CORC  > 兰州理工大学  > 兰州理工大学  > 计算机与通信学院
Security authentication method of speech perceptual hashing based on fuzzy commitment scheme
Zhang, Qiu-Yu; Ren, Zhan-Wei; Huang, Yi-Bo; Shuang, Yu; Hu, Wen-Jin
刊名International Journal of Security and its Applications
2016
卷号10期号:1页码:229-240
关键词Algorithms Authentication Delta functions Speech Authentication algorithm Fuzzy commitment Multimedia security Original algorithms Perceptual hashing Security Security authentication Speech information
ISSN号17389976
DOI10.14257/ijsia.2016.10.1.21
英文摘要Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c),δ) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information δ (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm. © 2016 SERSC.
WOS研究方向Computer Science
语种英语
出版者Science and Engineering Research Support Society
WOS记录号WOS:000376639500021
内容类型期刊论文
源URL[http://ir.lut.edu.cn/handle/2XXMBERH/112456]  
专题计算机与通信学院
作者单位School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China
推荐引用方式
GB/T 7714
Zhang, Qiu-Yu,Ren, Zhan-Wei,Huang, Yi-Bo,et al. Security authentication method of speech perceptual hashing based on fuzzy commitment scheme[J]. International Journal of Security and its Applications,2016,10(1):229-240.
APA Zhang, Qiu-Yu,Ren, Zhan-Wei,Huang, Yi-Bo,Shuang, Yu,&Hu, Wen-Jin.(2016).Security authentication method of speech perceptual hashing based on fuzzy commitment scheme.International Journal of Security and its Applications,10(1),229-240.
MLA Zhang, Qiu-Yu,et al."Security authentication method of speech perceptual hashing based on fuzzy commitment scheme".International Journal of Security and its Applications 10.1(2016):229-240.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace