Skip to main content
Log in

Multi-format speech BioHashing based on spectrogram

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to solve the security problem of speech perception hash authentication, the application scope of speech authentication algorithm, and improve the robustness, discrimination and real-time authentication in the process of authentication, a multi-format speech BioHashing algorithm based on spectrogram is proposed. Firstly, the speech signal to be processed is converted into spectrogram and feature extraction is carried out by two-dimensional discrete cosine transform. Then, the dimensionality of the eigenvector is reduced by non-negative matrix factorization, and generation of BioHashing sequences by inner product of reduced dimension eigenvectors and orthogonal normalized random matrices. Finally, the BioHashing is encrypted by equal-length scrambling using Henon chaotic map. The algorithm also validates the unidirectionality of BioHashing with trapdoor by comparative difference method. The experimental results show that the proposed algorithm has the characteristics of good security, strong robustness, high real-time performance and wide application range.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Alpar O, Krejcar O (2018) Online signature verification by spectrogram analysis. Appl Intell 48(5):1189–1199

    Google Scholar 

  2. Amin R, Biswas G P (2015) A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J Med Syst 39(8):78

    Article  Google Scholar 

  3. Awais A, Kun S, Yue Y, Hayat S, Ahmed A, Tu T (2018) Speaker recognition using mel frequency cepstral coefficient and locality sensitive hashing. In: International conference on artificial intelligence and Big data (ICAIBD). IEEE, p 2018

  4. Chen N, Wan W (2010) Robust speech hash function. ETRI J 32(2):345–347

    Article  Google Scholar 

  5. Chen N, Wan W, Xiao H -D (2010) Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorisation. IET Commun 4(14):1722–1731

    Article  MathSciNet  MATH  Google Scholar 

  6. Hammad M, Luo G, Wang K (2019) Cancelable biometric authentication system based on ecg. Multimed Tools Appl 78(2):1857–1887

    Article  Google Scholar 

  7. Huang Y-B, Zhang Q-Y (2017) Strong robustness hash algorithm of speech perception based on tensor decomposition model. J Softw Eng 11:22–31

    Article  Google Scholar 

  8. Huang Y-B, Zhang Q-Y, Hu W-J (2018) Robust speech perception hashing authentication algorithm based on spectral subtraction and multi-feature tensor. IJ Netw Secur 20(2):206–216

    Google Scholar 

  9. Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Human Comput 9(4):1061–1073

    Article  Google Scholar 

  10. Jiao Y, Ji L, Niu X (2009) Robust speech hashing for content authentication. IEEE Signal Process Lett 16(9):818–821

    Article  Google Scholar 

  11. Jin Z, Hwang JY, Lai Y-L, Kim S, Teoh ABJ (2017) Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing. IEEE Trans Inf Forensics Secur 13(2):393–407

    Article  Google Scholar 

  12. Kanak A, Sogukpinar I (2017) Biotam: a technology acceptance model for biometric authentication systems. IET Biom 6(6):457–467

    Article  Google Scholar 

  13. Kaur H, Khanna P (2018) Random slope method for generation of cancelable biometric features. Pattern Recognit Lett 126:31–40

    Article  Google Scholar 

  14. Kim H-G, Cho H-S, Kim J Y (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315–323

    Article  Google Scholar 

  15. Kumari S, Li X, Wu F, Das AK, Choo K-KR, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener Comput Syst 68:320–330

    Article  Google Scholar 

  16. Lacharme P (2013) Revisiting the accuracy of the biohashing algorithm on fingerprints. IET Biom 2(3):130–133

    Article  Google Scholar 

  17. Li J, Wu T (2015) Perceptual audio hashing using rt and dct in wavelet domain. In: 2015 11th international conference on computational intelligence and security (CIS). IEEE, pp 363–366

  18. Li J, Wang H, Jing Y (2015) Audio perceptual hashing based on nmf and mdct coefficients. Chin J Electron 24(3):579–588

    Article  Google Scholar 

  19. Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on dtcwt-dct and henon map. Appl Sci 9(4):700

    Article  Google Scholar 

  20. Lotia P, Khan D M R (2013) Significance of complementary spectral features for speaker recognition. IJRCCT 2(8):579–588

    Google Scholar 

  21. Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recognit 40(3):1057–1065

    Article  MATH  Google Scholar 

  22. Plapous C, Berrani S-A, Besset B, Rault J-B (2018) A low-complexity audio fingerprinting technique for embedded applications. Multimed Tools Appl 77(5):5929–5948

    Article  Google Scholar 

  23. Qian Q, Wang H, Sun X, Cui Y, Wang H, Shi C (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67(4):635–649

    Article  Google Scholar 

  24. Sharma M, Sharma P, Pachori RB, Gadre VM (2019) Double density dual-tree complex wavelet transform-based features for automated screening of knee-joint vibroarthrographic signals. In: Machine intelligence and signal analysis. Springer, pp 279–290

