Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
|
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [1] Security Analysis of Speech Perceptual Hashing Authentication Algorithm
    Zhang Qiu-yu
    Ren Zhan-wei
    Xing Peng-fei
    Huang Yi-bo
    Yu Shuang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118
  • [2] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Zhang, Qiu-yu
    Zhang, Deng-hai
    Xu, Fu-jiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24925 - 24948
  • [3] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Qiu-yu Zhang
    Deng-hai Zhang
    Fu-jiu Xu
    Multimedia Tools and Applications, 2021, 80 : 24925 - 24948
  • [4] On Security of Fuzzy Commitment Scheme for Biometric Authentication
    Chang, Donghoon
    Garg, Surabhi
    Hasan, Munawar
    Mishra, Sweta
    INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 399 - 419
  • [5] Perceptual hashing based on correlation coefficient of MFCC for speech authentication
    Li, Jin-Feng
    Wu, Tao
    Wang, Hong-Xia
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (02): : 89 - 93
  • [6] An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
    Zhang, Qiuyu
    Zhang, Denghai
    Zhou, Liang
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (05) : 2467 - 2482
  • [7] An efficient perceptual hashing based on improved spectral entropy for speech authentication
    Qiu-yu Zhang
    Wen-jin Hu
    Yi-bo Huang
    Si-bin Qiao
    Multimedia Tools and Applications, 2018, 77 : 1555 - 1581
  • [8] An efficient perceptual hashing based on improved spectral entropy for speech authentication
    Zhang, Qiu-yu
    Hu, Wen-jin
    Huang, Yi-bo
    Qiao, Si-bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 1555 - 1581
  • [9] An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition
    School of Computer and Communication, Lanzhou University of Technology, Lanzhou
    Gansu
    730050, China
    J. Inf. Hiding Multimedia Signal Proces., 2 (311-322):
  • [10] Spectrogram-based efficient perceptual hashing scheme for speech identification
    Zhang, Qiu-Yu
    Zhang, Tao
    Qiao, Si-Bin
    Wu, Dong-Fang
    International Journal of Network Security, 2019, 21 (02) : 259 - 268