Efficient Implementation of Radon Transform and Encryption Techniques for Cancelable Speaker Identification | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 12, Volume 30, Issue 2, July 2021, Page 70-78 PDF (1.29 MB) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2021.195521 | ||||
View on SCiNiTO | ||||
Authors | ||||
Neven Hassan 1; Adel Shaker El-Fishawy 2; Walid El-Shafai 3; Fathi El-Sayed4 | ||||
1Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University: Menouf, Egypt | ||||
2Electronics and Electrical Communications Engineering Dept., Faculty of Electronics Engineering, Menouf, Menoufia University, EGYPT | ||||
3Department of Electronics and Electrical Communication Engineering, Menoufia University, Menouf, Menoufia, Egypt | ||||
4Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, 32952, Menouf, Egypt. | ||||
Abstract | ||||
This paper introduces three cancelable speaker identification techniques based on the spectrogram estimation of speech signals subjected to either chaotic encryption process, or RSA algorithm in addition to Radon transform to produce cancelable templates instead of the original speech signals. The resulting transformed versions of the voice biometrics are stored in the server instead of the original biometrics. Therefore, the users' privacy can be protected well. It is evident from the obtained results that the proposed techniques are secure, reliable and practical. They have good encryption and ability to generate cancelable templates. These characteristics lead to good performance. The proposed cancelable speaker identification techniques are evaluated under the influence of Additive White Gaussian Noise (AWGN) with different strengths. This makes them more accurate in identifying the users and also more resistant to attack attempts. In addition, security is enhanced through maintaining the confidentiality of the processed data. In the experimental results, evaluation metrics such as Equal Error Rate (EER), False Rejection Rate (FRR), and False Acceptance Rate (FAR) are used to assess the performance of the proposed techniques. In addition, the genuine, impostor distributions, Receiver Operating Characteristic (ROC) curve and area under the ROC curve for the proposed techniques are estimated for better evaluation and comparison. | ||||
Highlights | ||||
Three cancelable speaker identification techniques based on the spectrogram estimation of the encrypted signal using chaotic encryption process, Radon transform algorithm and RSA algorithm have been presented. A lot of simulations have been presented to verify the efficiency of the proposed encryption algorithms. Performance comparison has been made between these techniques to determine the most accurate one. In the simulation study, 20 different samples of voice signals for men and women have been used. First, the original signals are encrypted using the proposed encryption algorithms. Then, the spectrograms of the encrypted signals are estimated and stored in the database instead of the original ones. In the experimental results, the values of EER, FRR, FAR, and AROC have been estimated for each proposed work. The ROC curve and the genuine and impostor distributions are also estimated. The proposed speaker identification techniques were also evaluated using cancelable features under the influence of different noise levels. When comparing the results of all techniques, it was found that the first one using chaotic encryption is clearly affected by noise variance variation. The second one using Radon transformation shows better results at the expense of having much execution time. The RSA algorithm shows the most accurate results with the shortest execution time. This makes the technique more accurate in recognizing the user and also more powerful to resist attack attempts. It also becomes more secure through maintaining the confidentiality of the data. | ||||
Keywords | ||||
Cancelable biometrics; Chaotic Baker map; Speaker identification; RSA algorithm; Radon transform; Spectrogram | ||||
Full Text | ||||
