Skip to main content

2014 | OriginalPaper | Buchkapitel

Watermarking-Based Perceptual Hashing Search Over Encrypted Speech

verfasst von : Hongxia Wang, Linna Zhou, Wei Zhang, Shuang Liu

Erschienen in: Digital-Forensics and Watermarking

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy-preserving search over encrypted speech has come into being an important and urgent research field in cloud storage. In this paper, a speech scrambling encryption method based on the Chua’s circuit chaotic system with memristor is proposed, and then a watermarking-based perceptual hashing search algorithm over encrypted speech is proposed based on the zero-crossing rate. In the proposed scheme, the zero-crossing rate is extracted from the digital speech to generate the perceptual hashing as the search digest. The perceptual hashing digest as a watermark is embedded into the encrypted speech signal. The search results can be obtained by matching and computing the normalized Hamming distance of the perceptual hashing digests between the search target and the extracted one without loading and decrypting the encrypted speech. Experimental results show that the proposed scheme has good discrimination, uniqueness, and perceptual robustness to common speech processing. In addition, the security and computation complexity are all satisfactory. The precision ratio is 100 %, and the recall ratio is more than 98 %.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.J.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE Conference on INFOCOM, Piscataway, pp. 441–445 (2010) Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.J.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE Conference on INFOCOM, Piscataway, pp. 441–445 (2010)
2.
Zurück zum Zitat Wang, C., Cao, N., Ren, K., Lou, W.J.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRef Wang, C., Cao, N., Ren, K., Lou, W.J.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRef
3.
Zurück zum Zitat Hou, S.H., Uehara, T., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Privacy preserving multiple keyword search for confidential investigation of remote forensics. In: IEEE International Conference on Multimedia Information Networking and Security, Shanghai, China, pp. 595–599 (2011) Hou, S.H., Uehara, T., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Privacy preserving multiple keyword search for confidential investigation of remote forensics. In: IEEE International Conference on Multimedia Information Networking and Security, Shanghai, China, pp. 595–599 (2011)
4.
Zurück zum Zitat Cao, N., Wang, C., Li, M., Ren, K., Lou, W.J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE Conference on INFOCOM, Washington, USA, pp. 829–837 (2011) Cao, N., Wang, C., Li, M., Ren, K., Lou, W.J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE Conference on INFOCOM, Washington, USA, pp. 829–837 (2011)
5.
Zurück zum Zitat Ibrahim, A., Jin, H., Yassin, A.A., Zou, D.Q.: Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In: Proceedings of the IEEE Asia-Pacific Services Computing, Guilin, China, pp. 263–270 (2012) Ibrahim, A., Jin, H., Yassin, A.A., Zou, D.Q.: Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In: Proceedings of the IEEE Asia-Pacific Services Computing, Guilin, China, pp. 263–270 (2012)
6.
Zurück zum Zitat Cheng, F.Q., Peng, Z.Y., Song, W., Wang, S.L., Cui, Y.H.: An efficient privacy-preserving rank query over encrypted data in cloud computing. Chin. J. Comput. 35(11), 2215–2227 (2012) Cheng, F.Q., Peng, Z.Y., Song, W., Wang, S.L., Cui, Y.H.: An efficient privacy-preserving rank query over encrypted data in cloud computing. Chin. J. Comput. 35(11), 2215–2227 (2012)
7.
Zurück zum Zitat Li, M., Yu, S.C., Cao, N., Lou, W.J.: Authorized private keyword search over encrypted data in cloud computing. In: IEEE International Conference on Distributed Computing Systems, Minneapolis, Mongolia, pp. 383–392 (2011) Li, M., Yu, S.C., Cao, N., Lou, W.J.: Authorized private keyword search over encrypted data in cloud computing. In: IEEE International Conference on Distributed Computing Systems, Minneapolis, Mongolia, pp. 383–392 (2011)
8.
Zurück zum Zitat Koletka, R., Hutchison, A.: An architecture for secure searchable cloud storage. In: Proceedings of the Information Security for South Africa, Johannesburg, South Africa, pp. 1–7 (2011) Koletka, R., Hutchison, A.: An architecture for secure searchable cloud storage. In: Proceedings of the Information Security for South Africa, Johannesburg, South Africa, pp. 1–7 (2011)
9.
Zurück zum Zitat Wang, H.X., Li, J.F., Qiu, Y.: Speech authentication based on perceptual fingerprint hashing. J. Theore. Appl. Inf. Technol. 49(3), 907–912 (2013)MathSciNet Wang, H.X., Li, J.F., Qiu, Y.: Speech authentication based on perceptual fingerprint hashing. J. Theore. Appl. Inf. Technol. 49(3), 907–912 (2013)MathSciNet
10.
Zurück zum Zitat Wang, H.X., Yin, B.Y.: Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–9 (2013) Wang, H.X., Yin, B.Y.: Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–9 (2013)
11.
Zurück zum Zitat Li, Q., Wu, W.J., He, X.: Content-based audio retrieval using perceptual hash. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 791–794 (2010) Li, Q., Wu, W.J., He, X.: Content-based audio retrieval using perceptual hash. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 791–794 (2010)
12.
Zurück zum Zitat Chua, L.O.: Memristor-the missing circuit element. IEEE Trans. Circuit Theory CT-18(5), 507–519 (1971)CrossRef Chua, L.O.: Memristor-the missing circuit element. IEEE Trans. Circuit Theory CT-18(5), 507–519 (1971)CrossRef
13.
Zurück zum Zitat Lin, Z.H., Wang, H.X.: Efficient image encryption using chaos-based PWL memristor. IETE Tech. Rev. 27(4), 318–325 (2010)CrossRef Lin, Z.H., Wang, H.X.: Efficient image encryption using chaos-based PWL memristor. IETE Tech. Rev. 27(4), 318–325 (2010)CrossRef
14.
Zurück zum Zitat Lin, H., Ou, Z.J.: Switching auxiliary chains for speech recognition. IEEE Sig. Process. Lett. 14(8), 568–571 (2007)CrossRef Lin, H., Ou, Z.J.: Switching auxiliary chains for speech recognition. IEEE Sig. Process. Lett. 14(8), 568–571 (2007)CrossRef
15.
Zurück zum Zitat Wang, H.X., Fan, M.Q.: Centroid-based semi-fragile audio watermarking in hybrid domain. Sci. China Inform. Sci. 53(3), 619–633 (2010)CrossRefMATH Wang, H.X., Fan, M.Q.: Centroid-based semi-fragile audio watermarking in hybrid domain. Sci. China Inform. Sci. 53(3), 619–633 (2010)CrossRefMATH
Metadaten
Titel
Watermarking-Based Perceptual Hashing Search Over Encrypted Speech
verfasst von
Hongxia Wang
Linna Zhou
Wei Zhang
Shuang Liu
Copyright-Jahr
2014
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-43886-2_30

Premium Partner