 50(4):241–242. https://doi.org/10.1049/el.2013.3554
Lotia P, Khan DM (2013) Significance of complementary spectral features for speaker recognition. IJRCCT 2(8):579–588
Li J, Wu T, Wang H (2015) Perceptual hashing based on the correlation coefficient of MFCC for speech authentication. J Beijing Univ Posts Telecommun 38(2):89–93. https://doi.org/10.13190/j.jbupt.2015.02.016
Zhang QY, Xing PF, Huang YB, Dou RH, Yang ZP (2016) Perceptual hashing algorithm for multi-format. J Beijing Univ Posts Telecommun 39(4):77–82. https://doi.org/10.13190/j.jbupt.2016.04.015
Bagwe GR, Apsingekar DS, Gandhare S, Pawar S (2016) Voice encryption and decryption in telecommunication. In: 2016 international conference on International Conference on Communication and Signal Processing (ICCSP). IEEE, pp 1790–1793. https://doi.org/10.1109/ICCSP.2016.7754475
Yue P, Guodong L, Jing Z (2016) Based on the improved RSA keys and compound chaotic system and design of audio encryption algorithm. In: 2016 international conference on International Conference on Smart City and Systems Engineering (ICSCSE). IEEE, pp 197–201. https://doi.org/10.1109/ICSCSE.2016.0061
Hermassi H, Hamdi M, Rhouma R, Belghith SM (2017) A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map. Multimed Tools Appl 76(1):1177–1200. https://doi.org/10.1007/s11042-015-3030-6
Li WJ (2014) A study of encryption technology based on the analog voice. ME, Xidian University (in Chinese), Xian, China
Nair UR, Birajdar GK (2016) A secure audio watermarking employing AES technique. In: 2016 nternational conference on International Conference on Inventive Computation Technologies (ICICT). IEEE, vol 3, pp 1–5. https://doi.org/10.1109/INVENTIVE.2016.7830133
Shen ZR, Xue W, Shu JW (2014) Survey on the research and development of searchable encryption schemes. J Softw (in Chinese) 25(4):880–895. https://doi.org/10.13328/j.cnki.jos.004554
Li Z, Zhao M, Jiang H, Xu QL (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68. https://doi.org/10.1504/IJHPCN.2019.099744
Zhao M, Jiang H, Li Z, Xu QL, Wang H, Li SJ (2019) An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. Int J High Perform Comput Netw 12(2):179–190. https://doi.org/10.1504/IJHPCN.2018.094368
Lagendijk RL, Erkin Z, Barni M (2013) Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process Mag 30(1):82–105. https://doi.org/10.1109/MSP.2012.2219653
Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27–40. https://doi.org/10.4018/IJCAC.2017040103
Zkik K, Orhanou G, El Hajji S (2017) Secure mobile multi cloud architecture for authentication and data storage. Int J Cloud Appl Comput (IJCAC) 7(2):62–76. https://doi.org/10.4018/IJCAC.2017040105
Vavrek J, Viszlay P, Lojka M, Juhár J, Pleva M (2018) Weighted fast sequential DTW for multilingual audio query-by-example retrieval. J Intell Inf Syst 51(2):439–455. https://doi.org/10.1007/s10844-018-0499-2
Zhang K, Zhang G, Jiang C, Yang YS (2016) Research and implementation of security cipher-text clustered index based on B+ tree. In: 2016 International conference on International Conference on Network and Information Systems for Computers (ICNISC). IEEE, pp 274–278. https://doi.org/10.1109/ICNISC.2016.067
Yao S, Niu B, Liu J (2016) A sampling and counting method for big audio retrieval. In: 2016 second international conference on multimedia big data (BigMM). IEEE, pp 307–313. https://doi.org/10.1109/BigMM.2016.27
Su JH, Wang CY, Chiu TW, Ying JJC, Tseng VS (2014) Semantic content-based music retrieval using audio and fuzzy-music-sense features. In: 2014 international conference on Granular Computing (GrC). IEEE, pp 259–264. https://doi.org/10.1109/GRC.2014.6982846
Huang Z, Weng C, Li K, Cheng YC, Lee CH (2014) Deep learning vector quantization for acoustic information retrieval. In: 2014 International conference on International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1350–1354. https://doi.org/10.1109/ICASSP.2014.6853817
Wang W, Yang X, Ooi BC, Zhang DX, Zhuang YT (2016) Effective deep learning-based multi-modal retrieval. VLDB J Int J Very Large Data Bases 25(1):79–101. https://doi.org/10.1007/s00778-015-0391-4
Ibrahim A, Jin H, Yassin AA, Jin H, Zou DQ (2012) Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In 2012 IEEE Asia-Pacific services computing conference. IEEE, pp 263–270. https://doi.org/10.1109/APSCC.2012.59
Wang HX, Hao GY (2015) Perceptual hashing algorithm based on time and frequency domain change characteristics. China Patent, CN2015102405844, 2015-08-12
Lin L (2015) Study on retrieval for encrypted speech and recovery watermarking-based speech authentication. ME, Southwest Jiaotong University (in Chinese), Chengdu, China
Zhao H, He SF (2016) A retrieval algorithm for encrypted speech based on perceptual hashing. In: 2016 12th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE, pp 1840–1845. https://doi.org/10.1109/FSKD.2016.7603458
He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703–718. https://doi.org/10.2298/CSIS170112024H
Glackin C, Chollet G, Dugan N, Cannings N, Wall J, Tahir S, Ray IG, Rajarajan M (2017) Privacy preserving encrypted phonetic search of speech data. In: 2017 International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 6414–6418. https://doi.org/10.1109/ICASSP.2017.7953391
Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825–17846. https://doi.org/10.1007/s11042-019-7180-9
Qiao G, Qiang X, Wan L, Xiao YZ (2018) Chirp Z-transform based sparse channel estimation for underwater acoustic OFDM in clustered channels. In: OCEANS 2018 MTS/IEEE Charleston. IEEE, pp 1–6. https://doi.org/10.1109/OCEANS.2018.8604692
Brown S, Johnson O, Tassi A (2018) Reliability of broadcast communications under sparse random linear network coding. IEEE Trans Veh Technol 67(5):4677–4682. https://doi.org/10.1109/TVT.2018.2790436
Bao T, Li Y, Xu K, Wang YH, Hu W (2018) An improved endpoint detection algorithm based on improved spectral subtraction with multi-taper spectrum and energy-zero ratio. In: International conference on intelligent computing. Springer, pp 266–275. https://doi.org/10.1007/978-3-319-95930-6_25
Huang Z, Liu J (2018) Optimal differentially private algorithms for k-means clustering. In: Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI symposium on principles of database systems. ACM, pp 395–408. https://doi.org/10.1145/3196959.3196977
Acknowledgments
This work is supported by the National Natural Science Foundation of China (No. 61862041, 61363078). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, Qy., Ge, Zx., Hu, Yj. et al. An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction. Multimed Tools Appl 79, 6337–6361 (2020). https://doi.org/10.1007/s11042-019-08450-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08450-y