Institutional Repository of Coll Comp & Commun
An encrypted speech authentication and tampering recovery method based on perceptual hashing | |
Zhang, Qiu-yu; Zhang, Deng-hai; Xu, Fu-jiu | |
2021-07 | |
发表期刊 | MULTIMEDIA TOOLS AND APPLICATIONS |
ISSN | 1380-7501 |
卷号 | 80期号:16页码:24925-24948 |
摘要 | With the progress of speech retrieval technology in the cloud, it brings a lot of conveniences for speech user. Yet, the inquiry encrypted speech results from the speech retrieval system are faced with some secure issues to settle, such as integrity authentication and tampering recovery. In this paper, an encrypted speech authentication and tampering recovery method based on perceptual hashing is proposed. Firstly, the original speech is scrambled by Duffing mapping to construct an encrypted speech library in the cloud, through extracting product of uniform sub-band spectrum variance and spectral entropy of encrypted speech and constructing a perceptual hashing sequence to generate the hashing template of the cloud. From this, a one-to-one correspondence between the encrypted speech and perceptual hashing sequence is established. Secondly, the authentication digest of encrypted speech is extracted according to the inquiry result during the retrieval. Then, the authentication digest and the perceptual hashing sequence of the hashing template in the cloud are matched by the Hamming distance algorithm. Finally, for encrypted speech that fails authentication, tampering detection and location are performed, and the tampered samples are recovered by the least square curve fitting method. The simulation results show that the proposed method can extract the authentication digest directly in the encrypted speech, and the authentication digest not only has good discrimination and robustness, but it accurately locates the tampered area for malicious substitution and mute attacks. In addition, the proposed method can recover tampered speech signals in high quality without any extra information. |
关键词 | Encrypted speech authentication Perceptual hashing Least square curve fitting Tampering location Tampering recovery |
DOI | 10.1007/s11042-021-10905-0 |
收录类别 | SCIE ; SCOPUS ; EI |
语种 | 英语 |
WOS研究方向 | Computer Science ; Engineering |
WOS类目 | Computer Science, Information Systems ; Computer Science, Software Engineering ; Computer Science, Theory & Methods ; Engineering, Electrical & Electronic |
WOS记录号 | WOS:000639518700003 |
出版者 | SPRINGER |
EI入藏号 | 20211710243659 |
EI主题词 | Cryptography |
EI分类号 | 405.3 Surveying - 723 Computer Software, Data Handling and Applications - 751.5 Speech - 921.6 Numerical Methods |
来源库 | WOS |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://ir.lut.edu.cn/handle/2XXMBERH/148262 |
专题 | 计算机与通信学院 |
通讯作者 | Zhang, Qiu-yu |
作者单位 | Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China |
第一作者单位 | 兰州理工大学 |
通讯作者单位 | 兰州理工大学 |
第一作者的第一单位 | 兰州理工大学 |
推荐引用方式 GB/T 7714 | Zhang, Qiu-yu,Zhang, Deng-hai,Xu, Fu-jiu. An encrypted speech authentication and tampering recovery method based on perceptual hashing[J]. MULTIMEDIA TOOLS AND APPLICATIONS,2021,80(16):24925-24948. |
APA | Zhang, Qiu-yu,Zhang, Deng-hai,&Xu, Fu-jiu.(2021).An encrypted speech authentication and tampering recovery method based on perceptual hashing.MULTIMEDIA TOOLS AND APPLICATIONS,80(16),24925-24948. |
MLA | Zhang, Qiu-yu,et al."An encrypted speech authentication and tampering recovery method based on perceptual hashing".MULTIMEDIA TOOLS AND APPLICATIONS 80.16(2021):24925-24948. |
条目包含的文件 | 下载所有文件 | |||||
文件名称/大小 | 文献类型 | 版本类型 | 开放类型 | 使用许可 | ||
Zhang-2021-An encryp(1896KB) | 期刊论文 | 出版稿 | 开放获取 | CC BY-NC-SA | 浏览 下载 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论