Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
|
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [31] A perceptual hashing method based on luminance features
    Luo, Siqing
    PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
  • [32] A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
    Zhang, Qiu-yu
    Bai, Jian
    Xu, Fu-jiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (11) : 15127 - 15151
  • [33] Speech authentication and content recovery scheme for security communication and storage
    Qing Qian
    Hongxia Wang
    Xingming Sun
    Yunhe Cui
    Huan Wang
    Canghong Shi
    Telecommunication Systems, 2018, 67 : 635 - 649
  • [34] Speech authentication and content recovery scheme for security communication and storage
    Qian, Qing
    Wang, Hongxia
    Sun, Xingming
    Cui, Yunhe
    Wang, Huan
    Shi, Canghong
    TELECOMMUNICATION SYSTEMS, 2018, 67 (04) : 635 - 649
  • [35] A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
    Qiu-yu Zhang
    Jian Bai
    Fu-jiu Xu
    Multimedia Tools and Applications, 2022, 81 : 15127 - 15151
  • [36] A replay attack detection scheme based on perceptual image hashing
    Hamadouche, Maamar
    Khalil, Zebbiche
    Tebbi, Hanane
    Guerroumi, Mohamed
    Zafoune, Youcef
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (03) : 8999 - 9031
  • [37] The Analysis of an NMF-based Perceptual Image Hashing Scheme
    Hossein, S. Amir
    Tabatabaei, A. E.
    Ruland, Christoph
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 108 - 112
  • [38] LBP-Based Biometric Hashing Scheme for Human Authentication
    Bai, Zhengyao
    Hatzinakos, Dimitrios
    11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION (ICARCV 2010), 2010, : 1842 - 1847
  • [39] A replay attack detection scheme based on perceptual image hashing
    Maamar Hamadouche
    Zebbiche Khalil
    Hanane TEBBI
    Mohamed GUERROUMI
    Youcef ZAFOUNE
    Multimedia Tools and Applications, 2024, 83 : 8999 - 9031
  • [40] On the security of the hashing scheme based on SL2
    Abdukhalikov, KS
    Kim, C
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 93 - 102