Skip to main content
Erschienen in: International Journal of Speech Technology 4/2017

10.10.2017

Performance enhancement of speaker identification systems using speech encryption and cancelable features

verfasst von: Naglaa F. Soliman, Zhraa Mostfa, Fathi E. Abd El-Samie, Mahmoud I. Abdalla

Erschienen in: International Journal of Speech Technology | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Biometric systems based on speech features constitute a new and evolving trend in security. This paper is concerned with speaker identification systems. It studies traditional speaker identification systems based on cepstral analysis and neural classification. The paper develops the idea of remote access systems with speaker identification concepts by introducing efficient cryptosystems to achieve a large degree of security in these remote access speaker identification systems. The proposed approaches depend on chaos theory to maintain a low sensitivity to noise effect. Moreover, the concepts of cancelable biometrics are developed in this paper for more secure speaker identification. As known in the literature, cancelable image biometrics are used to save the features of the users from being stolen. If a similar approach is adopted in wireless access speaker identification systems as in this paper, the security can be enhanced to a great extent.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahmed, J., & Ikram, N. Frequency-domain speech scrambling/descrambling techniques implementation and evaluation on DSP, INMIC 2003. 7th International Multi Topic Conference, pp. 44–48, 9-9 Dec 2003. Ahmed, J., & Ikram, N. Frequency-domain speech scrambling/descrambling techniques implementation and evaluation on DSP, INMIC 2003. 7th International Multi Topic Conference, pp. 44–48, 9-9 Dec 2003.
Zurück zum Zitat Al Saad, S. N., & Eman, H. (2014) A speech encryption based on chaotic maps. International Journal of Computer Applications, 93(4). Al Saad, S. N., & Eman, H. (2014) A speech encryption based on chaotic maps. International Journal of Computer Applications, 93(4).
Zurück zum Zitat Campbell, J. P. (1997). Speaker recognition: a tutorial. Proceedings of the IEEE, 85(9), 1437–1462.CrossRef Campbell, J. P. (1997). Speaker recognition: a tutorial. Proceedings of the IEEE, 85(9), 1437–1462.CrossRef
Zurück zum Zitat Del Re, E., Fantacci, R., & Maffucci, D. (1989). A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE Journal, 7, 474–480. Del Re, E., Fantacci, R., & Maffucci, D. (1989). A new speech signal scrambling method for secure communications: theory, implementation, and security evaluation. IEEE Journal, 7, 474–480.
Zurück zum Zitat Dreyfus, G. (2005). Neural networks methodology and applications. Berlin: Springer-Verlag.MATH Dreyfus, G. (2005). Neural networks methodology and applications. Berlin: Springer-Verlag.MATH
Zurück zum Zitat Ding, H., Xie, C., & Zeng, L. The correlation between signal distance and consonant pronunciation in mandarin words, Chinese Spoken Language Processing (ISCSLP), 2016 10th International Symposium Conference: 17–20 Oct. 2016, IEEE Xplore: 04 May 2017. Ding, H., Xie, C., & Zeng, L. The correlation between signal distance and consonant pronunciation in mandarin words, Chinese Spoken Language Processing (ISCSLP), 2016 10th International Symposium Conference: 17–20 Oct. 2016, IEEE Xplore: 04 May 2017.
Zurück zum Zitat Farge, M., Kevlahan, N., Perrier, V., & Goirand, E. (1996). Wavelets and turbulence. IEEE, 84(4), 639–669.CrossRef Farge, M., Kevlahan, N., Perrier, V., & Goirand, E. (1996). Wavelets and turbulence. IEEE, 84(4), 639–669.CrossRef
Zurück zum Zitat Flayh N. A., & Ahson S. I. Wavelet based image encryption, Proceedings of the 9th International Conference on Signal Processing (ICSP), pp. 797–800, 2008. Flayh N. A., & Ahson S. I. Wavelet based image encryption, Proceedings of the 9th International Conference on Signal Processing (ICSP), pp. 797–800, 2008.
Zurück zum Zitat Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.CrossRefMathSciNetMATH Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.CrossRefMathSciNetMATH
Zurück zum Zitat Furui, S. (1981). Cepstral analysis technique for automatic speaker verification. IEEE Transactions of Acoustics and Signal Processing, 29(2), 254–272.CrossRef Furui, S. (1981). Cepstral analysis technique for automatic speaker verification. IEEE Transactions of Acoustics and Signal Processing, 29(2), 254–272.CrossRef
