A robust cryptosystem to enhance the security in speech based person authentication

被引:8
|
作者
Nagakrishnan, R. [1 ]
Revathi, A. [1 ]
机构
[1] SASTRA Deemed Be Univ, Sch EEE, Dept ECE, Thanjavur, Tamil Nadu, India
关键词
Chaotic maps; DNA addition; Speech encryption system; Speech based person authentication; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11042-020-08846-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.
引用
下载
收藏
页码:20795 / 20819
页数:25
相关论文
共 50 条
  • [41] Security of virtual-optics-based cryptosystem
    Peng, Xiang
    Zhang, Peng
    OPTIK, 2006, 117 (11): : 525 - 531
  • [42] A Cryptosystem for Database Security Based on TSFS Algorithm
    Abdulameer, Saad A.
    Kashmar, Ali H.
    Shihab, Ammar I.
    BAGHDAD SCIENCE JOURNAL, 2020, 17 (02) : 567 - 574
  • [43] Security Analysis of a Cryptosystem Based on Subspace Subcodes
    Berger, Thierry P.
    Gueye, Anta Niane
    Gueye, Cheikh Thiecoumba
    Hasan, M. Anwarul
    Klamti, Jean Belo
    Persichetti, Edoardo
    Randrianarisoa, Tovohery H.
    Ruatta, Olivier
    CODE-BASED CRYPTOGRAPHY (CBCRYPTO 2021), 2022, 13150 : 42 - 59
  • [44] High Security Speech BioHashing Authentication Algorithm Based on Multi-feature Fusion
    Huang, Yi Bo
    Li, Hao
    Wang, Yong
    Zhang, Qiu Yu
    International Journal of Network Security, 2021, 23 (06) : 962 - 972
  • [45] Person authentication based on hand shape
    Yörük, E
    Konukoglu, E
    Sankur, B
    Darbon, J
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 152 - 155
  • [46] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem
    Kang, Dongwoo
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    Proceedings of the 2020 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020, 2020,
  • [47] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem
    Kang, Dongwoo
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM), 2020,
  • [48] The Study of Password Authentication System Based on Elliptic Curve Cryptosystem
    Wei Haiping
    Jia Chuanying
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6309 - 6312
  • [49] Improved RFID authentication protocol based on randomized McEliece cryptosystem
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmohammed, Mohamed
    International Journal of Network Security, 2015, 17 (04) : 413 - 422
  • [50] Optical cryptosystem based on computational ghost imaging and nonlinear authentication
    Zhang, Lin
    Wang, Xiaogang
    Zhou, Qingming
    Xue, Jidong
    Xu, Bijun
    OPTICS EXPRESS, 2024, 32 (03) : 4242 - 4253