Skip to main content
Log in

Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The existing speech authentication algorithms hash extracted speech features directly and saved them to the cloud, which is easy to cause speech feature leakage. In the process of constructing hashing, the utilization efficiency of speech feature is poor, and the short hashing sequence will lead to the lack of discrimination of hashing sequence and the deviation of authentication. In order to solve the above problems, a long sequence biometric hashing authentication algorithm based on two-dimensional Sine ICMI Cmodulation map (2D-SIMM) and constant Q cepstral coefficients (CQCC) cosine was proposed. First, this algorithm extracts the CQCC of the speech signal, then obtains the eigenvalue of the space cosine distance of the adjacent speech frame CQCC, and finally performs projection mapping between the eigenvalue and the pseudorandom matrix generated by 2D-SIMM to construct a biometric hashing sequence. This paper evaluates the proposed robust feature schemes of MFCC and CQCC space cosine distance through experiments. The experimental results show that CQCC spatial distance combined with 2D-SIMM biometrics characteristics can reach \(10^{-21}\). when the threshold is 0.35. The BER mean was only 0.0383 for maintaining the robustness of operation for different contents. When the SNR is -5 dB, the matching rate of different noises can reach 45%. At the same time, it also improves the security of the biological template, and the overall performance is greatly improved compared with the existing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Abdullahi SM, Wang H, Li T (2020) Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans Inf Forensics Secur 15:2587–2601

    Article  Google Scholar 

  2. Anjith G, Zohreh M, David G, Olegs N, André A, Sébastien M (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 15:42–55

    Google Scholar 

  3. Atighehchi K, Ghammam L, Barbier M, Rosenberger C (2019) Greychashing: combining biometrics and secret for enhancing the security of protected templates. Futur Gener Comput Syst

  4. Boujelben Ons, Bahoura Mohammed (2018) Efficient fpga-based architecture of an automatic wheeze detector using a combination of mfcc and svm algorithms. J Syst Archit 88:54–64

    Article  Google Scholar 

  5. Cao D, Gao X, Gao L (2017) An improved endpoint detection algorithm based on mfcc cosine value. Wirel Pers Commun 95(3):2073–2090

    Article  MathSciNet  Google Scholar 

  6. Chang D, Garg S, Hasan M, Mishra S (2020) Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption. IEEE Trans Inform Forensics Secur PP(99):1–1

    Google Scholar 

  7. Chen Y, Wo Y, Xie R, Chudan W, Han G (2019) Deep secure quantization: On secure biometric hashing against similarity-based attacks. Signal Process 154:314–323

    Article  Google Scholar 

  8. Deng M, Meng T, Cao J, Wang S, Zhang J, Fan H (2020) Heart sound classification based on improved mfcc features and convolutional recurrent neural networks. Neural Netw 130:22–32

    Article  Google Scholar 

  9. Dexing Z, Huikai S, Du X (2019) A hand-based multi-biometrics via deep hashing network and biometric graph matching. IEEE Trans Inform Forensics Secur 14(12):3140–3150

    Article  Google Scholar 

  10. Gomez-Barrero M, Fierrez J, Galbally J, Maiorana E, Campisi P (2016) Implementation of fixed-length template protection based on homomorphic encryption with application to signature biometrics. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 191–198

  11. Hamd MH, Mohammed MY (2019) Multimodal biometric system based face-iris feature level fusion. Int J Mod Educ Comput Sci 11(5):1–9

    Article  Google Scholar 

  12. Huang Y-B, Zhang Q-Y, Yuan Z-T, Yang Z-P (2015) The hash algorithm of speech perception based on the integration of adaptive mfcc and lpcc. J Huazhong Univ Sci Technol (Natural Science Edition) (in Chinese) (02):124–128

  13. Huang Yi-bo, Wang Yong, Zhang Qiu-yu, Zhang Wei-zhao, Fan Man-hong (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79(33):24889–24909

    Article  Google Scholar 

  14. Jami SK, Chalamala SR, Jindal AK (2019) Biometric template protection through adversarial learning. In: 2019 IEEE international conference on consumer electronics (ICCE). IEEE, pp 1–6

  15. Jiang Y, Chunxue W, Deng K, Yan W (2019) An audio fingerprinting extraction algorithm based on lifting wavelet packet and improved optimal-basis selection. Multimed Tools Appl 78(21):30011–30025

