Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion

In order to solve the problems of poor security and small application scope of speech content authentication, and to improve the robustness, discrimination and real-time performance of speech authentication, a multi-format speech BioHashing algorithm based on energy to zero ratio and improved linear prediction minimum mean square error (LP-MMSE) parameter fusion is proposed. Firstly, the algorithm extracts the short-term logarithmic energy, zero-crossing rate and the covariance method’s LP-MMSE of speech signal to be processed. Then, the time-frequency parameters are fused, and the fused feature vector and the orthogonal normalized random matrix of the key control are generated into BioHashing sequences through the inner product form. Finally, the BioHashing is encrypted by equal-length scrambling using henon chaotic map. The experimental results show that the proposed algorithm not only has the characteristics of good discrimination, strong robustness, good security, high real-time performance and wide application range, but also realizes the detection and localization of small-scale tampering of speech through minimum code distance (MCD) algorithm. At the same time, the algorithm also validates the unidirectionality of BioHashing with trapdoor by comparative difference method.

[1]  Yibo Huang,et al.  Strong Robustness Hash Algorithm of Speech Perception Based on Tensor Decomposition Model , 2017 .

[2]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[3]  Jithendra Vepa,et al.  Speech Emotion Recognition Using Spectrogram & Phoneme Embedding , 2018, INTERSPEECH.

[4]  Zhe Jin,et al.  Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Saru Kumari,et al.  An Authentication Framework for Roaming Service in Global Mobility Networks , 2019, Inf. Technol. Control..

[6]  Xinman Zhang,et al.  A Speech and Lip Authentication System Based On Android Smart Phone , 2018, ICIT 2018.

[7]  Ning Chen,et al.  Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection , 2013, Digit. Signal Process..

[8]  Ondrej Krejcar,et al.  Online signature verification by spectrogram analysis , 2017, Applied Intelligence.

[9]  Deepaknath Tandur,et al.  Image encryption based on modified Henon map using hybrid chaotic shift transform , 2018, Multimedia Tools and Applications.

[10]  Si-Bin Qiao,et al.  An Efficient Retrieval Method of Encrypted Speech Based on Frequency Band Variance , 2018, J. Inf. Hiding Multim. Signal Process..

[11]  Christophe Rosenberger,et al.  GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates , 2019, Future Gener. Comput. Syst..

[12]  Irfan Siddavatam,et al.  Authentication Using Dynamic Question Generation , 2019 .

[13]  Mohammad Shojafar,et al.  LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT , 2019, Future Gener. Comput. Syst..

[14]  Piyush Lotia,et al.  Significance of Complementary Spectral Features for Speaker Recognition , 2013 .

[15]  Wen-Jin Hu,et al.  An efficient perceptual hashing based on improved spectral entropy for speech authentication , 2017, Multimedia Tools and Applications.

[16]  Jing Liu,et al.  A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map , 2019, Applied Sciences.

[17]  Wenqi He,et al.  A novel optical two-factor face authentication scheme , 2019 .

[18]  Rui Li,et al.  Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms , 2019, Signal Process..

[19]  Yi-Bo Huang,et al.  An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition , 2015, J. Inf. Hiding Multim. Signal Process..

[20]  Jinfeng Li,et al.  Perceptual Audio Hashing Using RT and DCT in Wavelet Domain , 2015, 2015 11th International Conference on Computational Intelligence and Security (CIS).

[21]  Qiu-Yu Zhang,et al.  Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor , 2018, Int. J. Netw. Secur..

[22]  Xingyuan Wang,et al.  Image Description With Polar Harmonic Fourier Moments , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Chuan Zhang,et al.  Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm , 2019, Inf. Sci..

[24]  Jinfeng Li,et al.  Audio Perceptual Hashing Based on NMF and MDCT Coefficients , 2015 .

[25]  Yang Zhongping,et al.  Perceptual Hashing Algorithm for Multi-Format Audio , 2016 .

[26]  Kim-Kwang Raymond Choo,et al.  Design of a provably secure biometrics-based multi-cloud-server authentication scheme , 2017, Future Gener. Comput. Syst..

[27]  Guoqiang Han,et al.  Deep Secure Quantization: On secure biometric hashing against similarity-based attacks , 2019, Signal Process..

[28]  She Kun,et al.  Speaker recognition using mel frequency cepstral coefficient and locality sensitive hashing , 2018, 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD).

[29]  Chuan Zhang,et al.  Quaternion polar harmonic Fourier moments for color images , 2018, Inf. Sci..

[30]  Yang Zhongping,et al.  An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string , 2018 .

[31]  Jian Shen,et al.  Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems , 2018, J. Ambient Intell. Humaniz. Comput..

[32]  Ruhul Amin,et al.  A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity , 2015, Journal of Medical Systems.

[33]  Ning Chen,et al.  Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorisation , 2010, IET Commun..

[34]  Radoslaw Zimroz,et al.  Novel method of informative frequency band selection for vibration signal using Nonnegative Matrix Factorization of spectrogram matrix , 2019, Mechanical Systems and Signal Processing.

[35]  Tao Zhang,et al.  A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix , 2018, Multimedia Tools and Applications.

[36]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[37]  Harmanpreet Singh Grover,et al.  A secure authentication protocol for wearable devices environment using ECC , 2019, J. Inf. Secur. Appl..

[38]  Xingming Sun,et al.  Speech authentication and content recovery scheme for security communication and storage , 2017, Telecommunication Systems.

[39]  Jin Young Kim,et al.  Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment , 2016, Cluster Computing.