[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Preserving privacy in speaker and speech characterisation

Published: 01 November 2019 Publication History

Highlights

Speech data in legislation.
Standards on biometric information protection.
Speaker recognition, for the non-expert.
Technology survey: data privacy for speech and speaker recognition.
Proposed harmonised evaluation measures.

Abstract

Speech recordings are a rich source of personal, sensitive data that can be used to support a plethora of diverse applications, from health profiling to biometric recognition. It is therefore essential that speech recordings are adequately protected so that they cannot be misused. Such protection, in the form of privacy-preserving technologies, is required to ensure that: (i) the biometric profiles of a given individual (e.g., across different biometric service operators) are unlinkable; (ii) leaked, encrypted biometric information is irreversible, and that (iii) biometric references are renewable. Whereas many privacy-preserving technologies have been developed for other biometric characteristics, very few solutions have been proposed to protect privacy in the case of speech signals. Despite privacy preservation this is now being mandated by recent European and international data protection regulations. With the aim of fostering progress and collaboration between researchers in the speech, biometrics and applied cryptography communities, this survey article provides an introduction to the field, starting with a legal perspective on privacy preservation in the case of speech data. It then establishes the requirements for effective privacy preservation, reviews generic cryptography-based solutions, followed by specific techniques that are applicable to speaker characterisation (biometric applications) and speech characterisation (non-biometric applications). Glancing at non-biometrics, methods are presented to avoid function creep, preventing the exploitation of biometric information, e.g., to single out an identity in speech-assisted health care via speaker characterisation. In promoting harmonised research, the article also outlines common, empirical evaluation metrics for the assessment of privacy-preserving technologies for speech data.

References

[1]
A. Abad, E. Ribeiro, F. Kepler, R.F. Astudillo, I. Trancoso, Exploiting phone log-likelihood ratio features for the detection of the native language of non-native English speakers, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2016.
[2]
M. Abadi, A. Chu, I. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, Zhang L., Deep learning with differential privacy, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016, pp. 308–318.
[3]
M. Adjedj, J. Bringer, H. Chabanne, B. Kindarji, Biometric identification over encrypted data made feasible, Proceedings of the International Conference on Information Systems Security (ICISS), 2009, pp. 86–100.
[4]
A. Adler, Sample images can be independently restored from face recognition templates, Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2003, pp. 1163–1166.
[5]
S. Agrawal, S. Gorbunov, V. Vaitkuntanathan, H. Wee, Functional encryption: new perspectives and lower bounds, Proceedings of the Annual International Cryptology Conference (CRYPTO), 2013, pp. 500–518.
[6]
C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat, R. Sirdey, Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain, IEEE Signal Process. Mag. 30 (2013) 108–117.
[7]
M. Aliasgari, M. Blanton, Zhang Y., A. Steele, Secure computation on floating point numbers, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013.
[8]
X. Anguera, J.-F. Bonastre, A novel speaker binary key derived from anchor models, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2010, pp. 2118–2121.
[9]
X. Anguera, J.-F. Bonastre, Fast speaker diarization based on binary keys, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 4428–4431.
[10]
G. Asharov, Y. Lindell, T. Schneider, M. Zohner, More efficient oblivious transfer and extensions for faster secure computation, Proceedings of the ACM SIGSAC Conference on Computer & Communications Security (CCS), 2013, pp. 535–548.
[11]
R. Bahmani, M. Barbosa, F. Brasser, B. Portela, A.-R. Sadeghi, G. Scerri, B. Warinschi, Secure multiparty computation from SGX, Proceedings of the Financial Cryptography and Data Security (FC), 2017, pp. 477–497.
[12]
A. Barak, M. Hirt, L. Koskas, Y. Lindell, An end-to-end system for large scale P2P MPC-as-a-service and low-bandwidth MPC for weak participants, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018, pp. 695–712. https://github.com/cryptobiu/MATRIX.
[13]
M. Barni, T. Bianchi, D. Catalano, et al., A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates, Proceedings of the International Conference on Biometrics: Theory Applications and Systems (BTAS), 2010, pp. 1–7.
