Privacy-Preserving Speaker Verification using Secure Binary Embeddings

被引:0
|
作者
Portelo, Jose [1 ,2 ]
Raj, Bhiksha [3 ]
Alberto, Abad [1 ,2 ]
Trancoso, Isabel [1 ,2 ]
机构
[1] INESC ID, Lisbon, Portugal
[2] Inst Super Tecn, Lisbon, Portugal
[3] Carnegie Mellon Univ, Language Technol Inst, Pittsburgh, PA USA
基金
美国国家科学基金会;
关键词
SUPPORT VECTOR MACHINES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Remote speaker verification services typically rely on the system having access to the users recordings, or features derived from them, and/or a model for the users voice. This conventional approach raises several privacy concerns. In this work, we address this privacy problem in the context of a speaker verification system using a factor analysis based frontend extractor, the so-called i-vectors. Preserving privacy in our context means that neither the system observes voice samples or speech models from the user, nor the user observes the universal model owned by the system. This is achieved by transforming speaker i-vectors to bit strings in a way that allows for the computation of approximate distances, instead of exact ones. The key to the transformation uses a hashing scheme known as secure binary embeddings. Then, an SVM classifier with a modified kernel operates on the hashes. Experiments showed that the secure system yielded similar results as its non-private counterpart. The approach may be extended to other types of biometric authentication.
引用
收藏
页码:1268 / 1272
页数:5
相关论文
共 50 条
  • [21] Privacy-Preserving IP Verification
    Mouris, Dimitris
    Gouert, Charles
    Tsoutsos, Nektarios Georgios
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (07) : 2010 - 2023
  • [22] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [23] SAEV: Secure Aggregation and Efficient Verification for Privacy-Preserving Federated Learning
    Wang, Junkai
    Wang, Rong
    Xiong, Ling
    Xiong, Neal
    Liu, Zhicai
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39681 - 39696
  • [24] Threshold-based Secure and Privacy-Preserving Message Verification in VANETs
    Gao, Wei
    Wang, Mingzhong
    Zhu, Liehuang
    Zhang, Xiaoping
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 795 - 802
  • [25] Privacy-preserving Trust Verification
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Shafiq, Basit
    Adam, Nabil
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 139 - 148
  • [26] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jianfeng
    Sun, Cong
    Wei, Dawei
    Xi, Ning
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 5 - 10
  • [27] A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
    Qin, Zhen
    Sun, Jianfei
    Wahaballa, Abubaker
    Zheng, Wentao
    Xiong, Hu
    Qin, Zhiguang
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 55 - 60
  • [28] Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage
    Tong, Wei
    Chen, Wenjie
    Jiang, Bingbing
    Xu, Fengyuan
    Li, Qun
    Zhong, Sheng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (09) : 5463 - 5478
  • [29] Privacy-preserving microbiome analysis using secure computation
    Wagner, Justin
    Paulson, Joseph N.
    Wang, Xiao
    Bhattacharjee, Bobby
    Bravo, Hector Corrada
    BIOINFORMATICS, 2016, 32 (12) : 1873 - 1879
  • [30] A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing
    Xia, Zhihua
    Wang, Lan
    Tang, Jian
    Xiong, Neal N.
    Weng, Jian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 318 - 330