Zurück zum Zitat Furui, S. (1996). An overview of speaker recognition technology. The Kluwer International Series in Engineering and Computer Science, 355, 31–55.CrossRef Furui, S. (1996). An overview of speaker recognition technology. The Kluwer International Series in Engineering and Computer Science, 355, 31–55.CrossRef
Zurück zum Zitat Ganesan, K., Muthukumar, R., & Murali, K. Look up table based chaotic for audio, IEEE Asia Pacific Conference on Circuits and Systems APCCAS 2006, pp. 1951–1954, 4-7 Dec 2006. Ganesan, K., Muthukumar, R., & Murali, K. Look up table based chaotic for audio, IEEE Asia Pacific Conference on Circuits and Systems APCCAS 2006, pp. 1951–1954, 4-7 Dec 2006.
Zurück zum Zitat Ghosh, J., Love, B. J., Vining, J., & Sun, X. Automatic speaker recognition using neural network, EE371D Intro. To Neural Networks Electrical and Computer Engineering Department, The University of Texas at Austin, Spring 2004, pp. 1–25, 2004. Ghosh, J., Love, B. J., Vining, J., & Sun, X. Automatic speaker recognition using neural network, EE371D Intro. To Neural Networks Electrical and Computer Engineering Department, The University of Texas at Austin, Spring 2004, pp. 1–25, 2004.
Zurück zum Zitat Goldburg, B., Sridharan, S., & Dawson, E. (1991). On the use of a frequency domain vector codebook for the cryptanalysis of analog speech scramblers. IEEE International Symposium on Circuits and Systems, 1, 328–331. Goldburg, B., Sridharan, S., & Dawson, E. (1991). On the use of a frequency domain vector codebook for the cryptanalysis of analog speech scramblers. IEEE International Symposium on Circuits and Systems, 1, 328–331.
Zurück zum Zitat Goldburg, B., Sridharan, S., & Dawson, E. (1990). Speech encryption in the transform domain. Electronics Letters, 26(10), 655–657.CrossRef Goldburg, B., Sridharan, S., & Dawson, E. (1990). Speech encryption in the transform domain. Electronics Letters, 26(10), 655–657.CrossRef
Zurück zum Zitat Goldburg, B., Sridharan, S., & Dawson, E. (1993) Design and cryptanalysis of transform-based analog speech scramblers. IEEE on Select Areas on Communications, 11(5), 735–744.CrossRef Goldburg, B., Sridharan, S., & Dawson, E. (1993) Design and cryptanalysis of transform-based analog speech scramblers. IEEE on Select Areas on Communications, 11(5), 735–744.CrossRef
Zurück zum Zitat Goldburg, B., Sridharan, S., & Dawson, E. (1993). Cryptanalysis of frequency domain analogue speech scramblers. IEEE Proceedings Communications Speech and Vision, 140(40), 235–239.CrossRef Goldburg, B., Sridharan, S., & Dawson, E. (1993). Cryptanalysis of frequency domain analogue speech scramblers. IEEE Proceedings Communications Speech and Vision, 140(40), 235–239.CrossRef
Zurück zum Zitat Goniotakis, A., & Elhakeem, A. (1990). Security evaluation of a new analog speech privacy/scrambling device using hopping filters. IEEE Journal on Selected Areas in Communications, 8(5), 781–799.CrossRef Goniotakis, A., & Elhakeem, A. (1990). Security evaluation of a new analog speech privacy/scrambling device using hopping filters. IEEE Journal on Selected Areas in Communications, 8(5), 781–799.CrossRef
Zurück zum Zitat Gupta, S., Jaafar, J., Ahmad, W. F. W., & Bansal A. (2013) Feature extraction using MFCC. Signal & Image Processing: An International Journal (SIPIJ), 4(4), 101. Gupta, S., Jaafar, J., Ahmad, W. F. W., & Bansal A. (2013) Feature extraction using MFCC. Signal & Image Processing: An International Journal (SIPIJ), 4(4), 101.
Zurück zum Zitat Haykin, S. (2007). Neural networks: A comprehensive foundation (3rd edn.). Upper Saddle River: Prentice Hall International, Inc.MATH Haykin, S. (2007). Neural networks: A comprehensive foundation (3rd edn.). Upper Saddle River: Prentice Hall International, Inc.MATH
Zurück zum Zitat Haykin, S. (1994). Neural networks: A comprehensive foundation. International Journal of Neural Systems, 5(4), 363–364.CrossRefMATH Haykin, S. (1994). Neural networks: A comprehensive foundation. International Journal of Neural Systems, 5(4), 363–364.CrossRefMATH