[14]
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, T. Schneider, Privacy-preserving ECG classification with branching programs and neural networks, IEEE Trans. Inf. Forensics Secur. (TIFS) 6 (2) (2011) 452–468.
[15]
M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, Relations among notions of security for public-key encryption schemes, Proceedings of the Annual International Cryptology Conference (CRYPTO), 1998, pp. 26–45.
[16]
M. Bellare, Hoang V.T., S. Keelveedhi, P. Rogaway, Efficient garbling from a fixed-key blockcipher, Proceedings of the IEEE Symposium on Security and Privacy (S&P), IEEE, 2013, pp. 478–492.
[17]
D.J. Bernstein, J. Buchmann, E. Dahmen, Post-Quantum Cryptography, Springer Science & Business Media, 2009.
[18]
T. Bianchi, S. Turchi, A. Piva, et al., Implementing fingercode-based identity matching in the encrypted domain, Proceedings of the Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2010, pp. 15–21.
[19]
S. Billeb, C. Rathgeb, M. Buschbeck, H. Reininger, K. Kasper, Efficient two-stage speaker identification based on universal background models, Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), 2014, pp. 1–6.
[20]
S. Billeb, C. Rathgeb, H. Reininger, K. Kasper, C. Busch, Biometric template protection for speaker recognition based on universal background models, IET Biomet. 4 (2) (2015) 116–126.
[21]
F. Bimbot, G. Chollet, Assessment of Speaker Verification Systems, De Gruyter, 1997, pp. 408–480.
[22]
A. Bishop, A. Jain, L. Kowalczyk, Function-hiding inner product encryption, Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2015, pp. 470–491.
[23]
M. Blanton, M. Aliasgari, Secure outsourced computation of iris matching, J. Comput. Secur. (JoCS) 20 (2-3) (2012) 259–305.
[24]
M. Blanton, P. Gasti, Secure and efficient protocols for iris and fingerprint identification, Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011, pp. 190–209.
[25]
J.F. Bonastre, P.M. Bousquet, D. Matrouf, X. Anguera, Discriminant binary data representation for speaker recognition, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 5284–5287,.
[26]
D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004, pp. 506–522.
[27]
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Proceedings of the Annual International Cryptology Conference (CRYPTO), 2001, pp. 213–229.
[28]
D. Boneh, A. Sahai, B. Waters, Functional encryption: definitions and challenges, Proceedings of the Theory of Cryptography Conference (TCC), 2011, pp. 253–273.
[29]
D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, Proceedings of the Theory of Cryptography Conference (TCC), 2007, pp. 535–554.
[30]
P. Boufounos, S. Rane, Secure binary embeddings for privacy preserving nearest neighbors, Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), 2011.
[31]
F. Bourse, M. Minelli, M. Minihold, P. Paillier, Fast homomorphic evaluation of deep discretized neural networks, IACR Cryptol. ePrint Arch. 2017 (2017) 1114.
[32]
L.-J. Boë, Forensic voice identification in France, Speech Commun. 31 (2000) 205–224.
[33]
F. Brasser, T. Frassetto, K. Riedhammer, A.-R. Sadeghi, T. Schneider, C. Weinert, VoiceGuard: secure and private speech processing, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2018, pp. 1303–1307.
[34]
J.S. Bridle, M.D. Brown, An Experimental Automatic Word-Recognition System, JSRU Report, Joint Speech Research Unit, Ruislip, England, 1974.
[35]
J. Bringer, H. Chabanne, M. Favre, A. Patey, T. Schneider, M. Zohner, GSHADE: faster privacy-preserving distance computation and biometric identification, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), 2014, pp. 187–198.
[36]
J. Bringer, C. Morel, C. Rathgeb, Security analysis of bloom filter-based iris biometric template protection, Proceedings of the IEEE International Conference on Biometrics (ICB), 2015, pp. 527–534.
[37]
N. Brümmer, Measuring, Refining and Calibrating Speaker and Language Information Extracted From Speech, University of Stellenbosch, 2010, Ph.D. thesis.