Biometrics have been used for identifying persons’ identities. Biometric authentication is now widely used in a lot of applications, such as border control, secure computer systems, secure banking services, mobile phones and credit cards. Hence, with biometrics, personal identification based on who he or she is instead of what he or she has (card - code - key) or what he or she knows (password) will be more secure. In addition, it is more complex to copy individuals’ biometrics [1]. The ideal biometric information has some characteristics such as universality, which means that all individuals must be characterized by biometric information. In addition, this information must be as dissimilar as possible for two different individuals, and this indicates uniqueness, and permanency [2]. Biometric systems can work in the verification or identification modes [5]. The solution for the problem of attacks is to adopt cancelable II. PROPOSED CANCELABLE SPEAKER B. Proposed Technique Based on Radon Transform C. Proposed Technique Based on RSA Algorithm The Rivest-Shamir-Adleman (RSA) is an algorithm that modern computers use to encrypt and decrypt messages. It is an asymmetrical encryption algorithm. Asymmetrical indicates that there are two different keys. This is called public key cryptography, because one of the keys can be presented to any person. Another key has to be kept secret. The algorithm was constructed based on the fact that finding III. RESULTS AND PERFORMANCE ANALYSIS
| ||||
References | ||||
[1] A. Mostafa, N. Soliman, M. Abdullah and F. E. Abd El-samie, “Speech encryption using two dimensional chaotic maps,” 11th International Computer Engineering Conference (ICENCO), 2015. [2] S. Guennouni, A. Mansouri and A. Ahaitouf, “Biometric Systems and Their Applications,” Submitted: October 19th 2018Reviewed: January 30th 2019Published: March 1st 2019 DOI: 10.5772/intechopen.84845 [3] L. Muda, M. Begam and I. Elamvazuthi, ''Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques,'' Journal of Computing, Vol. 2, ISSN 2151-9617, March 2010. [4] Naglaa F. Soliman, Zhraa Mostafa, Fathi E. Abd ElSamie and Mahmoud I. Abdalla, "Performance enhancement of speaker identification systems using speech encryption and cancelable features," International Journal of Speech Technology, 2017 [5] D. Ambika and V. Radha, "Secure speech Review", International Journal of Engineering Research and application (IJERA), vol. 2, no. 5, pp. 1044-1049, 2012. [6] Mohammad El-Abed and Christophe Charrier, “Evaluation of Biometric Systems,” New Trends and Developments in Biometrics, pp. 149 - 169, 2012, ff10.5772/52084ff. ffhal-00990617 [7] S. Rane et al., "Secure Biometrics: Concepts Authentication Architectures and Challenges", IEEE Signal Processing, vol. 30, no. 5, pp. 51-64, 2013. [8] Christian Rathgeb and Andreas Uhl, “A survey on biometric cryptosystems and cancellable biometrics”, proc. EURASIP Journal on Information Security, March 2011. [9] R. Jain and C. Kant, “Attacks on Biometric Systems: An Overview,” International Journal of Advances in Scientific Research; 1(07): 283-288, 2015. [10] A. Nagar, K. Nandakumar and A. K. Jain, Biometric template transformation: A security analysis," in Proc. SPIE 7541, Media Forensics and Security II, 7541 (2010). [11] B. Choudhury, P. Then, B.Issac, V. Raman and M. K. Haldar, “A Survey on Biometrics and Cancelable Biometrics Systems. International Journal of Image and Graphics, 18(01), 1850006 10.1142/S0219467818500067,(2018). [12] R. Aparna and PL. Chithra, “ Role of Windowing Techniques in Speech Signal Processing For Enhanced Signal Cryptography,” Advanced Engineering Research and Applications, Chapter 28,Volume V, pp. 446-458, (2017). [13] Manisha and N. Kumar, “Cancelable Biometrics: a comprehensive survey,” Artificial Intelligence Review | 10.1007/s10462-019-09767-8, 2019. [14] S. Davies. Touching Big Brother, “How Biometric Technology Will Fuse Flesh and Machine,” Information Technology and People, 7(4), 1994 [15] A. Matsunaga, K. Koga and M. Ohkawa, "An analog speech scrambling system using the FFT technique with high level security", IEEE J. Select. Areas Common, vol. 7, pp. 540-547, 1989. [16] Pointcheval, D. “How to Encrypt Properly with RSA.” CryptoBytes, Winter/Spring 2002. [17] P. Kuchment, "The Radon transform and medical imaging", SIAM, 2013. [18] A. Khatami, M. Babaie, A. Khosravi, H. R. Tizhoosh, S. M. Salaken, & S. Nahavandi, (2017). A deep-structural medical image classification | ||||
Statistics Article View: 162 PDF Download: 196 |
||||