Zurück zum Zitat Hossain, M. M., Ahmed, B., & Asrafi, M. A real time speaker identification using artificial neural network, IEEE Computer and information technology, pp. 1–5, 27–29, Dec 2007. Hossain, M. M., Ahmed, B., & Asrafi, M. A real time speaker identification using artificial neural network, IEEE Computer and information technology, pp. 1–5, 27–29, Dec 2007.
Zurück zum Zitat Kohad H., Ingle V. R., & Gaikwad M. A. (2012). An overview of speech encryption techniques, International Journal of Engineering Research and Development, 3(4), 29–32. Kohad H., Ingle V. R., & Gaikwad M. A. (2012). An overview of speech encryption techniques, International Journal of Engineering Research and Development, 3(4), 29–32.
Zurück zum Zitat Kurzekar, P. K., Deshmukh, R. R., Waghmare, V. B., & Shrishrimal, P. P. (2014). A comparative study of feature extraction techniques for speech recognition system. IJIRSET, 3, 18006–18016.CrossRef Kurzekar, P. K., Deshmukh, R. R., Waghmare, V. B., & Shrishrimal, P. P. (2014). A comparative study of feature extraction techniques for speech recognition system. IJIRSET, 3, 18006–18016.CrossRef
Zurück zum Zitat Lee, L. S., Chou, G. C., & Chang, C. S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32(4), 444–456.CrossRef Lee, L. S., Chou, G. C., & Chang, C. S. (1984). A new frequency domain speech scrambling system which does not require frame synchronization. IEEE Transactions on Communications, 32(4), 444–456.CrossRef
Zurück zum Zitat Lee, L. S., & Chou, G. C. (2006) A new time domain speech scrambling system which does not require frame synchronization. IEEE Journal on Selected Areas in Communications, 2(3), 443–455. Lee, L. S., & Chou, G. C. (2006) A new time domain speech scrambling system which does not require frame synchronization. IEEE Journal on Selected Areas in Communications, 2(3), 443–455.
Zurück zum Zitat Li, H., Qin, Z., Shao, L., & Wang, B. A Novel Audio Scrambling Algorithm in Variable Dimension Space, 11th International Conference on Advanced Communication Technology ICACT 2009, vol. 03, pp. 1647–1651, 15–18 February, 2009. Li, H., Qin, Z., Shao, L., & Wang, B. A Novel Audio Scrambling Algorithm in Variable Dimension Space, 11th International Conference on Advanced Communication Technology ICACT 2009, vol. 03, pp. 1647–1651, 15–18 February, 2009.
Zurück zum Zitat Ma, F., Cheng, J., & Wang, Y. (1996) Wavelet transform-based analogue speech scrambling scheme. Electronics Letters, 32(8), 719–721.CrossRef Ma, F., Cheng, J., & Wang, Y. (1996) Wavelet transform-based analogue speech scrambling scheme. Electronics Letters, 32(8), 719–721.CrossRef
Zurück zum Zitat Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. Proceedings IEEE, International Conference Multimedia and Expo, vol. 1, pp. 553–556, August, 2002. Manjunath, G., & Anand, G. V. (2002). Speech encryption using circulant transformations. Proceedings IEEE, International Conference Multimedia and Expo, vol. 1, pp. 553–556, August, 2002.
Zurück zum Zitat Milton, R. M. A time and frequency-domain speech scrambler, COMSIG 1989 Proceedings, Southern African Conference, pp. 125–130, June 1989 Milton, R. M. A time and frequency-domain speech scrambler, COMSIG 1989 Proceedings, Southern African Conference, pp. 125–130, June 1989
Zurück zum Zitat Muda, L., Begam, M., & Elamvazuthi, I. (2010). Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. Journal of Computing, 2. Muda, L., Begam, M., & Elamvazuthi, I. (2010). Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. Journal of Computing, 2.
Zurück zum Zitat Neville, K. L., & Hussain, Z. M. Effect of wavelet compression of speech on its Mel Cepstral coefficients, international Conference on Communication, Computer and Power (ICCCP’09), Muscat, PP. 387–390, Feb 2009. Neville, K. L., & Hussain, Z. M. Effect of wavelet compression of speech on its Mel Cepstral coefficients, international Conference on Communication, Computer and Power (ICCCP’09), Muscat, PP. 387–390, Feb 2009.
Zurück zum Zitat Pawar, R. V., Kajave, P. P., & Mali, S. N., Speaker Identification using Neural Networks, Proceedings of World academy of science, Engineering and technology, Vol. 7, ISSN 1307–6884, 2005. Pawar, R. V., Kajave, P. P., & Mali, S. N., Speaker Identification using Neural Networks, Proceedings of World academy of science, Engineering and technology, Vol. 7, ISSN 1307–6884, 2005.