[38]
N. Brümmer, L. Burget, P. Garcia, O. Plchot, J. Rhodin, et al., Meta-Embeddings: A Probabilistic Generalization of Embeddings in Machine Learning, Technical Report, JHU HLTCOE 2017 SCALE Workshop, 2017, https://github.com/bsxfan/meta-embeddings/tree/master/theory.
[39]
N. Brümmer, E. de Villiers, The BOSARIS Toolkit User Guide: Theory, Algorithms and Code for Binary Classifier Score Processing, Technical Report, AGNITIO Research, South Africa, 2011.
[40]
N. Brümmer, J. du Preez, Application-independent evaluation of speaker detection, Comput. Speech Lang. (CSL) 20 (2) (2008) 230–275.
[41]
N. Brümmer, J. du Preez, The PAV Algorithm Optimizes Binary Proper Scoring Rules, Technical Report, Agnitio, 2009, http://niko.brummer.googlepages.com.
[42]
N. Brümmer, A. Silnova, L. Burget, T. Stafylakis, Gaussian meta-embeddings for efficient scoring of a heavy-tailed PLDA model, Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018, pp. 349–356.
[43]
I. Buhan, J. Breebaart, J. Guajardo, et al., A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem, Proceedings of the International Conference on Data Privacy Management and Autonomous Spontaneous Security (DPM/SETOP), 2009, pp. 78–92.
[44]
I. Buhan, J. Merchan, E. Kelkboom, Efficient strategies for playing the indistinguishability game for fuzzy sketches, Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), 2010.
[45]
Security and Privacy in Biometrics, Campisi P. (Ed.), Springer, 2013.
[46]
R. Cappelli, D. Maio, A. Lumini, D. Maltoni, Fingerprint image reconstruction from standard templates, IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI) 29 (9) (2007) 1489–1503.
[47]
D. Cash, P. Grubbs, J. Perry, T. Ristenpart, Leakage-abuse attacks against searchable encryption, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2015.
[48]
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, M. Steiner, Dynamic searchable encryption in very-large databases: data structures and implementation, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014.
[49]
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Roşu, M. Steiner, Highly-scalable searchable symmetric encryption with support for boolean queries, Proceedings of the Annual Cryptology Conf. (CRYPTO), 2013.
[50]
A. Cavoukian, A. Stoianov, Biometric encryption, Encyclopedia of Cryptography and Security, Springer, 2011, pp. 90–98.
[51]
H. Chabanne, A. de Wargny, J. Milgram, C. Morel, et al., Privacy-preserving classification on deep neural network, IACR Cryptol. ePrint Arch. 2017 (2017) 35.
[52]
Chun H., Y. Elmehdwi, Li F., P. Bhattacharya, Jiang W., Outsourceable two-party privacy-preserving biometric authentication, Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2014, pp. 401–412.
[53]
G. Cormode, S. Jha, T. Kulkarni, Li N., D. Srivastava, Wang T., Privacy at scale: local differential privacy in practice, Proceedings of the ACM SIGMOD/PODS International Conference on Management of Data (SIGMOD/PODS), 2018, pp. 1655–1658.
[54]
L. Costa, Y. Poullet, Privacy and the regulation of 2012, Comput. Law Secur. Rev. 28 (3) (2012) 254–262.
[55]
V. Costan, S. Devadas, Intel SGX explained, IACR Cryptol. ePrint Arch. 2016 (2016) 086.
[56]
S. Cumani, Fast scoring of full posterior PLDA models, IEEE/ACM Trans. Audio Speech Lang. Process. (TASLP) 23 (11) (2015) 2036–2045.
[57]
S. Cumani, N. Brümmer, L. Burget, P. Laface, O. Plchot, V. Vasilakakis, Pairwise discriminative speaker verification in the i-vector space, IEEE Trans. Audio Speech Lang. Process. (TASLP) 21 (6) (2013) 1217–1227.
[58]
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: Improved definitions and efficient constructions, Proceedings of the ACM SIGSAC Conference on Computer and Communications Securitys (CCS), 2006.
[59]
I. Damgård, M. Jurik, A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system, Proceedings of the International Workshop on Practice and Theory in Public Key Cryptosystems (PKC), 2001.
