iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11042-021-11412-y
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion | Multimedia Tools and Applications Skip to main content
Log in

A high security BioHashing encrypted speech retrieval algorithm based on feature fusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to solve the problem of plaintext data leakage, and to improve the diversity and security of biometric template, this paper proposes a high security BioHashing encrypted speech retrieval algorithm based on feature fusion, and introduces K-means-KNN fusion algorithm to classify. Firstly, the features of speech are extracted through FFT and IFFT. Secondly, the fused features are classified and a single mapping secret key is assigned to each class. The improved Marotto chaos measurement matrix is generated by the secret key, and the BioHashing sequences are generated by iterating the measurement matrix with the feature data. Then, the speech clips are classified and a single mapping secret key is assigned to each class. The SPM(sine map and piece wise linear chaotic map) chaotic sequence is generated by the secret key and the speech clips are encrypted by the sequence. Finally, hash indexes and encrypted speech clips are uploaded to the cloud, the normalized Hamming distance algorithm is used for matching retrieval on the user terminal. Experimental results show that the algorithm not only effectively prevents plaintext data leakage, but also achieves 100% retrieval accuracy for the original speech clips. Moreover, there are 18 classes of biometric templates, which have good security and key revocability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Aparna P, Kishore PVV (2019) Biometric-based efficient medical image watermarking in e-healthcare application. IET Image Proc 13(3):421–428

    Article  Google Scholar 

  2. Alweshah M, Al Khalaileh S, Gupta BB, Almomani A, Hammouri AI, Azmi Al-Betar MA (2020) The monarch butterfly optimization algorithm for solving feature selection problems. Neural Comput Applic pages 1–15

  3. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

  4. AlZu’bi S, Shehab M, Al-Ayyoub M, Jararweh Y, Gupta B (2020) Parallel implementation for 3d medical volume fuzzy segmentation. Pattern Recognit Lett 130:312–318

  5. Bai A Liang, Jiye Liang A, and Fuyuan Cao B (2020) A multiple k -means clustering ensemble algorithm to find nonlinearly separable clusters. Inf Fusion 61:36–47

  6. Chen D, Zhang W, Zhang Z, Huang W, Ao J (2017) Audio retrieval based on wavelet transform. In 2017 IEEE/ACIS 16th Int Conf Comput Inf Sci (ICIS) 531–534. IEEE

  7. Das D (2020) A minutia detection approach from direct gray-scale fingerprint image using hit-or-miss transformation. In Comput Intell Pattern Recognit 195–206. Springer

  8. Glackin C, Chollet G, Dugan N, Cannings N, Wall J, Tahir S, Ray IG, Rajarajan M (2017) Privacy preserving encrypted phonetic search of speech data. In IEEE International Conference on Acoustics pages 6414–6418. IEEE

  9. Harkeerat K, Pritee K (2018) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forensics Secur 14(3):709–719

    Google Scholar 

  10. He S, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703–718

    Article  Google Scholar 

  11. Huang Y, Hou H, Wang Y, Zhang Y, Fan M (2020) A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition. IEEE Access 8:34140–34152

    Article  Google Scholar 

  12. Huang YB, Wang Y, Zhang QY, Zhang WZ, Fan MH (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79(33):24889–24909

    Article  Google Scholar 

  13. Jiang Y, Chunxue W, Deng K, Yan W (2019) An audio fingerprinting extraction algorithm based on lifting wavelet packet and improved optimal-basis selection. Multimed Tools Appl 78(21):30011–30025

    Article  Google Scholar 

  14. Karst SM, Dueholm MS, McIlroy SJ, Kirkegaard RH, Nielsen PH, Albertsen M (2018) Retrieval of a million high-quality, full-length microbial 16s and 18s rrna gene sequences without primer bias. Nat Biotechnol 36(2):190

  15. Kashif M, Raja G, Shaukat F (2020) An efficient content-based image retrieval system for the diagnosis of lung diseases. J Digit Imaging 33(2)

  16. Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Sign Proces 14(5):955–968

  17. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput PP(99):1–1

  18. Lin CY (2019) A reversible privacy-preserving clustering technique based on k-means algorithm. Appl Soft Comput 87

    Article  Google Scholar 

  19. Li D, Yang YG, Bi JL, Yuan JB, Xu J (2018) Controlled alternate quantum walks based quantum hash function. Sci Rep 8(1):1–7

    Google Scholar 

  20. Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2020) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39–50

