Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
|
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [11] A Fast Speech Feature Extraction Method Based on Perceptual Hashing
    Zhang, Qiuyu
    Qiao, Sibin
    Zhang, Tao
    Huang, Yibo
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [12] SECURITY EVALUATION OF A PERCEPTUAL IMAGE HASHING SCHEME BASED ON VIRTUAL WATERMARK DETECTION
    Zhou, Jiantao
    Au, Oscar C.
    2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [13] Biometric Cryptosystems based Fuzzy Commitment Scheme: A Security Evaluation
    Lafkih, Maryam
    Mikram, Mounia
    Ghouzali, Sanaa
    El Haziti, Mohamed
    Aboutajdine, Driss
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 443 - 449
  • [14] Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image
    Ding, Kaimeng
    Meng, Fan
    Liu, Yueming
    Xu, Nan
    Chen, Wenjun
    INFORMATION, 2018, 9 (09)
  • [15] Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks
    Wang, Hongxia
    Yin, Bangxu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [16] CNN-based perceptual hashing scheme for image groups suitable for security systems
    Sugawara, Yusei
    Meng Zhaoxiong
    Morizumi, Tetsuya
    Miyata, Sumiko
    Hosono, Kaito
    Kinoshita, Hirotsugu
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1231 - 1236
  • [17] Perceptual hashing method for video content authentication with maximized robustness
    Ma, Qiang
    Xing, Ling
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2021, 2021 (01)
  • [18] Perceptual hashing method for video content authentication with maximized robustness
    Qiang Ma
    Ling Xing
    EURASIP Journal on Image and Video Processing, 2021
  • [19] Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment
    Zhang, Qiu-Yu
    Hu, Wen-Jin
    Huang, Yi-Bo
    Qiao, Si-Bin
    INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT I, 2016, 9771 : 99 - 111
  • [20] A Long Sequence Speech Perceptual Hashing Authentication Algorithm Based on Constant Q Transform and Tensor Decomposition
    Huang, Yibo
    Hou, Hexiang
    Wang, Yong
    Zhang, Yuan
    Fan, Manhong
    IEEE ACCESS, 2020, 8 : 34140 - 34152