Secure binary embeddings of front-end factor analysis for privacy preserving speaker verification
نویسندگان
چکیده
Remote speaker verification services typically rely on the system to have access to the users recordings, or features derived from them, and also a model of the users voice. This conventional scheme raises several privacy concerns. In this work, we address this privacy problem in the context of a speaker verification system using a factor analysis based front-end extractor, the so-called i-vectors. Speaker verification without exposing speaker data is achieved by transforming speaker i-vectors to bit strings in a way that allows the computation of approximate distances, instead of exact ones. The key to the transformation uses a hashing scheme known as Secure Binary Embeddings. Then, a modified SVM kernel permits operating on the i-vector hashes. Experiments on sub-sets of NIST SRE 2008 showed that the secure system yielded similar results as its non-private counterpart.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملPrivacy-Preserving Speaker Authentication
Speaker authentication systems require access to the voice of the user. A person’s voice carries information about their gender, nationality etc., all of which become accessible to the system, which could abuse this knowledge. The system also stores users’ voice prints – these may be stolen and used to impersonate the users elsewhere. It is therefore important to develop privacy preserving voic...
متن کاملSecure Computation for Biometric Data Security - Application to Speaker Verification
The goal of this research is to develop provable secure computation techniques for two biometric security tasks in complex distributed systems involving multiple parties; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed. We then discuss the secure computation techn...
متن کاملPrivacy Preserving Techniques for Speech Processing
Speech is perhaps the most private form of personal communication but current speech processing techniques are not designed to preserve the privacy of the speaker and require complete access to the speech recording. We propose to develop techniques for speech processing which do preserve privacy. While our proposed methods can be applied to a variety of speech processing problems and also gener...
متن کاملPrivacy-Preserving Important Passage Retrieval
State-of-the-art important passage retrieval methods obtain very good results, but do not take into account privacy issues. In this paper, we present a privacy preserving method that relies on creating secure representations of documents. Our approach allows for third parties to retrieve important passages from documents without learning anything regarding their content. We use a hashing scheme...
متن کامل