Skip to main content
Log in

Encrypted speech retrieval based on long sequence Biohashing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a Encrypted speech retrieval based on long sequence Biohashing to solve the problem of plaintext data leakage in the existing speech retrieval system, and improve the efficiency and accuracy of speech retrieval, the diversity and revocability of biometric template. According to speech feature classification, a biometric template with a single mapping key is established, and then the feature vector is used to generate speech feature index, and the speech file is encrypted by the improved SHA256 algorithm, and finally, feature index and encrypted speech are sent to the cloud. For the input speech, the feature vector is generated at the mobile, and then the cloud will retrieve the feature vector table according to the feature vector to obtain the feature index of the speech, and finally, the feature index only matches the feature index related to the speech in the feature index table. Experimental results show that this algorithm can not only effectively prevent the leakage of plaintext, but also has good diversity and revocability of biometric template. At the same time, the algorithm not only has good efficiency and accuracy, but also solves the problem of speech retrieval after content preservation operation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Banawan K, Ulukus S (2018) The capacity of private information retrieval from coded databases. IEEE Trans Inf Theory 64(3):1945–1956

    Article  MathSciNet  Google Scholar 

  2. Chen Y-C, Shiu C-W, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25 (5):1164–1170

    Article  Google Scholar 

  3. Chen L, Hu X, Xu T, Kuang H, Li Q (2017) Turn signal detection during nighttime by cnn detector and perceptual hashing tracking. IEEE Trans Intell Transp Syst 18(12):3303–3314

    Article  Google Scholar 

  4. Descloux A, Grußmayer KS, Bostan E, Lukes T, Bouwens A, Sharipov A, Geissbuehler S, Mahul-Mellier A-L, Lashuel HA, Leutenegger M et al (2018) Combined multi-plane phase retrieval and super-resolution optical fluctuation imaging for 4d cell microscopy. Nat Photonics 12(3):165–172

    Article  Google Scholar 

  5. Du L, Ho ATS, Cong R (2020) Perceptual hashing for image authentication: a survey. Signal Process Image Commun 81:115713

    Article  Google Scholar 

  6. Elizalde B, Zarar S, Raj B (2019) Cross modal audio search and retrieval with joint embeddings based on text and audio. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 4095–4099

  7. He S, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Computer Science and Information Systems 14(3):703–718

    Article  Google Scholar 

  8. Hu P, Liu W, Jiang W, Yang Z (2014) Latent topic model for audio retrieval. Pattern Recogn 47(3):1138–1143

    Article  Google Scholar 

  9. Huang Y, Wang Y (2019) Multi-format speech perception hashing based on time-frequency parameter fusion of energy zero ratio and frequency band variance. In: 2019 3rd international conference on electronic information technology and computer engineering (EITCE). IEEE, pp 243–251

  10. Jaganathan K, Oymak S, Hassibi B (2017) Sparse phase retrieval: uniqueness guarantees and recovery algorithms. IEEE Trans Signal Process 65(9):2402–2410

    Article  MathSciNet  Google Scholar 

  11. Jati A, Emmanouilidou D (2020) Supervised deep hashing for efficient audio event retrieval. In: ICASSP 2020 - 2020 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 4497–4501

  12. Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9(4):1061–1073

    Article  Google Scholar 

  13. Karst SM, Dueholm MS, McIlroy SJ, Kirkegaard RH, Nielsen PH, Albertsen M (2018) Retrieval of a million high-quality, full-length microbial 16s and 18s rrna gene sequences without primer bias. Nat Biotechnol 36(2):190

    Article  Google Scholar 

  14. Krivokuća V, Marcel S (2020) On the recognition performance of biohash-protected finger vein templates. In: Handbook of vascular biometrics. Springer, pp 465–480

  15. Li L, Cheng C, Han D, Sun Q, Shi G (2017) Phase retrieval from multiple-window short-time fourier measurements. IEEE Signal Process Lett 24(4):372–376

    Article  Google Scholar 

  16. Li D, Yang Y-G, Bi J-L, Yuan J-B, Xu J (2018) Controlled alternate quantum walks based quantum hash function. Sci Rep 8(1):1–7

    Google Scholar 

  17. Myers CJ, Celebrano M, Krishnan M (2015) Information storage and retrieval in a single levitating colloidal particle. Nat Nanotechnol 10(10):886

    Article  Google Scholar 

  18. Pancoast S, Akbacak M (2016) Teaming up: making the most of diverse representations for a novel personalized speech retrieval application. In: INTERSPEECH, pp 3071–3075

