A novel NMF-based authentication scheme for encrypted speech in cloud computing

Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.

[1]  Rajesh Kumar,et al.  Fog computing: from architecture to edge computing and big data processing , 2018, The Journal of Supercomputing.

[2]  Zhen Li,et al.  Blind and robust audio watermarking scheme based on SVD-DCT , 2011, Signal Process..

[3]  C.-C. Jay Kuo,et al.  Current Developments and Future Trends in Audio Authentication , 2012, IEEE MultiMedia.

[4]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Ahmed Ghoneim,et al.  Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.

[6]  Jong Hyuk Park,et al.  A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions , 2019, The Journal of Supercomputing.

[7]  Xiaomin Wang,et al.  A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service , 2018, IEEE Access.

[8]  Oscal T.-C. Chen,et al.  Content-Dependent Watermarking Scheme in Compressed Speech With Identifying Manner and Location of Attacks , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[9]  Hongxia Wang,et al.  Speech Authentication and Recovery Scheme in Encrypted Domain , 2016, IWDW.

[10]  Brij B. Gupta,et al.  IoT transaction processing through cooperative concurrency control on fog–cloud computing environment , 2019, Soft Computing.

[11]  Eklas Hossain,et al.  Authentication Protocol for Cloud Databases Using Blockchain Mechanism , 2019, Sensors.

[12]  Shijun Xiang,et al.  Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Lei Liu,et al.  Can an element form a two-dimensional nanosheet of type 15 pentagons? , 2018, Computational Materials Science.

[14]  Atif Alamri,et al.  Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.

[15]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Yiliang Han,et al.  Secure data outsourcing scheme in cloud computing with attribute-based encryption , 2018, Int. J. High Perform. Comput. Netw..

[17]  Lianbing Deng,et al.  A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..

[18]  Brij B. Gupta,et al.  A novel ECC-based lightweight authentication protocol for internet of things devices , 2019 .

[19]  Jong Hyuk Park,et al.  Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..

[20]  Hongxia Wang,et al.  REPAIR: fragile watermarking for encrypted speech authentication with recovery ability , 2020, Telecommunication Systems.

[21]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[22]  Jie Wang,et al.  Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .

[23]  Jiwu Huang,et al.  Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..

[24]  Yun-Qing Shi,et al.  Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[25]  Joonsang Baek,et al.  A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption , 2018, Int. J. High Perform. Comput. Netw..

[26]  Anand Nayyar,et al.  Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based , 2020, IEEE Access.

[27]  Pei-Pei Liu,et al.  A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform , 2013, Int. J. Comput. Math..

[28]  Mahmoud Al-Ayyoub,et al.  Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2017, Multimedia Tools and Applications.

[29]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[30]  Xingming Sun,et al.  Speech authentication and content recovery scheme for security communication and storage , 2017, Telecommunication Systems.

[31]  Ruohan Meng A fusion steganographic algorithm based on Faster R-CNN , 2018 .

[32]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[33]  Charu Gandhi,et al.  Ensure Hierarchal Identity Based Data Security in Cloud Environment , 2019, Int. J. Cloud Appl. Comput..

[34]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[35]  Anand Nayyar,et al.  Leveraging energy‐efficient load balancing algorithms in fog computing , 2020, Concurr. Comput. Pract. Exp..

[36]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..