[60]
S. Davis, P. Mermelstein, Comparison of parametric representations for mono-syllabic word recognition in continuously spoken sentences, Trans. Acoust. Speech Signal Process. (ASSP) 28 (4) (1980) 357–366.
[61]
N. Dehak, P.J. Kenny, R. Dehak, P. Dumouchel, P. Ouellet, Front-end factor analysis for speaker verification, IEEE Trans. Audio Speech Lang. Process. (TASLP) 19 (4) (2011) 788–798.
[62]
H. Delgado, X. Anguera, C. Fredouille, J. Serrano, Fast single-and cross-show speaker diarization using binary key speaker modeling, IEEE Trans. Audio Speech Lang. Process. (TASLP) 23 (12) (2015) 2286–2297.
[63]
D. Demmler, G. Dessouky, F. Koushanfar, A.-R. Sadeghi, T. Schneider, S. Zeitouni, Automated synthesis of optimized circuits for secure computation, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2015, pp. 1504–1517.
[64]
D. Demmler, T. Schneider, M. Zohner, ABY – a framework for efficient mixed-protocol secure two-party computation, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2015.
[65]
M. Dias, A. Abad, I. Trancoso, Exploring hashing and cryptonet based approaches for privacy-preserving speech emotion recognition, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018.
[66]
C. Dwork, Differential privacy, Proceedings of the International Colloquium on Automata, Languages and Programming, Part II (ICALP 2006), 2006, pp. 1–12.
[67]
C. Dwork, A. Roth, et al., The algorithmic foundations of differential privacy, Found. Trends® in Theor. Comput. Sci. (TCS) 9 (3–4) (2014) 211–407.
[68]
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (ASIACRYPT), 1984, pp. 10–18.
[69]
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, T. Toft, Privacy-preserving face recognition, Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium (PETS), 2009, pp. 235–253.
[70]
European Parliament and Council, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), 2016.
[71]
European Parliament and Council, Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, 2016.
[72]
D. Evans, Huang Y., J. Katz, L. Malka, Efficient privacy-preserving biometric identification, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011.
[73]
M. Ferrara, D. Maltoni, R. Cappelli, A two-factor protection scheme for MCC fingerprint templates, Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), 2014.
[74]
J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, J. Ortega-Garcia, Iris image reconstruction from binary templates: an efficient probabilistic approach based on genetic algorithms, Comput. Vis. Image Underst. (CVIU) 117 (10) (2013) 1512–1525.
[75]
J.A.G. García, L. Moro-Velázquez, J.I. Godino-Llorente, G. Castellanos-Domínguez, Automatic age detection in normal and pathological voice, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2015.
[76]
D. Garcia-Romero, C. Epsy-Wilson, Analysis of i-vector length normalization in speaker recognition systems, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), ISCA, 2011, pp. 249–252.
[77]
C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the ACM Symposium on Theory of Computing (STOC), 2009, pp. 169–178.
[78]
R. Gilad-Bachrach, N. Dowlin, K. Laine, et al., CryptoNets: applying neural networks to encrypted data with high throughput and accuracy, Proceedings of the JMLR International Conference on Machine Learning (ICML), 48, 2016, pp. 201–210.
[79]
C. Glackin, G. Chollet, N. Dugan, N. Cannings, J. Wall, S. Tahir, I.G. Ray, M. Rajarajan, Privacy preserving encrypted phonetic search of speech data, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6414–6418.
[80]
O. Glembek, L. Burget, N. Dehak, N. Bümmer, P. Kenny, Comparison of scoring methods used in speaker recognition with joint factor analysis, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2009, pp. 4057–4060.
[81]
M. Gomez-Barrero, J. Fierrez, J. Galbally, E. Maiorana, P. Campisi, Implementation of fixed length template protection based on homomorphic encryption with application to signature biometrics, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPR), 2016, pp. 191–198.
[82]
M. Gomez-Barrero, J. Galbally, A. Morales, M.A. Ferrer, J. Fierrez, J. Ortega-Garcia, A novel hand reconstruction approach and its application to vulnerability assessment, Inf. Sci. 268 (2014) 103–121.
