Skip to main content

HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 905))

Included in the following conference series:

  • 1042 Accesses

Abstract

Increasing evolution of technology demands the innovative applications. E-commerce, e-banking, e-health, and e-payment, etc. being carried out by mobile devices. Mobile device-based speaker authentication is one of the predominant biometric-based authentication schemes. As the mobile devices are vulnerable to physical attacks, speech template stored in the mobile devices may be compromised. To protect the speech template, it should be stored in the encrypted form. Audio templates produce the large bitstream that leads to long encryption phase. Hence, there is a need for lightweight cryptosystem for audio template protection. In This paper, a light weight cryptographic algorithm based on Genus-2 Hyper-Elliptic Curves in Jacobi field is proposed. Genus-2 curves are deployed over a field F such that |F| ≈ \( 2^{80} \). With these features, improved security is provided for the stored data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. James, S.P., George, S.N., Deepthi, P.P.: An audio encryption technique based on LFSR based alternating step generator. In: 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (IEEE CONECCT). IEEE (2014)

    Google Scholar 

  2. Dengre, Amit, Gawande, A.D.: Audio encryption and digital image watermarking in an uncompress video. Int. J. Adv. Appl. Sci. 4(2), 66–72 (2015)

    Google Scholar 

  3. Cichowski, J., Czyzewski, A.. “Sensitive audio data encryption for multimodal surveillance systems. In: Audio Engineering Society Convention, vol. 132. Audio Engineering Society (2012)

    Google Scholar 

  4. Datta, K., Gupta, I.S.: Partial encryption and watermarking scheme for audio files with controlled degradation of quality. Multimedia tools Appl. 64(3), 649–669 (2013)

    Article  Google Scholar 

  5. Rashidi, B., Rashidi, B.: FPGA based a new low power and self-timed AES 128-bit encryption algorithm for encryption audio signal. Int. J. Comput. Netw. Inf. Secur. 5(2), 10 (2013)

    Google Scholar 

  6. Nguyen, H.H., Mehaoua, A., Hong, J.W.K.: Secure medical tele-consultation based on voice authentication and realtime audio/video encryption. In: 2013 First International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech). IEEE (2013)

    Google Scholar 

  7. Kulkarni, S.A., Patil, S.B.: A robust encryption method for speech data hiding in digital images for optimized security. In: 2015 International Conference on Pervasive Computing (ICPC). IEEE (2015)

    Google Scholar 

  8. Asok, S.B., et al.: A secure cryptographic scheme for audio signals. In: 2013 International Conference on Communications and Signal Processing (ICCSP). IEEE (2013)

    Google Scholar 

  9. Iyer, S.C., Sedamkar, R.R., Gupta, S.: A novel idea on multimedia encryption using hybrid crypto approach. Procedia Comput. Sci. 79, 293–298 (2016)

    Article  Google Scholar 

  10. Fazeen, M., Bajwa, G., Dantu, R.: Context-aware multimedia encryption in mobile platforms. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference. ACM (2014)

    Google Scholar 

  11. Washio, S., Watanabe, Y.: Security of audio secret sharing scheme encrypting audio secrets with bounded shares. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2014)

    Google Scholar 

  12. Zhao, H., et al.: Dual key speech encryption algorithm based underdetermined BSS. Sci. World J. 2014 (2014)

    Google Scholar 

  13. Zeng, L., et al.: Scrambling-based speech encryption via compressed sensing. EURASIP J. Adv. Signal Process. 2012(1), 257 (2012)

    Article  Google Scholar 

  14. Lu, X., et al.: Digital audio information hiding based on Arnold transformation and double random-phase encoding technique. Optik-Int. J. Light Electron Optics 123(8), 697–702 (2012)

    Article  Google Scholar 

Download references

Acknowledgment

The part of this research work is supported by Department of Science and Technology (DST), Science and Engineering Board (SERB), Government of India under the ECR grant (ECR/2017/000679/ES).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to N. Sasikaladevi or A. Revathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sasikaladevi, N., Revathi, A., Mahalakshmi, N., Archana, N. (2018). HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 905. Springer, Singapore. https://doi.org/10.1007/978-981-13-1810-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1810-8_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1809-2

  • Online ISBN: 978-981-13-1810-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics