Advertisement

SCAN-speech biometric template protection based on genus-2 hyper elliptic curve

  • N. SasikaladeviEmail author
  • K. Geetha
  • A. Revathi
  • N. Mahalakshmi
  • N. Archana
Article
  • 28 Downloads

Abstract

Rapid growth in the mobile technology manifolds the usage of mobile devices. It leads to the development and popularity of mobile application in diversified domains like finance, commerce, and government services. Extensive services can be explored conveniently and cost-effectively from these applications using speaker recognition based authentication to determine the identity of the individuals requesting service. Speech template that is stored in these mobile devices necessitates the prime concern of preserving the private data from unauthorized access and privacy breaches. It is highly feasible to prove the authenticity of the person using speech as a biometric to ensure that the rendered services are accessed only by the legitimate user. If the speech template stored in the database for comparison is compromised, then the authentication process will become obsolete. This issue had motivated the need for highly secured, faster and lightweight model named as (SCAN) - Speech biometriC templAte protectioN system based on the genus-2 hyper elliptic curve. Mobile devices are smaller in size and often restricted by memory and power constraints. Hence it requires a cryptosystem with lesser key size offering the higher degree of security and guard against sophisticated attacks. The proposed SCAN system provides the complete solution for this challenge uniquely by designing genus-2 hyper elliptic curve cryptosystem for speech template. The elaborate analysis from the results traces ideal values for MSE, PSNR, BRT, and EUD. This ratifies the suitability of this work that craves for higher encryption and decryption reliability. It offers high resistance to various attacks as it involves HECC that comes under the category of discrete logarithmic problem. This SCAN system can also reap the benefit of light weight processing, better ERR and authentication accuracy with induced parallelism.

Keywords

Hyper elliptic curve Divisor Cantor algorithm Mumford representation 

Notes

Acknowledgements

This part of this research work is supported by Department of Science and Technology (DST), Science and Engineering Board (SERB), Government of India under the ECR grant (ECR/2017/000679/ES)

