A novel NMF-based authentication scheme for encrypted speech in cloud computing

被引:7
|
作者
Shi, Canghong [1 ]
Wang, Hongxia [2 ]
Hu, Yi [3 ]
Li, Xiaojie [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610041, Peoples R China
[3] Northern Kentucky Univ, Highland Hts, KY USA
[4] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted speech authentication; Speech encryption; Non-negative matrix factorization; Cloud computing; Tamper localization; Common signal processing;
D O I
10.1007/s11042-021-10896-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.
引用
收藏
页码:25773 / 25798
页数:26
相关论文
共 50 条
  • [21] REGULARIZED NMF-BASED SPEECH ENHANCEMENT WITH SPECTRAL COMPONENTS MODELED BY GAUSSIAN MIXTURES
    Chung, Hanwook
    Plourde, Eric
    Champagne, Benoit
    2014 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2014,
  • [22] Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
    Zhang, Qiuyu
    Fu, Minrui
    Huang, Yibo
    Zhao, Zhenyu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] An Indirect Fingerprint Authentication Scheme in Cloud Computing
    Jiang, Xingchen
    Zheng, Jiande
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 986 - 990
  • [24] An New Anonymous Authentication Scheme for Cloud Computing
    Zhang Zhi-hua
    Li Jian-jun
    Wei, Jiang
    Yong, Zhao
    Bei, Gong
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 896 - 898
  • [25] Retraction Note: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    Multimedia Tools and Applications, 2022, 81 : 44525 - 44525
  • [26] Lightweight IoT-based authentication scheme in cloud computing circumstance
    Zhou, Lu
    Li, Xiong
    Yeh, Kuo-Hui
    Su, Chunhua
    Chiu, Wayne
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 244 - 251
  • [27] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [28] A Trusted Third Party-based Authentication Scheme in Cloud Computing
    Li, Ying
    Du, Li-Ping
    Zhao, Gui-Fen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
  • [29] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
  • [30] Smart Card Based Remote User Authentication Scheme for Cloud Computing
    Madhusudhan, R.
    Hegde, Manjunath
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 905 - 910