[83]
M. Gomez-Barrero, J. Galbally, A. Morales, J. Fierrez, Privacy-preserving comparison of variable-length data with application to biometric template protection, IEEE Access 5 (1) (2017) 8606–8619.
[84]
M. Gomez-Barrero, J. Galbally, C. Rathgeb, C. Busch, General framework to evaluate unlinkability in biometric template protection systems, IEEE Trans. Inf. Forensics Secur. (TIFS) 3 (6) (2018) 1406–1420.
[85]
M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi, J. Fierrez, Multi-biometric template protection based on homomorphic encryption, Pattern Recognit. 67 (2017) 149–163.
[86]
D.M. González, O. Plchot, L. Burget, O. Glembek, P. Matejka, Language recognition in i-vectors space, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2011.
[87]
D. Gupta, B. Mood, J. Feigenbaum, K. Butler, P. Traynor, Using Intel software guard extensions for efficient two-party secure function evaluation, Proceedings of the Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC), 2016.
[88]
S. Gürses, C. Troncoso, C. Diaz, Engineering privacy by design, Proceedings of the Computers, Privacy and Data Protection (CPDP), 2011.
[89]
T. Haderlein, F. Middag, C. Hönig, J.-P. Martens, M. Döllinger, A. Schützenberger, E. Nöth, Language-Independent Age Estimation From Speech Using Phonological and Phonemic Features, Springer Lecture Notes in Artificial Intelligence (LNAI), 9302, Springer, 2015, pp. 165–173.
[90]
J.H.L. Hansen, T. Hasan, Speaker recognition by machines and humans: a tutorial review, IEEE Signal Process. Mag. 32 (6) (2015) 74–99.
[91]
H. Harb, Chen L., Voice-based gender identification in multimedia applications, J. Intell. Inf. Syst. (JIIS) 24 (2) (2005) 179–198.
[92]
M. Hastings, B. Hemenway, D. Noble, S. Zdancewic, SoK: general-purpose compilers for secure multi-party computation, Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2019.
[93]
G. Hernandez-Sierra, J.R. Calvo, J.-F. Bonastre, P.-M. Bousquet, Session compensation using binary speech representation for speaker recognition, Pattern Recognit. Lett. 49 (2014) 17–23.
[94]
E. Hesamifard, H. Takabi, M. Ghasemi, CryptoDL: deep neural networks over encrypted data, Comput. Res. Repos. (CoRR) (2017).
[95]
J.H. Hoepman, Privacy design strategies, Proceedings of the Privacy Law Scholars Conference (PLSC), 2013.
[96]
J. Hoffstein, J. Pipher, J.H. Silverman, NTRU: a ring-based public key cryptosystem, Proceedings of the International Algorithmic Number Theory Symposium (ANTS), 1998, pp. 267–288.
[97]
Hu S., Li M., Wang Q., S.S. Chow, Du M., Outsourced biometric identification with privacy, IEEE Trans. Inf. Forensics Secur. (TIFS) 13 (10) (2018) 2448–2463.
[98]
IEEE Standards Association, 754-2008 IEEE standard for Floating-Point Arithmetic, 2008.
[99]
S. Ioffe, C. Szegedy, Batch normalization: accelerating deep network training by reducing internal covariate shift, Comput. Res. Repos. (CoRR) (2015).
[100]
Y. Ishai, J. Kilian, K. Nissim, E. Petrank, Extending oblivious transfers efficiently, Proceedings of the Annual International Cryptology Conference (CRYPTO), 2003, pp. 145–161.
[101]
M.S. Islam, M. Kuzu, M. Kantarcioglu, Access pattern disclosure on searchable encryption: ramification, attack and mitigation, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012.
[102]
ISO/CASCO Committee on Conformity Assessment, ISO/IEC 17025:2017. General Requirements for the Competence of Testing and Calibration Laboratories, International Organization for Standardization, 2017.
[103]
ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011. Information Technology – Security Techniques – Biometric Information Protection, International Organization for Standardization, 2011.
[104]
ISO/IEC JTC1 SC37 Biometrics, ISO/IEC 19795-1:2017. Information Technology – Biometric Performance Testing and Reporting – Part 1: Principles and Framework, International Organization for Standardization and International Electrotechnical Committee, 2017.
