Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
|
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [41] Robust image hashing based on structural and perceptual features for authentication of color images
    Khan M.F.
    Monir S.M.
    Naseem I.
    Khan, Muhammad Farhan (farhanazeemi@hotmail.com), 1600, Turkiye Klinikleri (29): : 648 - 662
  • [42] A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Singh, Surendra Pal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] Perceptual image hashing based on a deep convolution neural network for content authentication
    Jiang, Cuiling
    Pang, Yilin
    JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (04)
  • [44] Robust image hashing based on structural and perceptual features for authentication of color images
    Khan, Muhammad Farhan
    Monir, Syed Muhammad
    Naseem, Imran
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (02) : 648 - 662
  • [45] Image Perceptual Hashing for Content Authentication Based on Geometric Invariant Vector Distance
    Xing, Huifen
    Wang, Shuchao
    Wu, Qilin
    Wang, Honghai
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [46] Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
    Yi-bo Huang
    Teng-fei Chen
    Qiu-yu Zhang
    Yuan Zhang
    Shao-hui Yan
    Multimedia Tools and Applications, 2022, 81 : 25829 - 25852
  • [47] Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
    Huang, Yi-bo
    Chen, Teng-fei
    Zhang, Qiu-yu
    Zhang, Yuan
    Yan, Shao-hui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25829 - 25852
  • [48] Watermarking-Based Perceptual Hashing Search Over Encrypted Speech
    Wang, Hongxia
    Zhou, Linna
    Zhang, Wei
    Liu, Shuang
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 423 - 434
  • [49] A secure and robust wavelet-based hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 51 - +
  • [50] An Improved Design Scheme for Perceptual Hashing based on CNN for Digital Watermarking
    Meng Zhaoxiong
    Morizumi, Tetsuya
    Miyata, Sumiko
    Kinoshita, Hirotsugu
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1789 - 1794