Zurück zum Zitat Phillips, V. J., Lee, M. H., & Thomas, J. E. (1971) Speech scrambling by the re-ordering of amplitude samples. Radio and Electronic Engineer, 41, 99–112.CrossRef Phillips, V. J., Lee, M. H., & Thomas, J. E. (1971) Speech scrambling by the re-ordering of amplitude samples. Radio and Electronic Engineer, 41, 99–112.CrossRef
Zurück zum Zitat Pohl, C., & van Genderen, J. L. (1998). Multisensor image fusion in remote sensing: Concepts, methods and application. International Journal of Remote Sensing, 19, 823–854.CrossRef Pohl, C., & van Genderen, J. L. (1998). Multisensor image fusion in remote sensing: Concepts, methods and application. International Journal of Remote Sensing, 19, 823–854.CrossRef
Zurück zum Zitat Prochazka, A., Uhlir, J., Payner, P. J. W., & Kingsbury, N. J. (1998). Signal analysis and prediction. New York: Birkhauser Inc.CrossRef Prochazka, A., Uhlir, J., Payner, P. J. W., & Kingsbury, N. J. (1998). Signal analysis and prediction. New York: Birkhauser Inc.CrossRef
Zurück zum Zitat Reynolds, D. A. An overview of automatic speaker recognition technology, Proceedings IEEE international conference on Acoustics, Speech and Signal Processing (ICASSP), Vol. 4, pp. 4072–4075, 13–17 May 2002. Reynolds, D. A. An overview of automatic speaker recognition technology, Proceedings IEEE international conference on Acoustics, Speech and Signal Processing (ICASSP), Vol. 4, pp. 4072–4075, 13–17 May 2002.
Zurück zum Zitat Saha, G., & Kumar, P. (2004). A comparative study of feature extraction algorithms on ANN based speaker model for speaker recognition application (Vol. 3773, pp. 1192–1197). Berlin: LNCS, Springer-verlag. Saha, G., & Kumar, P. (2004). A comparative study of feature extraction algorithms on ANN based speaker model for speaker recognition application (Vol. 3773, pp. 1192–1197). Berlin: LNCS, Springer-verlag.
Zurück zum Zitat Sharma, A., Singh, S. P., & Kumar, V. Text-independent speaker identification using backpropagation MLP network classifier for a closed set of speakers, IEEE International Symposium on Signal Processing and Information Technology, pp. 665–669, 2005. Sharma, A., Singh, S. P., & Kumar, V. Text-independent speaker identification using backpropagation MLP network classifier for a closed set of speakers, IEEE International Symposium on Signal Processing and Information Technology, pp. 665–669, 2005.
Zurück zum Zitat Shuling, L., & Wang, C. Nonspecific speech recognition method based on composite LV and LVQ2 network, Chinese Control and Decision Conference (CCDC), pp. 2304–2388, 2009. Shuling, L., & Wang, C. Nonspecific speech recognition method based on composite LV and LVQ2 network, Chinese Control and Decision Conference (CCDC), pp. 2304–2388, 2009.
Zurück zum Zitat Stallings, W. (2017) Cryptography and network, security: Principles and practice (7th edn.). Upper Saddle River: Prentice-Hall. Stallings, W. (2017) Cryptography and network, security: Principles and practice (7th edn.). Upper Saddle River: Prentice-Hall.
Zurück zum Zitat Stallings, W. (1999) Cryptography and network, security: Principles and practice. Upper Saddle River: Prentice-Hall. Stallings, W. (1999) Cryptography and network, security: Principles and practice. Upper Saddle River: Prentice-Hall.
Zurück zum Zitat Wang, A., Sun, H. J., & Guan, Y. Y. The application of wavelet transform to multi-modality medical image fusion, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, (ICNSC), pp. 270–274, 2006. Wang, A., Sun, H. J., & Guan, Y. Y. The application of wavelet transform to multi-modality medical image fusion, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, (ICNSC), pp. 270–274, 2006.
Zurück zum Zitat Yue, W., Gelan, Y., Huixia, J., & Joseph, P. N. (2012). Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21(1):013014CrossRef Yue, W., Gelan, Y., Huixia, J., & Joseph, P. N. (2012). Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21(1):013014CrossRef
Metadaten
Titel
Performance enhancement of speaker identification systems using speech encryption and cancelable features
verfasst von
Naglaa F. Soliman
Zhraa Mostfa
Fathi E. Abd El-Samie
Mahmoud I. Abdalla
Publikationsdatum
10.10.2017
Verlag
Springer US
Erschienen in
International Journal of Speech Technology / Ausgabe 4/2017
Print ISSN: 1381-2416
Elektronische ISSN: 1572-8110
DOI
https://doi.org/10.1007/s10772-017-9435-z

Weitere Artikel der Ausgabe 4/2017

International Journal of Speech Technology 4/2017 Zur Ausgabe

Neuer Inhalt