[105]
ISO/IEC JTC1 SC37 Biometrics, ISO/IEC 2382-37:2017 Information Technology – Vocabulary – Part 37: Biometrics, International Organization for Standardization, 2017.
[106]
ISO/IEC JTC1 SC37 Biometrics, ISO/IEC 30136:2018. Information Technology – Performance Testing of Biometric Template Protection schemes, International Organization for Standardization, 2018.
[107]
C. Jasserand, Legal nature of biometric data: from ‘generic’ personal data to sensitive data: which changes does the new data protection framework introduce?, Eur. Data Protect. Law Rev. 2 (3) (2016) 297–311.
[108]
A. Jiménez, B. Raj, Privacy preserving distance computation using somewhat-trusted third parties, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6399–6403.
[109]
A. Jiménez, B. Raj, A two factor transformation for speaker verification through ℓ1 comparison, Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), 2017, pp. 1–6.
[110]
A. Jiménez, B. Raj, J. Portêlo, I. Trancoso, Secure modular hashing, Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), 2015, pp. 1–6.
[111]
C. Juvekar, V. Vaikuntanathan, A. Chandrakasan, GAZELLE: a low latency framework for secure neural network inference, Proceedings of the USENIX Security Symposium (USENIX Security), 2018.
[112]
S. Kamara, C. Papamanthou, T. Roeder, Dynamic searchable symmetric encryption, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2012.
[113]
S.G. Kanade, D. Petrovska-Delacrétaz, B. Dorizzi, Enhancing information security and privacy by combining biometrics with cryptography, Synth. Lect. Inf. Secur. Priv. Trust (SPT) 3 (1) (2012) 1–140.
[114]
J. Katz, Y. Lindell, Introduction to Modern Cryptography, Chapman and Hall/CRC, 2014.
[115]
J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008, pp. 146–162.
[116]
E.J. Kelkboom, J. Breebaart, T.A. Kevenaar, I. Buhan, R.N. Veldhuis, Preventing the decodability attack based cross-matching in a fuzzy commitment scheme, IEEE Trans. Inf. Forensics Secur. (TIFS) 6 (1) (2011) 107–121.
[117]
P. Kenny, Joint Factor Analysis of Speaker and Session Variability: Theory and Algorithms, Technical Report, CRIM, Montreal, 2005.
[118]
P. Kenny, G. Boulianne, P. Ouellet, P. Dumouchel, Joint factor analysis versus eigenchannels in speaker recognition, IEEE Trans. Audio Speech Lang. Process. (TASLP) 15 (4) (2007) 1435–1447.
[119]
A. Kholmatov, B. Yanikoglu, Realization of correlation attack against the fuzzy vault scheme, Proceedings of the SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008.
[120]
S. Kim, K. Lewi, A. Mandal, H. Montgomery, A. Roy, Wu D.J., Function-hiding inner product encryption is practical, Proceedings of the International Conference on Security and Cryptography for Networks (SCN), 2018, pp. 544–562.
[121]
E. Kindt, Having yes, using no? About the new legal regime for biometric data, Comput. Law Secur. Rev. 34 (3) (2018) 523–538.
[122]
E. Kindt, A legal perspective on the relevance of biometric presentation attack detection (PAD) for payment services under PSDII and the GDPR, in: Marcel S., Nixon M., Fierrez J., Evans N. (Eds.), Handbook of Biometric Anti-Spoofing – Presentation Attack Detection, in: Advances in Computer Vision and Pattern Recognition, second ed., Springer, 2019.
[123]
T. Kinnunen, Li H., An overview of text-independent speaker recognition: from features to supervectors, Speech Commun. 52 (1) (2010) 12–40.
[124]
D. Klitou, Privacy-Invading Technologies and Privacy by Design – Safeguarding Privacy, Liberty and Security in the 21st Century, Springer, 2014.
[125]
P. Koeberl, V. Phegade, A. Rajan, T. Schneider, S. Schulz, M. Zhdanova, Time to rethink: trust brokerage using trusted execution environments, Proceedings of the Trust and Trustworthy Computing (TRUST), 2015, pp. 181–190.