  21. Melnykov V, Michael S (2020) Clustering large datasets by merging k-means solutions. J Classif 37:1–27

    Article  MathSciNet  Google Scholar 

  22. Murthy YS, Koolagudi SG (2018) Content-based music information retrieval (cb-mir) and its applications toward the music industry: A review. ACM Comput Surv (CSUR) 51(3):1–46

  23. Nayak S, Panda M, Palai G (2020) Realization of optical adder circuit using photonic structure and knn algorithm. Optik 212:164675

  24. Pradhan J, Ajad A, Pal AK, Banka H (2020) Multi-level colored directional motif histograms for content-based image retrieval. Vis Comput 36(9):1847–1868

  25. Palma D, Blanchini F, Giordano G, Montessoro PL (2020) A dynamic biometric authentication algorithm for near-infrared palm vascular patterns. IEEE Access 8:118978–118988

  26. Revathi A, Jeyalakshmi C, Thenmozhi K (2019) Person authentication using speech as a biometric against play back attacks. Multimed Tools Appl 78(2):1569–1582

    Article  Google Scholar 

  27. Revathi B, Sudha GF (2018) Retrieval performance analysis of multibiometric database using optimised multidimensional spectral hashing based indexing. J King Saud Univ Comput Inf Sci pages 1319–1578

  28. Sasikaladevi N, Geetha K, Revathi A, Mahalakshmi N, Archana N (2019) Scan-speech biometric template protection based on genus-2 hyper elliptic curve. Multimed Tools Appl 78(13):18339–18361

    Article  Google Scholar 

  29. Shen Y, Feng Y, Fang B, Zhou M, Kwong S, Qiang BH (2020) DSRPH: Deep semantic-aware ranking preserving hashing for efficient multi-label image retrieval. Inf Sci 539:145–156

  30. Song X, Wang M, Qiu H, Li K, Ang C (2019) Auditory scene analysis-based feature extraction for indoor subarea localization using smartphones. IEEE Sens J 19(15):6309–6316

    Article  Google Scholar 

  31. Song J (2020) Binary generative adversarial networks for image retrieval. Int J Comput Vis pages 1–22

  32. Wadood A, Ohoud N, Sanaa G (2020) Combining watermarking and hyper-chaotic map to enhance the security of stored biometric templates. Comput J 63(3):479–493

    Article  MathSciNet  Google Scholar 

  33. Wallnöfer J, Pirker A, Zwerger M, Dür W (2019) Multipartite state generation in quantum networks with optimal scaling. Sci Rep 9(1):1–18

    Article  Google Scholar 

  34. Yang F, Mou J, Luo C, Cao Y (2019) An improved color image encryption scheme and cryptanalysis based on hyperchaotic sequence. Phys Scr 94(8)

    Article  Google Scholar 

  35. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

  36. Zhang QY, Ge ZX, Qiao SB (2018) An efficient retrieval method of encrypted speech based on frequency band variance. 9. Ubiquitous International

  37. Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825–17846

  38. Zhang Q, Ge Z, Zhou L, Zhang Y (2019) An efficient retrieval algorithm of encrypted speech based on inverse fast fourier transform and measurement matrix. Turk J Electr Eng Comput Sci 27(3):1719–1736

  39. Zhang QY, Ge ZX, Hu YJ, Bai J, Huang YB (2020) An encrypted speech retrieval algorithm based on chirp-z transform and perceptual hashing second feature extraction. Multimed Tools Appl 79(9):6337–6361

  40. Zhang QY, Li GL, Huang YB (2020) An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction. Multimed Tools Appl 79(39):29775–29798

    Article  Google Scholar 

  41. Zou F, Tang X, Li K, Wang Y, Song J, Yang S, Ling H (2018) Hidden semantic hashing for fast retrieval over large scale document collection. Multimed Tools Appl 77(3):3677–3697

    Article  Google Scholar 

  42. Zhou L, Zhao Z, Chen F (2020) Stability and hopf bifurcation analysis of a new four-dimensional hyper-chaotic system. Mod Phys Lett B 34(29):2050327

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China(No.61862041), Youth Science and Technology Fund of Gansu Province of China(No.1606RJYA274).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-bo Huang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Yb., Li, H., Wang, Y. et al. A high security BioHashing encrypted speech retrieval algorithm based on feature fusion. Multimed Tools Appl 80, 33615–33640 (2021). https://doi.org/10.1007/s11042-021-11412-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11412-y

Keywords

Navigation