Skip to main content
Log in

An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to satisfy the requirements of retrieval time-efficiency and security for encrypted speech data retrieval in the cloud environment, and to improve the impact of noise on the robustness and discrimination for the speech perceptual hashing scheme, an encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction is proposed in this paper. The speech owner first processes the original speech file by pre-processing, framing, and adding window. The features of the original speech file is extracted by Chirp-Z transform combined with the sparse random matrix to construct a hash sequence. Then encrypt the original speech file based on the m sequence and upload it to the cloud to ensure the security of information. By processing the speech perceptual hashing feature, the speech features are re-extracted, and the speech is evenly classified by k-means clustering technique. The binary string of several hundred bits is converted into a decimal number. Finally, the second feature is stored in system hash index table of the cloud. When the user retrieves, the query speech is denoised and the hash sequence is extracted. Then the secondary features of the hash sequence are extracted and matched with the encrypted speech features in the cloud system hash index table to obtain the retrieval result. The experimental results show that the proposed algorithm greatly compresses the information capacity of speech features, significantly improves the retrieval time-efficiency, with strong robustness and discrimination, and has a good retrieval effect on noisy speech.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Goli-Malekabadi Z, Sargolzaei-Javan M, Akbari MK (2016) An effective model for store and retrieve big health data in cloud computing. Comput Methods Prog Biomed 132:75–82. https://doi.org/10.1016/j.cmpb.2016.04.016

    Article  Google Scholar 

  2. Thangavel M, Varalakshmi P, Renganayaki S, Subhapriya GR, Preethi T, Zeenath Banu A (2016) SMCSRC—secure multimedia content storage and retrieval in cloud. In: 2016 international conference on International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp 1–6. https://doi.org/10.1109/ICRTIT.2016.7569581

  3. Zhang Y (2016) Research on speech verification for mobile devices. ME, Harbin Institute of Technology (in Chinese), Harbin, China

  4. Wang H, Zhou L, Zhang W, Liu S (2013) Watermarking-based perceptual hashing search over encrypted speech. In: International workshop on digital watermarking. Springer Berlin Heidelberg, pp 423–434. https://doi.org/10.1007/978-3-662-43886-2_3

  5. Zhang X, Wang Y, Zeng Z, Niu B (2015) An efficient filtering-and-refining retrieval method for big audio data. J Comput Res Dev (in Chinese) 52(9):2025–2032. https://doi.org/10.7544/issn1000-1239.2015.20140694

    Article  Google Scholar 

  6. Chen N, Xiao HD, Zhu J (2014) Robust audio fingerprinting based on GammaChirp frequency cepstral coefficients and chroma. Electron Lett 50(4):241–242. https://doi.org/10.1049/el.2013.3554

    Article  Google Scholar 

  7. Lotia P, Khan DM (2013) Significance of complementary spectral features for speaker recognition. IJRCCT 2(8):579–588

    Google Scholar 

  8. Li J, Wu T, Wang H (2015) Perceptual hashing based on the correlation coefficient of MFCC for speech authentication. J Beijing Univ Posts Telecommun 38(2):89–93. https://doi.org/10.13190/j.jbupt.2015.02.016

    Article  Google Scholar 

  9. Zhang QY, Xing PF, Huang YB, Dou RH, Yang ZP (2016) Perceptual hashing algorithm for multi-format. J Beijing Univ Posts Telecommun 39(4):77–82. https://doi.org/10.13190/j.jbupt.2016.04.015

    Article  Google Scholar 

  10. Bagwe GR, Apsingekar DS, Gandhare S, Pawar S (2016) Voice encryption and decryption in telecommunication. In: 2016 international conference on International Conference on Communication and Signal Processing (ICCSP). IEEE, pp 1790–1793. https://doi.org/10.1109/ICCSP.2016.7754475

  11. Yue P, Guodong L, Jing Z (2016) Based on the improved RSA keys and compound chaotic system and design of audio encryption algorithm. In: 2016 international conference on International Conference on Smart City and Systems Engineering (ICSCSE). IEEE, pp 197–201. https://doi.org/10.1109/ICSCSE.2016.0061

  12. Hermassi H, Hamdi M, Rhouma R, Belghith SM (2017) A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map. Multimed Tools Appl 76(1):1177–1200. https://doi.org/10.1007/s11042-015-3030-6

    Article  Google Scholar 

  13. Li WJ (2014) A study of encryption technology based on the analog voice. ME, Xidian University (in Chinese), Xian, China

  14. Nair UR, Birajdar GK (2016) A secure audio watermarking employing AES technique. In: 2016 nternational conference on International Conference on Inventive Computation Technologies (ICICT). IEEE, vol 3, pp 1–5. https://doi.org/10.1109/INVENTIVE.2016.7830133

  15. Shen ZR, Xue W, Shu JW (2014) Survey on the research and development of searchable encryption schemes. J Softw (in Chinese) 25(4):880–895. https://doi.org/10.13328/j.cnki.jos.004554

    Article  MATH  Google Scholar 

  16. Li Z, Zhao M, Jiang H, Xu QL (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68. https://doi.org/10.1504/IJHPCN.2019.099744

