A robust cryptosystem to enhance the security in speech based person authentication

被引:8
|
作者
Nagakrishnan, R. [1 ]
Revathi, A. [1 ]
机构
[1] SASTRA Deemed Be Univ, Sch EEE, Dept ECE, Thanjavur, Tamil Nadu, India
关键词
Chaotic maps; DNA addition; Speech encryption system; Speech based person authentication; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11042-020-08846-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.
引用
下载
收藏
页码:20795 / 20819
页数:25
相关论文
共 50 条
  • [11] Robust Speaker Authentication Based on Combined Speech and Voiceprint Recognition
    Malcangi, Mario
    COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING, VOL 2: ADVANCES IN COMPUTATIONAL SCIENCE, 2009, 1148 : 872 - 875
  • [12] Noise Robust Multimodal Biometric Person Authentication System using Face, Speech and Signature Features
    Kartik, P.
    Prasad, R. V. S. S. Vara
    Prasanna, S. R. Mahadeva
    PROCEEDINGS OF THE INDICON 2008 IEEE CONFERENCE & EXHIBITION ON CONTROL, COMMUNICATIONS AND AUTOMATION, VOL I, 2008, : 23 - 27
  • [13] Multimodal person authentication using speech, face and visual speech
    Palanivel, S.
    Yegnanarayana, B.
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 109 (01) : 44 - 55
  • [14] Person authentication by fusing face and speech information
    Duc, B
    Maitre, G
    Fischer, S
    Bigun, J
    AUDIO- AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, 1997, 1206 : 311 - 318
  • [15] Novel secured speech communication for person authentication
    Nagakrishnan, R.
    Revathi, A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) : 24771 - 24801
  • [16] Novel secured speech communication for person authentication
    R. Nagakrishnan
    A. Revathi
    Multimedia Tools and Applications, 2023, 82 : 24771 - 24801
  • [17] ROBUST RETINA-BASED PERSON AUTHENTICATION USING THE SPARSE CLASSIFIER
    Condurache, Alexandru Paul
    Kotzerke, Johannes
    Mertins, Alfred
    2012 PROCEEDINGS OF THE 20TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2012, : 1514 - 1518
  • [18] Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security
    Archana
    Sachin
    Singh, Phool
    OPTICS AND LASERS IN ENGINEERING, 2021, 137
  • [19] Robust Speech Hashing for Content Authentication
    Jiao, Yuhua
    Ji, Liping
    Niu, Xiamu
    IEEE SIGNAL PROCESSING LETTERS, 2009, 16 (09) : 818 - 821
  • [20] Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system
    Ahmed, Raja Sohail
    Wang, Yongli
    Kandhro, Irfan Ali
    Sehito, Nabila
    Mallah, Ghulam Ali
    Ali, Fayyaz
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)