A novel NMF-based authentication scheme for encrypted speech in cloud computing

被引:7
|
作者
Shi, Canghong [1 ]
Wang, Hongxia [2 ]
Hu, Yi [3 ]
Li, Xiaojie [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610041, Peoples R China
[3] Northern Kentucky Univ, Highland Hts, KY USA
[4] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted speech authentication; Speech encryption; Non-negative matrix factorization; Cloud computing; Tamper localization; Common signal processing;
D O I
10.1007/s11042-021-10896-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.
引用
收藏
页码:25773 / 25798
页数:26
相关论文
共 50 条
  • [31] An Improved Bayesian NMF-Based Speech Enhancement Method Using Multivariate Laplace Distribution
    Zhang, Liwei
    Zhang, Xiongwei
    Zou, Xia
    Min, Gang
    2014 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2014,
  • [32] Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment
    Shu, Jiangang
    Sun, Xingming
    Zhou, Lu
    Wang, Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 65 - 76
  • [33] OPTIMAL COST FUNCTION AND MAGNITUDE POWER FOR NMF-BASED SPEECH SEPARATION AND MUSIC INTERPOLATION
    King, Brian
    Fevotte, Cedric
    Smaragdis, Paris
    2012 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2012,
  • [34] Prediction of NMF-based Wiener Filter for Speech Enhancement Using Deep Neural Networks
    Bai, Zhigang
    Bao, Changchun
    Cui, Zihao
    2020 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (IEEE ICSPCC 2020), 2020,
  • [35] A NMF-Based Image Restoration Scheme With Applications to LED Integrated Substrate Defect Detection
    Chen, Ssu-Han
    Chiou, Ai-Huei
    Wang, Chien-Chih
    IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, 2018, 31 (04) : 486 - 494
  • [36] A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing
    Zhu, Xiaoyu
    Liu, Qin
    Wang, Guojun
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 845 - 851
  • [37] Combined Multi-channel NMF-based Robust Beamforming for Noisy Speech Recognition
    Mimura, Masato
    Bando, Yoshiaki
    Shimada, Kazuki
    Sakai, Shinsuke
    Yoshii, Kazuyoshi
    Kawahara, Tatsuya
    18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, : 2451 - 2455
  • [38] A multi-channel speech enhancement framework for robust NMF-based speech recognition for speech-impaired users
    Dekkers, Gert
    van Waterschoot, Toon
    Vanrumste, Bart
    Van Den Broeck, Bert
    Gemmeke, Jort F.
    Van Hamme, Hugo
    Karsmakers, Peter
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 746 - 750
  • [39] A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
    Liu, Guoxiu
    Yang, Geng
    Wang, Huaqun
    Xiang, Yang
    Dai, Hua
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [40] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):