Abstract
The existing speech authentication algorithms hash extracted speech features directly and saved them to the cloud, which is easy to cause speech feature leakage. In the process of constructing hashing, the utilization efficiency of speech feature is poor, and the short hashing sequence will lead to the lack of discrimination of hashing sequence and the deviation of authentication. In order to solve the above problems, a long sequence biometric hashing authentication algorithm based on two-dimensional Sine ICMI Cmodulation map (2D-SIMM) and constant Q cepstral coefficients (CQCC) cosine was proposed. First, this algorithm extracts the CQCC of the speech signal, then obtains the eigenvalue of the space cosine distance of the adjacent speech frame CQCC, and finally performs projection mapping between the eigenvalue and the pseudorandom matrix generated by 2D-SIMM to construct a biometric hashing sequence. This paper evaluates the proposed robust feature schemes of MFCC and CQCC space cosine distance through experiments. The experimental results show that CQCC spatial distance combined with 2D-SIMM biometrics characteristics can reach \(10^{-21}\). when the threshold is 0.35. The BER mean was only 0.0383 for maintaining the robustness of operation for different contents. When the SNR is -5 dB, the matching rate of different noises can reach 45%. At the same time, it also improves the security of the biological template, and the overall performance is greatly improved compared with the existing algorithm.
Similar content being viewed by others
References
Abdullahi SM, Wang H, Li T (2020) Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans Inf Forensics Secur 15:2587–2601
Anjith G, Zohreh M, David G, Olegs N, André A, Sébastien M (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 15:42–55
Atighehchi K, Ghammam L, Barbier M, Rosenberger C (2019) Greychashing: combining biometrics and secret for enhancing the security of protected templates. Futur Gener Comput Syst
Boujelben Ons, Bahoura Mohammed (2018) Efficient fpga-based architecture of an automatic wheeze detector using a combination of mfcc and svm algorithms. J Syst Archit 88:54–64
Cao D, Gao X, Gao L (2017) An improved endpoint detection algorithm based on mfcc cosine value. Wirel Pers Commun 95(3):2073–2090
Chang D, Garg S, Hasan M, Mishra S (2020) Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption. IEEE Trans Inform Forensics Secur PP(99):1–1
Chen Y, Wo Y, Xie R, Chudan W, Han G (2019) Deep secure quantization: On secure biometric hashing against similarity-based attacks. Signal Process 154:314–323
Deng M, Meng T, Cao J, Wang S, Zhang J, Fan H (2020) Heart sound classification based on improved mfcc features and convolutional recurrent neural networks. Neural Netw 130:22–32
Dexing Z, Huikai S, Du X (2019) A hand-based multi-biometrics via deep hashing network and biometric graph matching. IEEE Trans Inform Forensics Secur 14(12):3140–3150
Gomez-Barrero M, Fierrez J, Galbally J, Maiorana E, Campisi P (2016) Implementation of fixed-length template protection based on homomorphic encryption with application to signature biometrics. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 191–198
Hamd MH, Mohammed MY (2019) Multimodal biometric system based face-iris feature level fusion. Int J Mod Educ Comput Sci 11(5):1–9
Huang Y-B, Zhang Q-Y, Yuan Z-T, Yang Z-P (2015) The hash algorithm of speech perception based on the integration of adaptive mfcc and lpcc. J Huazhong Univ Sci Technol (Natural Science Edition) (in Chinese) (02):124–128
Huang Yi-bo, Wang Yong, Zhang Qiu-yu, Zhang Wei-zhao, Fan Man-hong (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79(33):24889–24909
Jami SK, Chalamala SR, Jindal AK (2019) Biometric template protection through adversarial learning. In: 2019 IEEE international conference on consumer electronics (ICCE). IEEE, pp 1–6
Jiang Y, Chunxue W, Deng K, Yan W (2019) An audio fingerprinting extraction algorithm based on lifting wavelet packet and improved optimal-basis selection. Multimed Tools Appl 78(21):30011–30025
Jin-feng L, Wu T, Hong-xia W (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. J Beijing Univ Posts Telecommun 02:89–93
Jin-feng L, Wu T, Hong-xia W (2015) Perceptual hashing based on nmf and mdct coefficients. Chin J Electron (in Chinese) 03:579–583
Khurshid M, Selwal A (2020) A novel block hashing-based template security scheme for multimodal biometric system. In: Decision analytics applications in industry. Springer, pp 173–183
Kim H-G, Cho H-S, Kim JY (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315–323
Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and minhash. Multimed Tools Appl: 1–25
Lifang W, Yukun M, Peng Z, Weishi Z (2016) Review of biometric template protection. Chin J Entific Instrum
Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36
Nguyen TAT, Dang TK, Nguyen DT (2019) A new biometric template protection using random orthonormal projection and fuzzy commitment. In International Conference on Ubiquitous Information Management and Communication, pages 723–733. Springer
Nitin K, Manisha R (2020) Rp-lpp: a random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(3):2363–2381
Qiu-Yu Z, Hu W-J, Yi-bo H, Si-bin Q (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1555–1581
Qiu-yu Z, Liang Z, Tao Z, Deng-hai Z (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825–17846
Qiu-Yu Z, Peng-Fei X, Yi-Bo H, Rui-Hong D, Zhong-Ping Y (2015) An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J Inf Hiding Multimed Signal Process 6(2):311–322
Qiu-yu Z, Si-bin Q, Yi-bo H, Tao Z (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653–21669
Qiu-Yu Z, Tao Z, Si-Bin Q, Wu D-F (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. IJ Netw Secur 21(2):259–268
Ouali C, Dumouchel P, Gupta V (2016) A spectrogram-based audio fingerprinting system for content-based copy detection. Multimed Tools Appl 75(15):9145–9165
Shao H, Zhong D, Du X (2020) Towards efficient unconstrained palmprint recognition via deep distillation hashing. arXiv preprint arXiv:2004.03303
Sandhya M, Prasad MVNK (2017) Biometric template protection: a systematic literature review of approaches and modalities. In: Biometric security and privacy. Springer, pp 323–370
Sonnleitner R, Widmer G (2015) Robust quad-based audio fingerprinting. IEEE/ACM Trans Audio Speech Language Process 24(3):409–421
Tak H, Patino J, Nautsch A, Evans N, Todisco M (2020) An explainability study of the constant q cepstral coefficient spoofing countermeasure for automatic speaker verification. arXiv preprint arXiv:2004.06422
Vanita J, Gopal C, Nalin L, Akshit R, Shlok W (2019) Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions. J Discrete Math Sci Cryptogr 22(2):191–202
Wen-Sheng C, Haitao C, Binbin P, Bo C (2019) Robust nonnegative matrix factorization based on cosine similarity induced metric. In International Conference on Intelligent Science and Big Data Engineering, pages 278–288. Springer, 2019
Jichen Y, Rohan KD (2019) Low frequency frame-wise normalization over constant-q transform for playback speech detection. Digit Signal Process 89:30–39
Zhang Q-Y, Qiao S-B, Zhang T, Huang Y-B (2017) Multi-format audio perception hashing algorithms based on zero ratio. J Huazhong Univ Sci Technol (Natural Science Edition) (in Chinese) 45(6):33–38
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 61862041 and Youth Science and Technology Fund of Gansu Province of China under Grant 1606RJYA274.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Huang, Yb., Hou, H., Chen, T. et al. Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values. Multimed Tools Appl 81, 2873–2899 (2022). https://doi.org/10.1007/s11042-021-11708-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11708-z