Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models

被引:58
|
作者
Pathak, Manas A. [1 ]
Raj, Bhiksha [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
Secure multiparty computation; speaker identification; speaker verification;
D O I
10.1109/TASL.2012.2215602
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this article, we present frameworks for privacy-preserving speaker verification and speaker identification systems, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user. In a speech-based authentication setting, this privacy constraint protect against an adversary who can break into the system and use the speech models to impersonate legitimate users. In surveillance applications, we require the system to first identify if the speech recording belongs to a suspect while preserving the privacy constraints. This prevents the system from listening in on conversations of innocent individuals. In this paper we formalize the privacy criteria for the speaker verification and speaker identification problems and construct Gaussian mixture model-based protocols. We also report experiments with a prototype implementation of the protocols on a standardized dataset for execution time and accuracy.
引用
收藏
页码:397 / 406
页数:10
相关论文
共 50 条
  • [1] SPEAKER IDENTIFICATION AND VERIFICATION USING GAUSSIAN MIXTURE SPEAKER MODELS
    REYNOLDS, DA
    [J]. SPEECH COMMUNICATION, 1995, 17 (1-2) : 91 - 108
  • [2] PRIVACY-PRESERVING SPEAKER VERIFICATION USING GARBLED GMMS
    Portelo, Jose
    Raj, Bhiksha
    Abad, Alberto
    Trancoso, Isabel
    [J]. 2014 PROCEEDINGS OF THE 22ND EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2014, : 2070 - 2074
  • [3] Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition
    Rahulamathavan, S.
    Yao, X.
    Yogachandran, R.
    Cumanan, K.
    Rajarajan, M.
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [4] Privacy-Preserving Speaker Verification using Secure Binary Embeddings
    Portelo, Jose
    Raj, Bhiksha
    Alberto, Abad
    Trancoso, Isabel
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1268 - 1272
  • [5] PRIVACY-PRESERVING SPEAKER VERIFICATION AS PASSWORD MATCHING
    Pathak, Manas A.
    Raj, Bhiksha
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1849 - 1852
  • [6] Privacy-Preserving Speaker Verification and Speech Recognition
    Abbasi, Wisam
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022, 2023, 13782 : 102 - 119
  • [7] Speaker verification using adapted Gaussian mixture models
    Reynolds, DA
    Quatieri, TF
    Dunn, RB
    [J]. DIGITAL SIGNAL PROCESSING, 2000, 10 (1-3) : 19 - 41
  • [8] Privacy-preserving PLDA speaker verification using outsourced secure computation
    Treiber, Amos
    Nautsch, Andreas
    Kolberg, Jascha
    Schneider, Thomas
    Busch, Christoph
    [J]. SPEECH COMMUNICATION, 2019, 114 : 60 - 71
  • [9] Privacy-Preserving iVector-Based Speaker Verification
    Rahulamathavan, Yogachandran
    Sutharsini, Kunaraj R.
    Ray, Indranil Ghosh
    Lu, Rongxing
    Rajarajan, Muttukrishnan
    [J]. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2019, 27 (03) : 496 - 506
  • [10] Speaker Identification and Verification of Noisy Speech Using Multitaper MFCC and Gaussian Mixture Models
    Veena, K. V.
    Mathew, Dominic
    [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON POWER, INSTRUMENTATION, CONTROL AND COMPUTING (PICC), 2015,