VoiceSketch: a Privacy-Preserving Voiceprint Authentication System

被引:1
|
作者
Yan, Baochen [1 ]
Zhang, Rui [1 ]
Yan, Zheng [1 ]
机构
[1] Xidian Univ, State Key Lab ISN, Sch Cyber Engn, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
User Authentication; Voiceprint Authentication; Template Protection;
D O I
10.1109/TrustCom56396.2022.00090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voiceprint authentication is a promising approach for user authentication due to its low acquisition cost and non-contact characteristics. However, most of existing voiceprint authentication systems directly store user voiceprint templates in a database, without taking any effective measures to protect user privacy. Once the voiceprint templates in the database are leaked, user voice information becomes public, which brings severe security threats to the users and impact practical applications of a voiceprint authentication system. Few literature works study privacy-preserving voiceprint authentication although it is particularly needed. Most of existing solutions based on cryptography suffer from high computational costs. But usability of some efficient systems is poor due to additional interactions with users. To tackle the above issues, this paper proposes VoiceSketch, a privacy-preserving voiceprint authentication system based on a secure sketch to protect the privacy of user voiceprint templates with high usability. VoiceSketch does not store the voiceprint templates directly. Instead, it uses a secure sketch to correct errors between multiple voiceprint features of the same user and use cryptographic hash function to extract an authentication key from a user's voiceprint template. We analyze the security of VoiceSketch based on secure sketch and hash function. We also implement VoiceSketch and design a series of experiments to verify its accuracy and effectiveness.
引用
收藏
页码:623 / 630
页数:8
相关论文
共 50 条
  • [1] A privacy-preserving multifactor authentication system
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    SECURITY AND PRIVACY, 2019, 2 (05):
  • [2] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [3] Privacy-Preserving Fingercode Authentication
    Barni, Mauro
    Bianchi, Tiziano
    Catalano, Dario
    Di Raimondo, Mario
    Labati, Ruggero Donida
    Failla, Pierluigi
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 231 - 240
  • [4] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [5] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [6] Privacy-preserving authentication using fingerprint
    Feng, Q. (fquan@sina.com), 1600, ICIC International (08):
  • [7] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [8] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [9] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [10] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494