Skip to main content

Watermarking-Based Perceptual Hashing Search Over Encrypted Speech

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Abstract

Privacy-preserving search over encrypted speech has come into being an important and urgent research field in cloud storage. In this paper, a speech scrambling encryption method based on the Chua’s circuit chaotic system with memristor is proposed, and then a watermarking-based perceptual hashing search algorithm over encrypted speech is proposed based on the zero-crossing rate. In the proposed scheme, the zero-crossing rate is extracted from the digital speech to generate the perceptual hashing as the search digest. The perceptual hashing digest as a watermark is embedded into the encrypted speech signal. The search results can be obtained by matching and computing the normalized Hamming distance of the perceptual hashing digests between the search target and the extracted one without loading and decrypting the encrypted speech. Experimental results show that the proposed scheme has good discrimination, uniqueness, and perceptual robustness to common speech processing. In addition, the security and computation complexity are all satisfactory. The precision ratio is 100 %, and the recall ratio is more than 98 %.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.J.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE Conference on INFOCOM, Piscataway, pp. 441–445 (2010)

    Google Scholar 

  2. Wang, C., Cao, N., Ren, K., Lou, W.J.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)

    Article  Google Scholar 

  3. Hou, S.H., Uehara, T., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Privacy preserving multiple keyword search for confidential investigation of remote forensics. In: IEEE International Conference on Multimedia Information Networking and Security, Shanghai, China, pp. 595–599 (2011)

    Google Scholar 

  4. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE Conference on INFOCOM, Washington, USA, pp. 829–837 (2011)

    Google Scholar 

  5. Ibrahim, A., Jin, H., Yassin, A.A., Zou, D.Q.: Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In: Proceedings of the IEEE Asia-Pacific Services Computing, Guilin, China, pp. 263–270 (2012)

    Google Scholar 

  6. Cheng, F.Q., Peng, Z.Y., Song, W., Wang, S.L., Cui, Y.H.: An efficient privacy-preserving rank query over encrypted data in cloud computing. Chin. J. Comput. 35(11), 2215–2227 (2012)

    Google Scholar 

  7. Li, M., Yu, S.C., Cao, N., Lou, W.J.: Authorized private keyword search over encrypted data in cloud computing. In: IEEE International Conference on Distributed Computing Systems, Minneapolis, Mongolia, pp. 383–392 (2011)

    Google Scholar 

  8. Koletka, R., Hutchison, A.: An architecture for secure searchable cloud storage. In: Proceedings of the Information Security for South Africa, Johannesburg, South Africa, pp. 1–7 (2011)

    Google Scholar 

  9. Wang, H.X., Li, J.F., Qiu, Y.: Speech authentication based on perceptual fingerprint hashing. J. Theore. Appl. Inf. Technol. 49(3), 907–912 (2013)

    MathSciNet  Google Scholar 

  10. Wang, H.X., Yin, B.Y.: Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–9 (2013)

    Google Scholar 

  11. Li, Q., Wu, W.J., He, X.: Content-based audio retrieval using perceptual hash. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 791–794 (2010)

    Google Scholar 

  12. Chua, L.O.: Memristor-the missing circuit element. IEEE Trans. Circuit Theory CT-18(5), 507–519 (1971)

    Article  Google Scholar 

  13. Lin, Z.H., Wang, H.X.: Efficient image encryption using chaos-based PWL memristor. IETE Tech. Rev. 27(4), 318–325 (2010)

    Article  Google Scholar 

  14. Lin, H., Ou, Z.J.: Switching auxiliary chains for speech recognition. IEEE Sig. Process. Lett. 14(8), 568–571 (2007)

    Article  Google Scholar 

  15. Wang, H.X., Fan, M.Q.: Centroid-based semi-fragile audio watermarking in hybrid domain. Sci. China Inform. Sci. 53(3), 619–633 (2010)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China (NSFC) under the grant Nos. 61170226, 61170175, the Fundamental Research Funds for the Central Universities under the grant Nos.SWJTU11CX047, SWJTU12ZT02, the Young Innovative Research Team of Sichuan Province under the grant No.2011JTD0007, and Chengdu Science and Technology program under the grant No. 12DXYB214JH-002.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Zhou, L., Zhang, W., Liu, S. (2014). Watermarking-Based Perceptual Hashing Search Over Encrypted Speech. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics