A robust cryptosystem to enhance the security in speech based person authentication

被引:8
|
作者
Nagakrishnan, R. [1 ]
Revathi, A. [1 ]
机构
[1] SASTRA Deemed Be Univ, Sch EEE, Dept ECE, Thanjavur, Tamil Nadu, India
关键词
Chaotic maps; DNA addition; Speech encryption system; Speech based person authentication; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11042-020-08846-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.
引用
下载
收藏
页码:20795 / 20819
页数:25
相关论文
共 50 条
  • [31] Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme
    Zhang Qiu-yu
    Ren Zhan-wei
    Huang Yi-bo
    Yu Shuang
    Hu Wen-jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 229 - 240
  • [32] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [33] User authentication scheme based on elliptic curve cryptosystem
    Zhang, L.J.
    Zhao, L.
    Shen, J.Y.
    Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
  • [34] Message Authentication Scheme Based on Chaotic Quantum Cryptosystem
    Zhang, Hang
    Cai, Tian-yu
    Wu, Tian-bo
    INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
  • [35] Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem
    张龙军
    韩玮
    陈克非
    Journal of Shanghai Jiaotong University(Science), 2007, (05) : 645 - 650
  • [36] Secure authentication of WLAN based on elliptic curve cryptosystem
    Zhang, Long-Jun
    Han, Wei
    Chen, Ke-Fei
    Journal of Shanghai Jiaotong University (Science), 2007, 12 E (05) : 645 - 650
  • [37] A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem
    Sarvabhatla, Mrudula
    Reddy, M. Chandra Mouli
    Vorugunti, Chandra Sekhar
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 582 - 587
  • [38] A robust approach to detect video-based attacks to enhance security
    Arora S.
    Bhatia M.P.S.
    International Journal of Innovative Computing and Applications, 2019, 10 (3-4): : 175 - 184
  • [39] Security Analysis of Speech Perceptual Hashing Authentication Algorithm
    Zhang Qiu-yu
    Ren Zhan-wei
    Xing Peng-fei
    Huang Yi-bo
    Yu Shuang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118