Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
|
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [21] An efficient speech perceptual hashing authentication algorithm based on the linear prediction minimum mean squared error
    Zhang Q.
    Hu W.
    Qiao S.
    Zhang T.
    1600, Huazhong University of Science and Technology (44): : 127 - 132
  • [22] A Retrieval Algorithm for Encrypted Speech based on Perceptual Hashing
    Zhao, Huan
    He, Shaofang
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1840 - 1845
  • [23] On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication
    Van Hamme, Tim
    Rua, Enrique Argones
    Preuveneers, Davy
    Joosen, Wouter
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5211 - 5224
  • [24] An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform
    Zhang Qiu-yu
    Xing Peng-fei
    Huang Yi-bo
    Dong Rui-hong
    Yang Zhong-ping
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 622 - 627
  • [25] A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
    Zhang, Qiu-yu
    Qiao, Si-bin
    Huang, Yi-bo
    Zhang, Tao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (16) : 21653 - 21669
  • [26] A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
    Qiu-yu Zhang
    Si-bin Qiao
    Yi-bo Huang
    Tao Zhang
    Multimedia Tools and Applications, 2018, 77 : 21653 - 21669
  • [27] An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM
    Zhang, Qiuyu
    Li, Yuzhou
    Hu, Yingjie
    Zhao, Xuejiao
    IEEE ACCESS, 2020, 8 : 148556 - 148569
  • [28] Research on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information
    Wang, Yajie
    Yu, Huan
    Shi, Feng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (02) : 1629 - 1637
  • [29] Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information
    Wang, Ying
    Peng, Xinguang
    Bian, Jing
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (05) : 2225 - 2232
  • [30] Euclidean-Distance Based Fuzzy Commitment Scheme for Biometric Template Security
    Gilkalaye, Babak Poorebrahim
    Rattani, Ajita
    Derakhshani, Reza
    2019 7TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), 2019,