    Article  Google Scholar 

  16. Jin-feng L, Wu T, Hong-xia W (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. J Beijing Univ Posts Telecommun 02:89–93

    Google Scholar 

  17. Jin-feng L, Wu T, Hong-xia W (2015) Perceptual hashing based on nmf and mdct coefficients. Chin J Electron (in Chinese) 03:579–583

    Google Scholar 

  18. Khurshid M, Selwal A (2020) A novel block hashing-based template security scheme for multimodal biometric system. In: Decision analytics applications in industry. Springer, pp 173–183

  19. Kim H-G, Cho H-S, Kim JY (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315–323

    Article  Google Scholar 

  20. Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and minhash. Multimed Tools Appl: 1–25

  21. Lifang W, Yukun M, Peng Z, Weishi Z (2016) Review of biometric template protection. Chin J Entific Instrum

  22. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  23. Nguyen TAT, Dang TK, Nguyen DT (2019) A new biometric template protection using random orthonormal projection and fuzzy commitment. In International Conference on Ubiquitous Information Management and Communication, pages 723–733. Springer

  24. Nitin K, Manisha R (2020) Rp-lpp: a random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(3):2363–2381

    Google Scholar 

  25. Qiu-Yu Z, Hu W-J, Yi-bo H, Si-bin Q (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1555–1581

    Article  Google Scholar 

  26. Qiu-yu Z, Liang Z, Tao Z, Deng-hai Z (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825–17846

    Article  Google Scholar 

  27. Qiu-Yu Z, Peng-Fei X, Yi-Bo H, Rui-Hong D, Zhong-Ping Y (2015) An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J Inf Hiding Multimed Signal Process 6(2):311–322

    Google Scholar 

  28. Qiu-yu Z, Si-bin Q, Yi-bo H, Tao Z (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653–21669

    Article  Google Scholar 

  29. Qiu-Yu Z, Tao Z, Si-Bin Q, Wu D-F (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. IJ Netw Secur 21(2):259–268

    Google Scholar 

  30. Ouali C, Dumouchel P, Gupta V (2016) A spectrogram-based audio fingerprinting system for content-based copy detection. Multimed Tools Appl 75(15):9145–9165

    Article  Google Scholar 

  31. Shao H, Zhong D, Du X (2020) Towards efficient unconstrained palmprint recognition via deep distillation hashing. arXiv preprint arXiv:2004.03303

  32. Sandhya M, Prasad MVNK (2017) Biometric template protection: a systematic literature review of approaches and modalities. In: Biometric security and privacy. Springer, pp 323–370

  33. Sonnleitner R, Widmer G (2015) Robust quad-based audio fingerprinting. IEEE/ACM Trans Audio Speech Language Process 24(3):409–421

    Article  Google Scholar 

  34. Tak H, Patino J, Nautsch A, Evans N, Todisco M (2020) An explainability study of the constant q cepstral coefficient spoofing countermeasure for automatic speaker verification. arXiv preprint arXiv:2004.06422

  35. Vanita J, Gopal C, Nalin L, Akshit R, Shlok W (2019) Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions. J Discrete Math Sci Cryptogr 22(2):191–202

    Article  Google Scholar 

  36. Wen-Sheng C, Haitao C, Binbin P, Bo C (2019) Robust nonnegative matrix factorization based on cosine similarity induced metric. In International Conference on Intelligent Science and Big Data Engineering, pages 278–288. Springer, 2019

  37. Jichen Y, Rohan KD (2019) Low frequency frame-wise normalization over constant-q transform for playback speech detection. Digit Signal Process 89:30–39

    Article  MathSciNet  Google Scholar 

  38. Zhang Q-Y, Qiao S-B, Zhang T, Huang Y-B (2017) Multi-format audio perception hashing algorithms based on zero ratio. J Huazhong Univ Sci Technol (Natural Science Edition) (in Chinese) 45(6):33–38

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant 61862041 and Youth Science and Technology Fund of Gansu Province of China under Grant 1606RJYA274.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Yb., Hou, H., Chen, T. et al. Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values. Multimed Tools Appl 81, 2873–2899 (2022). https://doi.org/10.1007/s11042-021-11708-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11708-z

Keywords

Navigation