  25. Sheela S J, Suresh K V, Tandur D (2018) Image encryption based on modified henon map using hybrid chaotic shift transform. Multimed Tools Appl 77 (19):25223–25251

    Article  Google Scholar 

  26. Siddavatam I, Khatri D, Ashar P, Parekh V, Sharma T (2019) Authentication using dynamic question generation. In: Integrated intelligent computing, communication and security. Springer, pp 293–300

  27. Teoh ABJ, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recognit 41(6):2034–2044

    Article  MATH  Google Scholar 

  28. Wang N F, Jiang D X, Yang W G (2019) Dual-tree complex wavelet transform and svd-based acceleration signals denoising and its application in fault features enhancement for wind turbine. J Vib Eng Technol 7(4):311–320

    Article  Google Scholar 

  29. Wodecki J, Kruczek P, Bartkowiak A, Zimroz R, Wyłomańska A (2019) Novel method of informative frequency band selection for vibration signal using nonnegative matrix factorization of spectrogram matrix. Mech Syst Signal Process 130:585–596

    Article  Google Scholar 

  30. Xie L, Shen J, Zhu L (2016) Online cross-modal hashing for web image retrieval. In: Proceedings of the thirtieth AAAI conference on artificial intelligence (AAAI-16), pp 294–300

  31. Xie L, Zhu L, Chen G (2016) Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval. Multimed Tools Appl 75(15):9185–9204

    Article  Google Scholar 

  32. Yenigalla P, Kumar A, Tripathi S, Singh C, Kar S, Vepa J (2018) Speech emotion recognition using spectrogram & phoneme embedding. In: Interspeech, pp 3688–3692

  33. Zhang Q, Xing P, Huang Y, Dong R, Yang Z-P (2015) An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J Inf Hiding Multimed Signal Process 6(2):311–322

    Google Scholar 

  34. Zhang Q, Hu W, Qiao S, Zhang T (2016) An efficient speech perception hash authentication algorithm based on the linear prediction minimum mean squared error. J Huazhong Univ Sci Technol (Nat Sci Edition) 44(12):127–132

    Google Scholar 

  35. Zhang Q-Y, Xing P-F, Huang Y-B, Dong R-H, Yang R-H (2016) Perception hashing algorithm for multi-format audio. J Beijing Univ Posts Telecommun 39(4):77–82

    Google Scholar 

  36. Zhang Q, Qiao S, Zhang T, Huang Y (2017) Perception hashing authentication algorithm for multi-format audio based on energy to zero ratio. J Huazhong Univ Sci Technol (Nat Sci Ed) 45(9):33–38

    Google Scholar 

  37. Zhang Q, Qiao S, Zhang T, Huang Y (2017) A fast speech feature extraction method based on perceptual hashing. In: 2017 13th International conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE, pp 1295–1300

  38. Zhang C, Zhu L, Xu C (2017) Ptbi: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67

    Article  Google Scholar 

  39. Zhang Q-Y, Ge Z-X, Qiao S-B (2018) An efficient retrieval method of encrypted speech based on frequency band variance. J Inf Hiding Multimed Signal Process 9:1452–1463, 11

    Google Scholar 

  40. Zhang Q, Hu W, Huang Y, Qiao S (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1555–1581

    Article  Google Scholar 

  41. Zhang Q, Qiao S, Huang Y, Zhang T (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653–21669

    Article  Google Scholar 

  42. Zhang Q, Xing P, Huang Y, Dong R, Yang Z (2018) An efficient speech perceptual hashing authentication algorithm based on dwt and symmetric ternary string. Int J Inf Commun Technol 12(1–2):31–50

    Google Scholar 

  43. Zhang X, Zhang J, He T, Chen Y, Shen Y, Xu X (2018) A speech and lip authentication system based on android smart phone. In: Proceedings of the 6th international conference on information technology: iot and smart city. ACM, pp 110–114

  44. Zhang Q, Zhang T, Wu D-F, Ge Z-X (2018) Strong robust speech authentication algorithm based on quasi-harmonic model. J Huazhong Univ Sci Technol (Nat Sci Ed) 46(3):58–64

    Google Scholar 

  45. Zhang Q, Zhang T, Qiao S-B, Wu D-F (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. Int J Netw Secur 21 (2):259–268

    Google Scholar 

  46. Zhu L, Shen J, Xie L (2017) Unsupervised visual hashing with semantic assistant for content-based image retrieval. IEEE Trans Knowl Data Eng 29(2):472–486

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China(No.61862041), Youth Science and Technology Fund of Gansu Province of China(No.1606RJYA274).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-bo Huang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Yb., Wang, Y., Zhang, Qy. et al. Multi-format speech BioHashing based on spectrogram. Multimed Tools Appl 79, 24889–24909 (2020). https://doi.org/10.1007/s11042-020-09211-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09211-y

Keywords

Navigation