Advertisement

A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing

  • Qiu-yu ZhangEmail author
  • Liang Zhou
  • Tao Zhang
  • Deng-hai Zhang
Article
  • 74 Downloads

Abstract

In order to achieve extraction perceptual features from the encryption speech as a search digest for the content-based encryption speech retrieval, we present a retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing in this paper. Firstly, the study encrypts the speech file and uploads the encrypted speech data to the encryption speech database in cloud server. Secondly, the sample speech clips are obtained by the cutting operation from the speech file for scrambling encryption. The perceptual hashing sequence of the encrypted speech is constructed by extracting the short-term cross-correlation of the encrypted speech signals as the search digest. These perceptual hashing sequences are uploaded into the hashing index table of cloud server. Finally, the Hamming distance algorithm is used for the matching retrieval operation during the search. The experimental results show that the proposed algorithm of encrypted speech perceptual hashing has a better discrimination, robustness and compactness, and the perceptual hashing sequences can be extracted directly from the encrypted sample speech. Meanwhile, the encryption speech signal has high recall and precision ratios after various content preserving operations. In the whole retrieval process, the downloading and decrypting operations of speech data are not necessary.

Keywords

Encrypted speech retrieval Short-term cross-correlation coefficient Perceptual hashing Scrambling encryption Feature extraction of encrypted speech 

Notes

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 61862041, No. 61363078), the Research Project in Universities of Education Department of Gansu Province (2017B-16, 2018A-187). The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.