[126]
V. Kolesnikov, T. Schneider, Improved garbled circuit: free XOR gates and applications, Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), 2008, pp. 486–498.
[127]
L. Lessig, Code, Version 2.0, Basic Books, 2006.
[128]
Y. Lindell, How to simulate it – a tutorial on the simulation proof technique, Tutorials on the Foundations of Cryptography, Springer, 2017, pp. 277–346.
[129]
Y. Lindell, B. Pinkas, A proof of security of Yao’s protocol for two-party computation, J. Cryptol. (JoC) (2009) 161–188.
[130]
Y. Lindell, B. Pinkas, Secure two-party computation via cut-and-choose oblivious transfer, J. of Cryptol. (JoC) 25 (4) (2012) 680–722.
[131]
Y. Lindell, E. Waisbard, Private web search with malicious adversaries, Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium (PETS), Springer, 2010, pp. 220–235.
[132]
Liu J., M. Juuti, Lu Y., N. Asokan, Oblivious neural network predictions via MiniONN transformations, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017, pp. 619–631.
[133]
Lu R., Zhu H., Liu X., Liu J.K., Shao J., Toward efficient and privacy-preserving computing in big data era, IEEE Netw. 28 (4) (2014) 46–50.
[134]
J. Luque, X. Anguera, On the modeling of natural vocal emotion expressions through binary key, Proceedings of the European Signal Processing Conference (EUSIPCO), 2014, pp. 1562–1566.
[135]
D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, et al., Fairplay – a secure two-party computation system, Proceedings of the USENIX Security Symposium, 2004.
[136]
F. McKeen, I. Alexandrovich, A. Berenzon, C.V. Rozas, H. Shafi, V. Shanbhogue, U.R. Savagaonkar, Innovative instructions and software model for isolated execution, Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), 2013.
[137]
A. Mencattini, E. Martinelli, G. Costantini, M. Todisco, B. Basile, M. Bozzali, C.D. Natale, Speech emotion recognition using amplitude modulation parameters and a combined feature selection procedure, Knowl.-Based Syst. 63 (2014) 68–81.
[138]
D. Meuwly, D. Ramos, R. Haraksim, A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation, Forensic Sci. Int. 276 (2017) 142–153.
[139]
Microsoft ResearchRedmond, WA., Simple Encrypted Arithmetic Library (release 3.0.0), 2018.
[140]
P. Mohassel, Zhang Y., SecureML: a system for scalable privacy-preserving machine learning, Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2017, pp. 19–38.
[141]
S.B. Mokhtar, A. Boutet, P. Felber, M. Pasin, R. Pires, V. Schiavoni, X-search: revisiting private web search using Intel SGX, Proceedings of the ACM/IFIP/USENIX Middleware Conference, 2017, pp. 198–208.
[142]
A. Mtibaa, D. Petrovska-Delacretaz, A.B. Hamida, Cancelable speaker verification system based on binary Gaussian mixtures, Proceedings of the Advanced Technologies for Signal and Image Processing (ATSIP), 2018, pp. 1–6.
[143]
A. Nagar, K. Nandakumar, A.K. Jain, Biometric template transformation: a security analysis, Proceedings of the SPIE Media Forensics and Security II, 2010.
[144]
A. Nautsch, S. Isadskiy, J. Kolberg, M. Gomez-Barrero, C. Busch, Homomorphic encryption for speaker recognition: protection of biometric templates and vendor model parameters, Proceedings of the Speaker and Language Recognition Workshop (Odyssey), ISCA, 2018, pp. 16–23.
[145]
A.V. Oppenheim, R.W. Schafer, Homomorphic analysis of speech, IEEE Trans. Audio Electroacoust. (AU) 16 (2) (1968) 221–226.
[146]
M. Osadchy, B. Pinkas, A. Jarrous, B. Moskovich, SCiFi – a system for secure face identification, Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2010, pp. 239–254.
[147]
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Springer, 1999, pp. 223–238.
[148]
P. Paillier, D. Pointcheval, Efficient public-key cryptosystems provably secure against active adversaries, Proceedings of the Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 1999, pp. 165–179.
