A robust cryptosystem to enhance the security in speech based person authentication

被引:8
|
作者
Nagakrishnan, R. [1 ]
Revathi, A. [1 ]
机构
[1] SASTRA Deemed Be Univ, Sch EEE, Dept ECE, Thanjavur, Tamil Nadu, India
关键词
Chaotic maps; DNA addition; Speech encryption system; Speech based person authentication; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11042-020-08846-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.
引用
下载
收藏
页码:20795 / 20819
页数:25
相关论文
共 50 条
  • [21] An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security
    Chen, Yulei
    Chen, Jianhua
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [22] ROBUST ELECTROENCEPHALOGRAM CHANNEL SET FOR PERSON AUTHENTICATION
    Altahat, Salahiddin
    Wagner, Michael
    Marroquin, Elisa Martinez
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 997 - 1001
  • [23] On (in)security of "a robust image authentication method"
    Uehara, T
    Safavi-Naini, R
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 1025 - 1032
  • [24] Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
    Yi-bo Huang
    Teng-Fei Yuan-Zhang
    Shao-Hui Chen
    Qiu-yu Yan
    Multimedia Tools and Applications, 2022, 81 : 37953 - 37979
  • [25] Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
    Huang, Yi-bo
    Yuan-Zhang
    Chen, Teng-Fei
    Yan, Shao-Hui
    Zhang, Qiu-yu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (26) : 37953 - 37979
  • [26] A Hybrid Cryptosystem to Enhance Security in IoT Health Care System
    Kavitha S.
    Alphonse P.J.A.
    International Journal of Microwave and Wireless Technologies, 2019, 9 (01): : 1 - 10
  • [27] Blind authentication based on the elliptic curve cryptosystem
    Zhang, Longjun
    Shen, Junyi
    Zhao, Lin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (08): : 804 - 807
  • [28] Multimodal biometric cryptosystem based on fusion of wavelet and curvelet features in robust security application
    Inamdar, Sajeeda R.
    Dandawate, Yogesh H.
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2016, 8 (01) : 33 - 51
  • [29] A Robust Authentication Model using Multi-Channel Communication for eHealth Systems to Enhance Privacy and Security
    Mamun, Quazi
    Rana, Muhammad
    2017 8TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2017, : 255 - 260
  • [30] Analysing the Robust EEG Channel Set for Person Authentication
    Altahat, Salahiddin
    Chetty, Girija
    Dat Tran
    Ma, Wanli
    NEURAL INFORMATION PROCESSING, ICONIP 2015, PT IV, 2015, 9492 : 162 - 173