References

  1. 1.
    Ali Z et al (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76–87CrossRefGoogle Scholar
  2. 2.
    Billeb S et al (2015) Biometric template protection for speaker recognition based on universal background models. IET Biomet 4.2:116–126CrossRefGoogle Scholar
  3. 3.
    Chee K-Y et al (2018) Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recogn 76:273–287CrossRefGoogle Scholar
  4. 4.
    Feng YC, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. Biometric Technology for Human Identification V. Vol. 6944. International Society for Optics and PhotonicsGoogle Scholar
  5. 5.
    Hermansky H, Morgan N (1994) RASTA processing of speech. IEEE Trans Speech Audio Process 2.4:578–589CrossRefGoogle Scholar
  6. 6.
    Hermansky H et al. (1986) Perceptually-based processing in automatic speech recognition. Acoust Speech Signal Process. IEEE Int Conf ICASSP'86 11. IEEEGoogle Scholar
  7. 7.
    Hermansky H et al. (1991) The challenge of inverse-E: the RASTA-PLP method. Signals, Systems and Computers. 1991 Conference Record of the Twenty-Fifth Asilomar Conference on. IEEEGoogle Scholar
  8. 8.
    Inthavisas K, Lopresti D (2011) Speech cryptographic key regeneration based on the password. Biometrics (IJCB), 2011 International Joint Conference on. IEEEGoogle Scholar
  9. 9.
    Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45.11:87–92CrossRefGoogle Scholar
  10. 10.
    Jain AK, Ross A, Uludag U (2005) Biometric template security: challenges and solutions. Sign Process Conf 2005 13th European. IEEEGoogle Scholar
  11. 11.
    Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Sign Process 2008:113Google Scholar
  12. 12.
    Jin Z et al (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50–62CrossRefGoogle Scholar
  13. 13.
    Johnson RC, Scheirer WJ, Boult TE (2013) Secure voice-based authentication for mobile devices: vaulted voice verification. Biometric and Surveillance Technology for Human and Activity Identification X. Vol. 8712. International Society for Optics and PhotonicsGoogle Scholar
  14. 14.
    Juels A, Madhu S (2006) A fuzzy vault scheme. Des Codes Crypt 38.2:237–257MathSciNetCrossRefGoogle Scholar
  15. 15.
    Juels A, Wattenberg M (1999) A fuzzy commitment scheme. Proceedings of the 6th ACM conference on Computer and communications security. ACMGoogle Scholar
  16. 16.
    Lan X, Ma AJ, Yuen PC, Chellappa R (2015) Joint sparse representation and robust feature-level fusion for multi-cue visual tracking. IEEE Trans Image Process 24(12):5826–5841MathSciNetCrossRefGoogle Scholar
  17. 17.
    Lan X, Zhang S, Yuen PC (2016) Robust joint discriminative feature learning for visual tracking. IJCAI: 3403–3410Google Scholar
  18. 18.
    Lan, X, Yuen PC, Chellappa R (2017) Robust MIL-based feature template learning for object tracking. AAAI: 4118–4125Google Scholar
  19. 19.
    Lan X, Zhang S, Yuen PC, Chellappa R (2018) Learning common and feature-specific patterns: a novel multiple-sparse-representation-based tracker. IEEE Trans Image Process 27(4):2022–2037MathSciNetCrossRefGoogle Scholar
  20. 20.
    Lan X, Ye M, Zhang S, Zhou H, Yuen PC (2018) Modality-correlation-aware sparse representation for RGB-infrared object tracking. Pattern Recogn LettGoogle Scholar
  21. 21.
    Lan X, Ye M, Zhang S, Yuen PC (2018) Robust collaborative discriminative learning for RGB-infrared tracking. AAAIGoogle Scholar
  22. 22.
    Mwema J, Kimwele M, Kimani S (2015) A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates. Int J Comput Trends Technol 20.1:12–18CrossRefGoogle Scholar
  23. 23.
    Mwema J, Kimani S, Kimwele M (2015) A study of approaches and measures aimed at securing biometric fingerprint templates in verification and identification systems. Int J Comput Appl Technol Res 4.2:108–119Google Scholar
  24. 24.
    Nandakumar K, Jain AK (2015) Biometric template protection: Bridging the performance gap between theory and practice. IEEE Signal Process Mag 32.5:88–100CrossRefGoogle Scholar
  25. 25.
    Pauline M et al. (2016) Multi-bit allocation: preparing voice biometrics for template protection. OdysseyGoogle Scholar
  26. 26.
    Rabiner LR, Juang B-H (1993) Fundamentals of speech recognition Vol. 14. PTR Prentice Hall, Englewood cliffsGoogle Scholar
  27. 27.
    Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Sec 2011.1:3CrossRefGoogle Scholar
  28. 28.
    Revathi A, Venkataramani Y (2011) Speaker independent continuous speech and isolated digit recognition using VQ and HMM. Commun Signal Process (ICCSP), 2011 Int Conf IEEEGoogle Scholar
  29. 29.
    Soutar C et al. (1999) Biometric encryption ICSA Guide to Cryptography: 649–675Google Scholar
  30. 30.
    Unar JA, Seng WC, Abbasi A (2014) A review of biometric technology along with trends and prospects. Pattern Recogn 47.8:2673–2688CrossRefGoogle Scholar
  31. 31.
    Weng A (2003) Constructing hyperelliptic curves of genus two suitable for cryptography. Math Comput 72.241:435–458zbMATHGoogle Scholar
  32. 32.
    Zhu H-H, He Q-H, Li Y-X (2012) A two-step hybrid approach for voiceprint-biometric template protection. Machine Learning and Cybernetics (ICMLC), 2012 International Conf 2. IEEEGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of CSE, School of ComputingSASTRA Deemed UniversityThanjavurIndia
  2. 2.Department of ECESchool of EEE SASTRA Deemed UniversityThanjavurIndia

Personalised recommendations