Security authentication method of speech perceptual hashing based on fuzzy commitment scheme | |
Zhang, Qiu-Yu; Ren, Zhan-Wei; Huang, Yi-Bo; Shuang, Yu; Hu, Wen-Jin | |
刊名 | International Journal of Security and its Applications
![]() |
2016 | |
卷号 | 10期号:1页码:229-240 |
关键词 | Algorithms Authentication Delta functions Speech Authentication algorithm Fuzzy commitment Multimedia security Original algorithms Perceptual hashing Security Security authentication Speech information |
ISSN号 | 17389976 |
DOI | 10.14257/ijsia.2016.10.1.21 |
英文摘要 | Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c),δ) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information δ (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm. © 2016 SERSC. |
WOS研究方向 | Computer Science |
语种 | 英语 |
出版者 | Science and Engineering Research Support Society |
WOS记录号 | WOS:000376639500021 |
内容类型 | 期刊论文 |
源URL | [http://ir.lut.edu.cn/handle/2XXMBERH/112456] ![]() |
专题 | 计算机与通信学院 |
作者单位 | School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China |
推荐引用方式 GB/T 7714 | Zhang, Qiu-Yu,Ren, Zhan-Wei,Huang, Yi-Bo,et al. Security authentication method of speech perceptual hashing based on fuzzy commitment scheme[J]. International Journal of Security and its Applications,2016,10(1):229-240. |
APA | Zhang, Qiu-Yu,Ren, Zhan-Wei,Huang, Yi-Bo,Shuang, Yu,&Hu, Wen-Jin.(2016).Security authentication method of speech perceptual hashing based on fuzzy commitment scheme.International Journal of Security and its Applications,10(1),229-240. |
MLA | Zhang, Qiu-Yu,et al."Security authentication method of speech perceptual hashing based on fuzzy commitment scheme".International Journal of Security and its Applications 10.1(2016):229-240. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论