    Article  Google Scholar 

  17. Zhao M, Jiang H, Li Z, Xu QL, Wang H, Li SJ (2019) An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. Int J High Perform Comput Netw 12(2):179–190. https://doi.org/10.1504/IJHPCN.2018.094368

    Article  Google Scholar 

  18. Lagendijk RL, Erkin Z, Barni M (2013) Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process Mag 30(1):82–105. https://doi.org/10.1109/MSP.2012.2219653

    Article  Google Scholar 

  19. Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27–40. https://doi.org/10.4018/IJCAC.2017040103

    Article  Google Scholar 

  20. Zkik K, Orhanou G, El Hajji S (2017) Secure mobile multi cloud architecture for authentication and data storage. Int J Cloud Appl Comput (IJCAC) 7(2):62–76. https://doi.org/10.4018/IJCAC.2017040105

    Article  Google Scholar 

  21. Vavrek J, Viszlay P, Lojka M, Juhár J, Pleva M (2018) Weighted fast sequential DTW for multilingual audio query-by-example retrieval. J Intell Inf Syst 51(2):439–455. https://doi.org/10.1007/s10844-018-0499-2

    Article  Google Scholar 

  22. Zhang K, Zhang G, Jiang C, Yang YS (2016) Research and implementation of security cipher-text clustered index based on B+ tree. In: 2016 International conference on International Conference on Network and Information Systems for Computers (ICNISC). IEEE, pp 274–278. https://doi.org/10.1109/ICNISC.2016.067

  23. Yao S, Niu B, Liu J (2016) A sampling and counting method for big audio retrieval. In: 2016 second international conference on multimedia big data (BigMM). IEEE, pp 307–313. https://doi.org/10.1109/BigMM.2016.27

  24. Su JH, Wang CY, Chiu TW, Ying JJC, Tseng VS (2014) Semantic content-based music retrieval using audio and fuzzy-music-sense features. In: 2014 international conference on Granular Computing (GrC). IEEE, pp 259–264. https://doi.org/10.1109/GRC.2014.6982846

  25. Huang Z, Weng C, Li K, Cheng YC, Lee CH (2014) Deep learning vector quantization for acoustic information retrieval. In: 2014 International conference on International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1350–1354. https://doi.org/10.1109/ICASSP.2014.6853817

  26. Wang W, Yang X, Ooi BC, Zhang DX, Zhuang YT (2016) Effective deep learning-based multi-modal retrieval. VLDB J Int J Very Large Data Bases 25(1):79–101. https://doi.org/10.1007/s00778-015-0391-4

    Article  Google Scholar 

  27. Ibrahim A, Jin H, Yassin AA, Jin H, Zou DQ (2012) Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In 2012 IEEE Asia-Pacific services computing conference. IEEE, pp 263–270. https://doi.org/10.1109/APSCC.2012.59

  28. Wang HX, Hao GY (2015) Perceptual hashing algorithm based on time and frequency domain change characteristics. China Patent, CN2015102405844, 2015-08-12

  29. Lin L (2015) Study on retrieval for encrypted speech and recovery watermarking-based speech authentication. ME, Southwest Jiaotong University (in Chinese), Chengdu, China

  30. Zhao H, He SF (2016) A retrieval algorithm for encrypted speech based on perceptual hashing. In: 2016 12th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE, pp 1840–1845. https://doi.org/10.1109/FSKD.2016.7603458

  31. He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703–718. https://doi.org/10.2298/CSIS170112024H

    Article  Google Scholar 

  32. Glackin C, Chollet G, Dugan N, Cannings N, Wall J, Tahir S, Ray IG, Rajarajan M (2017) Privacy preserving encrypted phonetic search of speech data. In: 2017 International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 6414–6418. https://doi.org/10.1109/ICASSP.2017.7953391

  33. Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825–17846. https://doi.org/10.1007/s11042-019-7180-9

    Article  Google Scholar 

  34. Qiao G, Qiang X, Wan L, Xiao YZ (2018) Chirp Z-transform based sparse channel estimation for underwater acoustic OFDM in clustered channels. In: OCEANS 2018 MTS/IEEE Charleston. IEEE, pp 1–6. https://doi.org/10.1109/OCEANS.2018.8604692

  35. Brown S, Johnson O, Tassi A (2018) Reliability of broadcast communications under sparse random linear network coding. IEEE Trans Veh Technol 67(5):4677–4682. https://doi.org/10.1109/TVT.2018.2790436

    Article  Google Scholar 

  36. Bao T, Li Y, Xu K, Wang YH, Hu W (2018) An improved endpoint detection algorithm based on improved spectral subtraction with multi-taper spectrum and energy-zero ratio. In: International conference on intelligent computing. Springer, pp 266–275. https://doi.org/10.1007/978-3-319-95930-6_25

  37. Huang Z, Liu J (2018) Optimal differentially private algorithms for k-means clustering. In: Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI symposium on principles of database systems. ACM, pp 395–408. https://doi.org/10.1145/3196959.3196977

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. 61862041, 61363078). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiu-yu Zhang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Qy., Ge, Zx., Hu, Yj. et al. An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction. Multimed Tools Appl 79, 6337–6361 (2020). https://doi.org/10.1007/s11042-019-08450-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08450-y

Keywords

Navigation