  19. Pedarsani R, Yin D, Lee K, Ramchandran K (2017) Phasecode: fast and efficient compressive phase retrieval based on sparse-graph codes. IEEE Trans Inf Theory 63(6):3663–3691

    Article  MathSciNet  Google Scholar 

  20. Semwal VB, Mondal K, Nandi GC (2017) Robust and accurate feature selection for humanoid push recovery and classification: deep learning approach. Neural Comput Applic 28(3):565–574

    Article  Google Scholar 

  21. Shen Q, Zhao Y (2020) Perceptual hashing for color image based on color opponent component and quadtree structure. Signal Process 107244:166

    Google Scholar 

  22. Tasaki H, Akiba T (2017) Incorporating acoustic features for spontaneous speech driven content retrieval. In: INTERSPEECH, pp 2894–2898

  23. Waldspurger I (2017) Phase retrieval for wavelet transforms. IEEE Trans Inf Theory 63(5):2993–3009

    MathSciNet  MATH  Google Scholar 

  24. Wallnöfer J, Pirker A, Zwerger M, Dür W (2019) Multipartite state generation in quantum networks with optimal scaling. Sci Rep 9(1):1–18

    Article  Google Scholar 

  25. Wang H, Zhou L, Zhang W, Liu S (2013) Watermarking-based perceptual hashing search over encrypted speech. In: International workshop on digital watermarking. Springer, pp 423–434

  26. Wu L, Ma Y, Peng Z, Zheng W (2016) Review of biometric template protection. Chinese Journal of Scientific Instrument 37(11):2407–2420

    Google Scholar 

  27. Xiuli C, Haiyang W, Zhihua G, Yushu Z, Yiran C (2020) Hiding cipher-images generated by 2-d compressive sensing with a multi-embedding strategy. Signal Process 171, 107525.

  28. Yang Y-G, Xu P, Yang R, Zhou Y-H, Shi W-M (2016) Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci Rep 6:19788

    Article  Google Scholar 

  29. Yao S, Wang Y, Niu B (2015) An efficient cascaded filtering retrieval method for big audio data. IEEE Trans Multimedia 17(9):1450–1459

    Article  Google Scholar 

  30. Yu Y, Tang S, Raposo F, Chen L (2019) Deep cross-modal correlation learning for audio and lyrics in music retrieval. ACM Trans Multimedia Comput Commun Appl (TOMM) 15(1):1–16

    Article  Google Scholar 

  31. Zhang F, Chen B, Morrison GR, Vila-Comamala J, Guizar-Sicairos M, Robinson IK (2016) Phase retrieval by coherent modulation imaging. Nat Commun 7(1):1–8

    Google Scholar 

  32. Zhang Q-Y, Ge Z-X, Qiao S-B (2018) An efficient retrieval method of encrypted speech based on frequency band variance. J Inf Hiding Multimed Signal Process 9:1452–1463, 11

    Google Scholar 

  33. Zhang X, Zhang J, He T, Chen Y, Shen Y, Xu X (2018) A speech and lip authentication system based on android smart phone. In: Proceedings of the 6th international conference on information technology: IoT and smart city. ACM, pp 110–114

  34. Zhang Q-Y, Ge Z-X, Hu Y-J, Bai J, Huang Y-B (2020) An encrypted speech retrieval algorithm based on chirp-z transform and perceptual hashing second feature extraction. Multimed Tools Appl 79:6337–6361

    Article  Google Scholar 

  35. Zhang Q, Ge Z, Zhou L, Zhang Y (2019) An efficient retrieval algorithm of encrypted speech based on inverse fast fourier transform and measurement matrix. Turk J Elec Eng & Comp Sci 27(3):1719–1736

    Article  Google Scholar 

  36. Zhang Q-Y, Zhou L, Zhang T, Zhang D-H (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825–17846

    Article  Google Scholar 

  37. Zhao H, He S (2016) A retrieval algorithm for encrypted speech based on perceptual hashing. In: 2016 12th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE, pp 1840–1845

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China(No.61862041), Science and Technology Program of Gansu Province (No. 21JR7RA120).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-bo Huang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Yb., Wang, Y., Li, H. et al. Encrypted speech retrieval based on long sequence Biohashing. Multimed Tools Appl 81, 13065–13085 (2022). https://doi.org/10.1007/s11042-022-12371-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12371-8

Keywords

Navigation