Abstract
This paper presents a digital speech encryption scheme based on homomorphic encryption, which uses a symmetrical key cryptosystem (MORE-method) with probabilistic statistics and fully homomorphic properties to encrypt speech signals. In the proposed scheme, each sample of speech signal is firstly multiplied one weight, and then encrypted, the normalization is exploited to make the data expend lossy compression. Finally, a recombination method of the cipher-text is proposed to obtain the corresponding speech cipher-text with good performances. Experimental results show that the proposed scheme is homomorphism, which has strong diffusibility and a large key-space. What’s more, it is robustness to statistical analysis attacks, decreased the residual intelligibility as small as possible. Moreover, the encrypted speech can be decrypted completely. Compared with two dimensional chaotic and Paillier cryptosystem, the proposed scheme is more security and lower complexity, so the proposed scheme especially meets the sensitive speech security in the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98-D(4), 902–910 (2015)
Kanhe, A., Aghila, G., Kiran, C.Y.S., Ramesh, C.H., Jadav, G., Gowtham Raj, M.: Robust audio steganography based on advanced encryption standards in temporal domain. In: IEEE ICACCI 2015, pp. 1449–1453 (2015)
Eldin, S.M.S., Khamis, S.A., Hassanin, A.A.I.M., Alsharqawy, M.A.: New audio encryption package for TV cloud computing. Int. J. Speech Technol. 18(1), 131–142 (2015)
Mostafa, A., Soliman, N.F., Abdalluh, M., EI-samie, F.E.A.: Speech encryption using two dimensional chaotic maps. In: IEEE ICENCO 2015, pp. 235–240 (2015)
Zeng, L., Zhang, X., Chen, L., Fan, Z., Wang, Y.: Scrambling-based speech encryption via compressed sensing. EURASIP J. Adv. Signal Process. http://asp.eurasipjournals.com/content/2012/1/257
Wang, H., Zhou, L., Zhang, W., Liu, S.: Watermarking-based perceptual hashing search over encrypted speech. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 423–434. Springer, Heidelberg (2014). doi:10.1007/978-3-662-43886-2_30
García-Martínez, M., Ontañón-García, L.J., Campos-Cantón, E., Celikovský, S.: Hyperchaotic encryption based on multi-scroll piecewise linear systems. Appl. Math. Comput. 270, 413–424 (2015)
Shortell, T., Shokoufandeh, A.: Secure signal processing using fully homomorphic encryption. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2015. LNCS, vol. 9386, pp. 93–104. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25903-1_9
Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. PP, 1 (2015)
Yang, P., Gui, X., An, J., Tian, F., Wang, J.: An encrypted image editing scheme based on homomorphic encryption. In: IEEE INFOCOM Workshops, pp. 109–110 (2015)
Zhang, Y., Zhuo, L., Peng, Y., Zhang, J.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: 19th International Conference on Digital Signal Processing, pp. 269–274. IEEE (2014)
Li, Y., Zhou, J., Li, Y., Au, O.C.: Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique. In: IEEE GlobalSIP, pp. 800–804 (2015)
Hendriks, R.C., Erkin, Z., Gerkmann, T.: Privacy-preserving distributed speech enhancement for wireless: sensor networks by processing in the encrypted domain. In: IEEE ICASSP, pp. 7005–7009 (2013)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16
Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)
Kipnis, A., Hibshoosh, E.: Efficient methods for practical fully homomorphic symmetric key encryption, randomization and verification. http://eprint.iacr.org/2012/637
Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)
ECRYPT II yearly report on algorithms and keysizes. In: European Network of Excellence in Cryptology. http://cordis.europa.eu/docs/projects/cnect/6/216676/080/deliverables/002-DSPA20
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Shi, C., Wang, H., Qian, Q., Wang, H. (2016). Privacy Protection of Digital Speech Based on Homomorphic Encryption. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)