Privacy-Preserving Speaker Verification using Secure Binary Embeddings

被引:0
|
作者
Portelo, Jose [1 ,2 ]
Raj, Bhiksha [3 ]
Alberto, Abad [1 ,2 ]
Trancoso, Isabel [1 ,2 ]
机构
[1] INESC ID, Lisbon, Portugal
[2] Inst Super Tecn, Lisbon, Portugal
[3] Carnegie Mellon Univ, Language Technol Inst, Pittsburgh, PA USA
基金
美国国家科学基金会;
关键词
SUPPORT VECTOR MACHINES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Remote speaker verification services typically rely on the system having access to the users recordings, or features derived from them, and/or a model for the users voice. This conventional approach raises several privacy concerns. In this work, we address this privacy problem in the context of a speaker verification system using a factor analysis based frontend extractor, the so-called i-vectors. Preserving privacy in our context means that neither the system observes voice samples or speech models from the user, nor the user observes the universal model owned by the system. This is achieved by transforming speaker i-vectors to bit strings in a way that allows for the computation of approximate distances, instead of exact ones. The key to the transformation uses a hashing scheme known as secure binary embeddings. Then, an SVM classifier with a modified kernel operates on the hashes. Experiments showed that the secure system yielded similar results as its non-private counterpart. The approach may be extended to other types of biometric authentication.
引用
收藏
页码:1268 / 1272
页数:5
相关论文
共 50 条
  • [31] Federated Learning for Privacy-Preserving Speaker Recognition
    Woubie, Abraham
    Backstrom, Tom
    IEEE ACCESS, 2021, 9 : 149477 - 149485
  • [32] Privacy-Preserving Biometric Identification Using Secure Multiparty Computation
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 42 - 52
  • [33] Web Application for Privacy-preserving Scheduling using Secure Computation
    Kiss, Agnes
    Schick, Oliver
    Schneider, Thomas
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 456 - 463
  • [34] A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter
    Li, Kang
    Lau, Wang Fat
    Au, Man Ho
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 615 - 631
  • [35] A Secure, Privacy-Preserving IoT Middleware Using Intel SGX
    Gremaud, Pascal
    Durand, Arnaud
    Pasquier, Jacques
    IOT'17: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS, 2017, : 165 - 166
  • [36] Learning Privacy-Preserving Embeddings for Image Data to Be Published
    Li, Chu-Chen
    Li, Cheng-Te
    Lin, Shou-De
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (06)
  • [37] Secure and privacy-preserving, timed vehicular communications
    Burmester, Mike
    Magkos, Emmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 10 (04) : 219 - 229
  • [38] SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange
    Xie, Haomeng
    Yan, Zheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4404 - 4417
  • [39] Secure and Privacy-Preserving Proxy Voting System
    Zwattendorfer, Bernd
    Hillebold, Christoph
    Teufl, Peter
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 472 - 477
  • [40] Secure and Privacy-Preserving Database Services in the Cloud
    Agrawal, Divyakant
    El Abbadi, Amr
    Wang, Shiyuan
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1268 - 1271