<rt id="mqua8"></rt>
華中科技大學學報(自然科學版) 2020, Vol. 48 Issue (12): 32-37 DOI10.13245/j.hust.201206

欄目:自動化技術
基于混沌測量矩陣的生物哈希密文語音檢索
黃羿博 a , 王 勇 a , 張秋余 b , 陳騰飛 a
a. 西北師范大學物理與電子工程學院,甘肅 蘭州 730070
b. 蘭州理工大學計算機與通信學院,甘肅 蘭州 730050
摘要 為了解決現存語音檢索系統中明文數據的泄露問題,提高語音檢索性能、生物特征模板的安全性和隱私性,提出了一種基于混沌測量矩陣的生物哈希密文語音檢索算法.首先,用戶端對語音進行分類,再分發與類為單一映射的密鑰,通過密鑰生成358位的Rossler混沌測量矩陣,并使用該矩陣對語音特征進行特征變換,進一步二值化生成語音的哈希索引;然后,通過改進的sha256算法對語音文件進行加密;最后,將哈希索引和加密語音送至云端.實驗結果表明:提出的算法不僅能防止明文泄露,而且具有良好的魯棒性、區分性和檢索性能;與此同時,生物特征模板具備良好的多樣性、可撤銷性、安全性和隱私性.
關鍵詞 密文語音檢索 ;生物特征模板 ;生物哈希 ;Rossler混沌測量矩陣 ;改進的sha256算法
Biohashing encrypted speech retrieval based on chaotic measurement matrix
HUANG Yibo a , WANG Yong a , ZHANG Qiuyu b , CHEN Tengfei a
a. College of Physics and Electronic Engineering,Northwest Normal University,Lanzhou 730070,China
Abstract In order to solve the problem of plaintext data leakage in the existing speech retrieval system,and improve the performance of speech retrieval,the security and privacy of biometric template,a biohashing encrypted speech retrieval algorithm was proposed based on Rossler chaotic measurement matrix.First,the speech was classified by the client,and redistribute key with class as single mapping.A 358 bit Rossler chaotic measurement matrix was generated by the key,the matrix was used to transform the speech features,and the hash index of speech was generated by binarization.Then the speech file was encrypted using the improved sha256 algorithm.Finally,hash index and encrypted speech were sent to the cloud.The experimental results show that this algorithm not only can effectively prevent plaintext leakage,but also has good robustness,discrimination and retrieval performance.At the same time,biometric template has good diversity,revocability,security and privacy.
Keywords encrypted speech retrieval ; biometric template ; biohashing ; Rossler chaotic measurement matrix ; improved sha256 algorithm
基金資助國家自然科學基金資助項目(61862041);甘肅省青年科學技術基金資助項目(1606RJYA274).

中圖分類號TP391.3;TN912.3
文獻標志碼A
文章編號1671-4512(2020)12-0032-06
參考文獻
[1]SHEN Jian,CHANG Shaohua,SHEN Jun,et al.A lightweight multi-layer authentication protocol for wireless body area networks[J].Future Generation Com- puter Systems,2018,78(3):956-963.
[2]KARST SOREN M,DUEHOLM MORTEN S,MCILROY SIMON J,et al.Retrieval of a million high-quality,full-length microbial 16S and 18S rRNA gene sequences without primer bias[J].Nature Bio- technology,2018,36(2):190-199.
[3]YENIGALLA P ,KUMAR A ,TRIPATHI S,et al.
Speech emotion recognition using spectrogram & phoneme embedding[C]// Interspeech 2018.Hyderabad:Samsung R&D Institute India,2018:3688-3692.DOI:10.21437/Interspeech.2018-1811.
[4]SHEN Q,ZHAO Y.Perceptual hashing for color image based on color opponent component and quadtree structure[J].Signal Processing,2020,166:107244.
[5]WALLN?FER J,PIRKER A,ZWERGER M,et al.Multipartite state generation in quantum networks with optimal scaling[J].Scientific Reports,2019,9(1):1-18.
[6]JIANG Q,CHEN Z,LI B,et al.Security analysis and improvement of bio-hashing based three-factor aut- hentication scheme for telecare medical information systems[J].Journal of Ambient Intelligence and Hu- manized Computing,2018,9(4):1061-1073.
[7]毋立芳,馬玉琨,周鵬,等.生物特征模板保護綜述[J].儀器儀表學報,2016,37(11):2407-2420.
[8]WANG H,ZHOU L,ZHANG W ,et al.Water- marking-based perceptual hashing search over encrypted speech[C]// International Workshop on Digital Water- marking.Berlin:Springer,2013:423-434.
[9]ZHANG Q Y,GE Z X,QIAO S B.An efficient retrieval method of encrypted speech based on frequency band variance[J].Journal of Information Hiding and Mul- timedia Signal Processing,2018,9(11):1452-1463.
[10]ZHAO H,HE S.A retrieval algorithm for encrypted speech based on perceptual hashing[C]//Proc of 2016 12th International Conference on Natural Computation and 13th Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).Changsha:IEEE,2016:1840-1845.
[11]HE S,ZHAO H.A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing [J].Computer Science & Information Systems,2017,14(3):703-718.
[12]ZHANG Q Y,GE Z X,ZHOU L,et al.An efficient retrieval algorithm of encrypted speech based on inverse fast Fourier transform and measurement matrix [J].Turkish Journal of Electrical Engineering & Com- puter Sciences,2019,27(3):1719-1736.
[13]ZHANG Q Y,GE Z X,HU Y J,et al.An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction [J].Multimedia Tools and Applications,2019,79(9):1-25.
文獻來源
黃羿博, 王 勇, 張秋余, 陳騰飛. 基于混沌測量矩陣的生物哈希密文語音檢索[J]. 華中科技大學學報(自然科學版), 2020, 48(12): 32-37
DOI:10.13245/j.hust.201206
十分快三