Loading…

A robust cryptosystem to enhance the security in speech based person authentication

The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system conta...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2020-08, Vol.79 (29-30), p.20795-20819
Main Authors: Nagakrishnan, R., Revathi, A.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13
cites cdi_FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13
container_end_page 20819
container_issue 29-30
container_start_page 20795
container_title Multimedia tools and applications
container_volume 79
creator Nagakrishnan, R.
Revathi, A.
description The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.
doi_str_mv 10.1007/s11042-020-08846-1
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2432690280</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2432690280</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13</originalsourceid><addsrcrecordid>eNp9kD1PwzAURS0EEqXwB5gsMRue7TROxqriS6rEAMyW4zzTVNQOtjPk35MSJDamd4dz75MOIdccbjmAukucQyEYCGBQVUXJ-AlZ8JWSTCnBT6csK2BqBfycXKS0B-DlShQL8rqmMTRDytTGsc8hjSnjgeZA0e-Mt0jzDmlCO8Quj7TzNPWIdkcbk7ClPcYUPDXDRPncWZO74C_JmTOfCa9-75K8P9y_bZ7Y9uXxebPeMit5nRk3BlGBKUxdQQmOW9HYuizrRqFTUrbOoqwdd4itUauqkk0rwDYFNtJYx-WS3My7fQxfA6as92GIfnqpRSFFWYOoYKLETNkYUorodB-7g4mj5qCP8vQsT0_y9I88fZyWcylNsP_A-Df9T-sbN9R0Ag</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2432690280</pqid></control><display><type>article</type><title>A robust cryptosystem to enhance the security in speech based person authentication</title><source>ABI/INFORM Global</source><source>Springer Link</source><creator>Nagakrishnan, R. ; Revathi, A.</creator><creatorcontrib>Nagakrishnan, R. ; Revathi, A.</creatorcontrib><description>The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-020-08846-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Biometrics ; Computer Communication Networks ; Computer Science ; Correlation coefficients ; Data Structures and Information Theory ; Deoxyribonucleic acid ; DNA ; Encryption ; Feature extraction ; Gene sequencing ; Histograms ; Mapping ; Multimedia Information Systems ; Noise sensitivity ; Security ; Signal to noise ratio ; Special Purpose and Application-Based Systems ; Speech ; Test procedures</subject><ispartof>Multimedia tools and applications, 2020-08, Vol.79 (29-30), p.20795-20819</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13</citedby><cites>FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2432690280/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2432690280?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Nagakrishnan, R.</creatorcontrib><creatorcontrib>Revathi, A.</creatorcontrib><title>A robust cryptosystem to enhance the security in speech based person authentication</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.</description><subject>Algorithms</subject><subject>Biometrics</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Correlation coefficients</subject><subject>Data Structures and Information Theory</subject><subject>Deoxyribonucleic acid</subject><subject>DNA</subject><subject>Encryption</subject><subject>Feature extraction</subject><subject>Gene sequencing</subject><subject>Histograms</subject><subject>Mapping</subject><subject>Multimedia Information Systems</subject><subject>Noise sensitivity</subject><subject>Security</subject><subject>Signal to noise ratio</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Speech</subject><subject>Test procedures</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kD1PwzAURS0EEqXwB5gsMRue7TROxqriS6rEAMyW4zzTVNQOtjPk35MSJDamd4dz75MOIdccbjmAukucQyEYCGBQVUXJ-AlZ8JWSTCnBT6csK2BqBfycXKS0B-DlShQL8rqmMTRDytTGsc8hjSnjgeZA0e-Mt0jzDmlCO8Quj7TzNPWIdkcbk7ClPcYUPDXDRPncWZO74C_JmTOfCa9-75K8P9y_bZ7Y9uXxebPeMit5nRk3BlGBKUxdQQmOW9HYuizrRqFTUrbOoqwdd4itUauqkk0rwDYFNtJYx-WS3My7fQxfA6as92GIfnqpRSFFWYOoYKLETNkYUorodB-7g4mj5qCP8vQsT0_y9I88fZyWcylNsP_A-Df9T-sbN9R0Ag</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Nagakrishnan, R.</creator><creator>Revathi, A.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20200801</creationdate><title>A robust cryptosystem to enhance the security in speech based person authentication</title><author>Nagakrishnan, R. ; Revathi, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Biometrics</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Correlation coefficients</topic><topic>Data Structures and Information Theory</topic><topic>Deoxyribonucleic acid</topic><topic>DNA</topic><topic>Encryption</topic><topic>Feature extraction</topic><topic>Gene sequencing</topic><topic>Histograms</topic><topic>Mapping</topic><topic>Multimedia Information Systems</topic><topic>Noise sensitivity</topic><topic>Security</topic><topic>Signal to noise ratio</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Speech</topic><topic>Test procedures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nagakrishnan, R.