References

  1. 1.
    Alías F, Socoró JC, Sevillano X (2016) A review of physical and perceptual feature extraction techniques for speech, music and environmental sounds. Appl Sci 6(5):143–167.  https://doi.org/10.3390/app6050143 CrossRefGoogle Scholar
  2. 2.
    de Carvalho CAB, De Castro MF, de Castro Andrade RM (2017) Secure cloud storage service for detection of security violations. In Cluster, Cloud and Grid Computing (CCGRID), 17th IEEE/ACM International Symposium. IEEE 715–718.  https://doi.org/10.1109/CCGRID.2017.19
  3. 3.
    Chen D, Zhang W, Zhang Z, Huang W, Ao J (2017) Audio retrieval based on wavelet transform. In Computer and Information Science (ICIS), 2017 IEEE/ACIS 16th International Conference on. IEEE 531–534.  https://doi.org/10.1109/ICIS.2017.7960049
  4. 4.
    Ding D, Metze F, Rawat S, Schulam PF, Burger S, Younessian E, Bao L, Christel MG, Hauptmann A (2012) Beyond audio and video retrieval: towards multimedia summarization. In International Conference on Multimedia Retrieval (ICMR), 2nd ACM International Conference on Multimedia Retrieval. ACM 2:1-2:8.  https://doi.org/10.1145/2324796.2324799
  5. 5.
    Glackin C, Chollet G, Dugan N, Cannings N, Wall J, Tahir S, Ray I G, Rajarajan M (2017) Privacy preserving encrypted phonetic search of speech data. In Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on. IEEE, 6414–6418.  https://doi.org/10.1109/ICASSP.2017.7953391
  6. 6.
    Habib Z, Khan JS, Ahmad J, Khan MA, Khan FA (2017) Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In Electrical and Electronic Engineering (ICEEE), 2017 4th International Conference on. IEEE 246–250.  https://doi.org/10.1109/ICEEE2.2017.7935827
  7. 7.
    He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703–718.  https://doi.org/10.2298/CSIS170112024H CrossRefGoogle Scholar
  8. 8.
    Hu P, Liu W, Jiang W, Yang Z (2014) Latent topic model for audio retrieval. Pattern Recogn 47(3):1138–1143.  https://doi.org/10.1016/j.patcog.2013.06.010 CrossRefGoogle Scholar
  9. 9.
    Kalker T, Haitsma J, Oostveen JC (2001) Issues with digital watermarking and perceptual hashing. In Multimedia Systems and Applications IV. Int Soc Opt Photon 189–198.  https://doi.org/10.1117/12.448203
  10. 10.
    Lv X, He F, Cai W, Cheng Y (2018) Supporting selective undo of string-wise operations for collaborative editing systems. Futur Gener Comput Syst 82:41–62.  https://doi.org/10.1016/j.future.2017.11.046 CrossRefGoogle Scholar
  11. 11.
    Mäkinen T, Kiranyaz S, Raitoharju J, Gabbouj M (2012) An evolutionary feature synthesis approach for content-based audio retrieval. EURASIP J Audio Speech Music Process 2012(1):1–23.  https://doi.org/10.1186/1687-4722-2012-23 CrossRefGoogle Scholar
  12. 12.
    Mitani K, Sugiura Y, Shimamura T (2016) Cross-correlation functions with binary signal involving phase information for speech enhancement. In Intelligent Signal Processing and Communication Systems (ISPACS), 2016 International Symposium on. IEEE 1–5.  https://doi.org/10.1109/ISPACS.2016.7824729
  13. 13.
    Roy A, Misra AP (2017) Audio signal encryption using chaotic Hénon map and lifting wavelet transforms. Eur Phys J Plus 132(12):524–533.  https://doi.org/10.1140/epjp/i2017-11808-x CrossRefGoogle Scholar
  14. 14.
    Sadr A, Okhovat RS (2015) Security in the speech cryptosystem based on blind sources separation. Multimed Tools Appl 74(21):9715–9728.  https://doi.org/10.1007/s11042-014-2147-3 CrossRefGoogle Scholar
  15. 15.
    Song J, Gao L, Nie F, Shen HT, Yan Y, Sebe N (2016) Optimized graph learning using partial tags and multiple features for image and video annotation. IEEE Trans Image Process 25(11):4999–5011.  https://doi.org/10.1109/TIP.2016.2601260 MathSciNetCrossRefGoogle Scholar
  16. 16.
    Song J, Zhang H, Li X, Gao L, Wang M, Hong R (2018) Self-supervised video hashing with hierarchical binary auto-encoder. IEEE Trans Image Process 27(7):3210–3221.  https://doi.org/10.1109/TIP.2018.2814344 MathSciNetCrossRefGoogle Scholar
  17. 17.
    Song J, Gao L, Liu L, Zhu X, Sebe N (2018) Quantization-based hashing: a general framework for scalable image and video retrieval. Pattern Recogn 75:175–187.  https://doi.org/10.1016/j.patcog.2017.03.021 CrossRefGoogle Scholar
  18. 18.
    Song J, Guo Y, Gao L, Gao L, Li X, Hanjalic A, Shen HT (2018) From deterministic to generative: multimodal stochastic RNNs for video captioning. IEEE Trans Neural Netw Learn Syst 99:1–12.  https://doi.org/10.1109/TNNLS.2018.2851077 CrossRefGoogle Scholar
  19. 19.
    Tahir S, Rajarajan M, Sajjad A (2017) A ranked searchable encryption scheme for encrypted data hosted on the public cloud, In International Conference on Information Networking (ICOIN), 2017 International Conference on. IEEE 242–247.  https://doi.org/10.1109/ICOIN.2017.7899512
  20. 20.
    Thangavel M, Varalakshmi P, Renganayaki S, Subhapriya GR, Preethi T, Banu AZ (2016) SMCSRC—Secure multimedia content storage and retrieval in cloud. In International Conference on Recent Trends in Information Technology (ICRTIT), 2016 International Conference on. IEEE 1–6.  https://doi.org/10.1109/ICRTIT.2016.7569581
  21. 21.
    Wang HX, Hao GY (2015) Encryption speech perceptual hashing algorithm and retrieval scheme based on time and frequency domain change characteristics. China patent, CN104835499A, 2015-08-12Google Scholar
  22. 22.
    Wang H, Zhou L, Zhang W, Liu S (2013) Watermarking-based perceptual hashing search over encrypted speech. In International Workshop on Digital Watermarking. Springer Berlin Heidelberg 423–434.  https://doi.org/10.1007/978-3-662-43886-2_3
  23. 23.
    Wang X, Gao L, Song J, Shen H (2017) Beyond frame-level CNN: saliency-aware 3-D CNN with LSTM for video action recognition. IEEE Signal Process Lett 24(4):510–514.  https://doi.org/10.1109/LSP.2016.2611485 CrossRefGoogle Scholar
  24. 24.
    Wang X, Gao L, Wang P, Sun X, Liu X (2018) Two-stream 3-D convNet fusion for action recognition in videos with arbitrary size and length. IEEE Trans Multimedia 20(3):634–644.  https://doi.org/10.1109/TMM.2017.2749159 CrossRefGoogle Scholar
  25. 25.
    Wu Y, He F, Zhang D, Li X (2018) Service-oriented feature-based data exchange for cloud-based design and manufacturing. IEEE Trans Serv Comput 11(2):341–353.  https://doi.org/10.1109/TSC.2015.2501981 CrossRefGoogle Scholar
  26. 26.
    Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608.  https://doi.org/10.1109/TIFS.2016.2590944 CrossRefGoogle Scholar
  27. 27.
    Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2018) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 6(1):276–286.  https://doi.org/10.1109/TCC.2015.2491933 CrossRefGoogle Scholar
  28. 28.
    Xu Y, Huang Q, Wang W, Foster P, Sigtia S, Jackson PJ, Plumbley MD (2017) Unsupervised feature learning based on deep models for environmental audio tagging. IEEE/ACM Trans Audio Speech Lang Process 25(6):1230–1241.  https://doi.org/10.1109/TASLP.2017.2690563 CrossRefGoogle Scholar
  29. 29.
    Zhang QY, Qiao SB, Huang YB, Zhang T (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653–21669.  https://doi.org/10.1007/s11042-018-5613-5 CrossRefGoogle Scholar
  30. 30.
    Zhao H, He SF (2016) A retrieval algorithm for encrypted speech based on perceptual hashing. In Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016 12th International Conference on. IEEE 1840–1845.  https://doi.org/10.1109/FSKD.2016.7603458
  31. 31.
    Zhu X, Li X, Zhang S, Xu Z, Yu L, Wang C (2017) Graph PCA hashing for similarity search. IEEE Trans Multimed 19(9):2033–2044.  https://doi.org/10.1109/TMM.2017.2703636 CrossRefGoogle Scholar
  32. 32.
    Zou F, Tang X, Li K, Wang Y, Song J, Yang S, Ling H (2018) Hidden semantic hashing for fast retrieval over large scale document collection. Multimed Tools Appl 77(3):3677–3697.  https://doi.org/10.1007/s11042-017-5219-3 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer and CommunicationLanzhou University of TechnologyLanzhouChina

Personalised recommendations