Abstract
Privacy-preserving search over encrypted speech has come into being an important and urgent research field in cloud storage. In this paper, a speech scrambling encryption method based on the Chua’s circuit chaotic system with memristor is proposed, and then a watermarking-based perceptual hashing search algorithm over encrypted speech is proposed based on the zero-crossing rate. In the proposed scheme, the zero-crossing rate is extracted from the digital speech to generate the perceptual hashing as the search digest. The perceptual hashing digest as a watermark is embedded into the encrypted speech signal. The search results can be obtained by matching and computing the normalized Hamming distance of the perceptual hashing digests between the search target and the extracted one without loading and decrypting the encrypted speech. Experimental results show that the proposed scheme has good discrimination, uniqueness, and perceptual robustness to common speech processing. In addition, the security and computation complexity are all satisfactory. The precision ratio is 100 %, and the recall ratio is more than 98 %.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.J.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE Conference on INFOCOM, Piscataway, pp. 441–445 (2010)
Wang, C., Cao, N., Ren, K., Lou, W.J.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)
Hou, S.H., Uehara, T., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Privacy preserving multiple keyword search for confidential investigation of remote forensics. In: IEEE International Conference on Multimedia Information Networking and Security, Shanghai, China, pp. 595–599 (2011)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE Conference on INFOCOM, Washington, USA, pp. 829–837 (2011)
Ibrahim, A., Jin, H., Yassin, A.A., Zou, D.Q.: Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In: Proceedings of the IEEE Asia-Pacific Services Computing, Guilin, China, pp. 263–270 (2012)
Cheng, F.Q., Peng, Z.Y., Song, W., Wang, S.L., Cui, Y.H.: An efficient privacy-preserving rank query over encrypted data in cloud computing. Chin. J. Comput. 35(11), 2215–2227 (2012)
Li, M., Yu, S.C., Cao, N., Lou, W.J.: Authorized private keyword search over encrypted data in cloud computing. In: IEEE International Conference on Distributed Computing Systems, Minneapolis, Mongolia, pp. 383–392 (2011)
Koletka, R., Hutchison, A.: An architecture for secure searchable cloud storage. In: Proceedings of the Information Security for South Africa, Johannesburg, South Africa, pp. 1–7 (2011)
Wang, H.X., Li, J.F., Qiu, Y.: Speech authentication based on perceptual fingerprint hashing. J. Theore. Appl. Inf. Technol. 49(3), 907–912 (2013)
Wang, H.X., Yin, B.Y.: Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks. Int. J. Distrib. Sens. Netw. 2013, 1–9 (2013)
Li, Q., Wu, W.J., He, X.: Content-based audio retrieval using perceptual hash. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 791–794 (2010)
Chua, L.O.: Memristor-the missing circuit element. IEEE Trans. Circuit Theory CT-18(5), 507–519 (1971)
Lin, Z.H., Wang, H.X.: Efficient image encryption using chaos-based PWL memristor. IETE Tech. Rev. 27(4), 318–325 (2010)
Lin, H., Ou, Z.J.: Switching auxiliary chains for speech recognition. IEEE Sig. Process. Lett. 14(8), 568–571 (2007)
Wang, H.X., Fan, M.Q.: Centroid-based semi-fragile audio watermarking in hybrid domain. Sci. China Inform. Sci. 53(3), 619–633 (2010)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China (NSFC) under the grant Nos. 61170226, 61170175, the Fundamental Research Funds for the Central Universities under the grant Nos.SWJTU11CX047, SWJTU12ZT02, the Young Innovative Research Team of Sichuan Province under the grant No.2011JTD0007, and Chengdu Science and Technology program under the grant No. 12DXYB214JH-002.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Zhou, L., Zhang, W., Liu, S. (2014). Watermarking-Based Perceptual Hashing Search Over Encrypted Speech. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-662-43886-2_30
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43885-5
Online ISBN: 978-3-662-43886-2
eBook Packages: Computer ScienceComputer Science (R0)