</creatorcontrib><creatorcontrib>Revathi, A.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer science database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>ProQuest Research Library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nagakrishnan, R.</au><au>Revathi, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A robust cryptosystem to enhance the security in speech based person authentication</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>79</volume><issue>29-30</issue><spage>20795</spage><epage>20819</epage><pages>20795-20819</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The developments in technology have made us utilizing speech as a biometric to authenticate persons. In this paper, speech encryption and decryption algorithm are presented for enhancing the security in speech-based person authentication systems. The implementation of the authentication system contains the feature extraction, modeling techniques and testing procedures for authenticating the person. Firstly, the Mel frequency cepstral coefficient (MFCC) features are extracted from the training speech utterances and models are developed for each speaker. The speech encryption system encrypts the test speech utterances. Multiple chaotic mapping techniques and Deoxyribonucleic acid (DNA) addition based speech cryptosystem is developed to secure test speech against attacks. The speech encryption system deals with sampled test speech signal given as input, which is subjected to intra level and inter level bit substitution. These resultant samples are encoded into the DNA sequence denoted by P(n). The DNA sequence P(n) and DNA sequences {A(n), B(n), C(n), D(n)} obtained using different techniques based on chaos, such as tent mapping, henon mapping, sine mapping, and logistic mapping and summed up together using DNA addition operation. Finally, the encrypted test speech is obtained using DNA decoding. The speaker authentication system in the receiving side decrypts the encrypted signal and identifies the speakers from the decrypted speech. The correlation coefficient test, Signal to noise ratio test, Peak Signal to Noise Ratio test, key sensitivity test, NSCR and UACI test, key space analysis, and histogram analysis are the techniques used as metrics to prove the efficiency of the proposed cryptosystem. Overall individual accuracy is 97% for the text dependent person authentication with the original test speech set and decrypted test speech set. Overall individual accuracy is 66% for the text independent person authentication with the original test speech set and decrypted test speech set. In our work, the speech utterances are taken from AVSpoof database for authenticating 44 speakers. Our work highlights the efficiency of the encryption system, to provide security for test speech and person authentication using speech as a biometric.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-020-08846-1</doi><tpages>25</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2020-08, Vol.79 (29-30), p.20795-20819
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2432690280
source ABI/INFORM Global; Springer Link
subjects Algorithms
Biometrics
Computer Communication Networks
Computer Science
Correlation coefficients
Data Structures and Information Theory
Deoxyribonucleic acid
DNA
Encryption
Feature extraction
Gene sequencing
Histograms
Mapping
Multimedia Information Systems
Noise sensitivity
Security
Signal to noise ratio
Special Purpose and Application-Based Systems
Speech
Test procedures
title A robust cryptosystem to enhance the security in speech based person authentication
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T15%3A26%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20robust%20cryptosystem%20to%20enhance%20the%20security%20in%20speech%20based%20person%20authentication&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Nagakrishnan,%20R.&rft.date=2020-08-01&rft.volume=79&rft.issue=29-30&rft.spage=20795&rft.epage=20819&rft.pages=20795-20819&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-020-08846-1&rft_dat=%3Cproquest_cross%3E2432690280%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-1aaee70a4a98060f1c2bc9669b7ef733dfce39f1feeda75883bd20cb4eb3acf13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2432690280&rft_id=info:pmid/&rfr_iscdi=true