Watermarking-Based Perceptual Hashing Search Over Encrypted Speech

Privacy-preserving search over encrypted speech has come into being an important and urgent research field in cloud storage. In this paper, a speech scrambling encryption method based on the Chua’s circuit chaotic system with memristor is proposed, and then a watermarking-based perceptual hashing search algorithm over encrypted speech is proposed based on the zero-crossing rate. In the proposed scheme, the zero-crossing rate is extracted from the digital speech to generate the perceptual hashing as the search digest. The perceptual hashing digest as a watermark is embedded into the encrypted speech signal. The search results can be obtained by matching and computing the normalized Hamming distance of the perceptual hashing digests between the search target and the extracted one without loading and decrypting the encrypted speech. Experimental results show that the proposed scheme has good discrimination, uniqueness, and perceptual robustness to common speech processing. In addition, the security and computation complexity are all satisfactory. The precision ratio is 100 %, and the recall ratio is more than 98 %.

[1]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[2]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[3]  Hai Jin,et al.  Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data , 2012, 2012 IEEE Asia-Pacific Services Computing Conference.

[4]  Hongxia Wang,et al.  Centroid-based semi-fragile audio watermarking in hybrid domain , 2010, Science China Information Sciences.

[5]  L. Chua Memristor-The missing circuit element , 1971 .

[6]  Jing Wu,et al.  Content-Based Audio Retrieval Using Perceptual Hash , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[7]  Hongxia Wang,et al.  Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .

[8]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[9]  Lin Wu,et al.  A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks , 2013, Int. J. Distributed Sens. Networks.

[10]  Andrew Hutchison,et al.  An architecture for secure searchable cloud storage , 2011, 2011 Information Security for South Africa.

[11]  Shu-Lin Wang,et al.  An Efficient Privacy-Preserving Rank Query over Encrypted Data in Cloud Computing , 2012 .

[12]  Hongxia Wang,et al.  Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[13]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[14]  Tetsutaro Uehara,et al.  Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[15]  Hui Lin,et al.  Switching Auxiliary Chains for Speech Recognition , 2007, IEEE Signal Processing Letters.