[149]
V.M. Patel, N. Ratha, R. Chellappa, Cancelable biometrics: a review, IEEE Signal Process. Mag. 32 (5) (2015) 54–65.
[150]
M. Pathak, J. Portêlo, B. Raj, I. Trancoso, Privacy-preserving speaker authentication, Proceedings of the International Conference on Information Security (ISC), 2012, pp. 1–22.
[151]
M. Pathak, B. Raj, Privacy preserving speaker verification using adapted GMMs, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2011.
[152]
M. Pathak, B. Raj, Large margin multiclass Gaussian mixture models with differential privacy, IEEE Trans. Depend. Secur. Comput. (TDSC) 9 (4) (2012) 463–469.
[153]
M. Pathak, B. Raj, Privacy preserving speaker verification as password matching, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012.
[154]
M. Pathak, B. Raj, Privacy-preserving speaker verification and identification using Gaussian mixture models, IEEE/ACM Trans. Audio Speech Lang. Process. (TASLP) 21 (2) (2013) 397–406.
[155]
M. Pathak, S. Rane, B. Raj, Multiparty differential privacy via aggregation of locally trained classifiers, Proceedings of the Neural Information Processing Systems (NIPS), 2010, pp. 1876–1884.
[156]
M.A. Pathak, S. Rane, Sun W., B. Raj, Privacy preserving probabilistic inference with hidden Markov models, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 5868–5871.
[157]
J. Patino, H. Delgado, N. Evans, The EURECOM submission to the first DIHARD challenge, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2018, pp. 2813–2817.
[158]
C. Patsakis, J. van Rest, M. Choraś, M. Bouroche, Privacy-preserving biometric authentication and matching via lattice-based encryption, Proceedings of the International Workshop on Data Privacy Management (DPM), 2015, pp. 169–182.
[159]
M. Paulini, C. Rathgeb, A. Nautsch, H. Reichau, H. Reininger, C. Busch, Multi-bit allocation: preparing voice biometrics for template protection, Proceedings of the Speaker and Language Recognition Workshop (Odyssey), 2016, pp. 291–296.
[160]
Phan N., Wang Y., Wu X., Dou D., Differential privacy preservation for deep auto-encoders: an application of human behavior prediction, Proceedings of the AAAI Conference on Artificial Intelligence, 16, 2016, pp. 1309–1316.
[161]
E. Piciucco, E. Maiorana, et al., Cancelable biometrics for finger vein recognition, Proceedings of the IEEE International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE), 2016, pp. 1–5.
[162]
B. Pinkas, T. Reinman, Oblivious RAM revisited, Proceedings of the Annual Cryptology Conference (CRYPTO), 2010, pp. 502–519.
[163]
J. Portêlo, A. Abad, B. Raj, I. Trancoso, Privacy-preserving query-by-example speech search, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015.
[164]
J. Portêlo, B. Raj, A. Abad, I. Trancoso, Privacy-preserving speaker verification using garbled GMMs, Proceedings of the European Signal Processing Conference (EUSIPCO), 2014, pp. 2070–2074.
[165]
J. Portêlo, B. Raj, P. Boufounos, I. Trancoso, A. Abad, Speaker verification using secure binary embeddings, Proceedings of the European Signal Processing Conference (EUSIPCO), 2013.
[166]
J. Portêlo, B. Raj, I. Trancoso, Logsum using garbled circuits, Publ. Libr. Sci. (PloS One) 10 (3) (2015) e0122236.
[167]
S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns, IEEE Secur. Priv. (SECPRIV) 99 (2003) 33–42.
[168]
S.J.D. Prince, Computer Vision: Models, Learning and Inference, Cambridge University Press, 2012.
[169]
S.J.D. Prince, J.H. Elder, Probabilistic linear discriminant analysis for inferences about identity, Proceedings of the International Conference on Computer Vision (ICCV), CVF, 2007.
[170]
L.R. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, Proc. IEEE 77 (2) (1989) 257–286.
[171]
S. Rahulamathavan, Yao X., R. Yogachandran, K. Cumanan, M. Rajarajan, Redesign of Gaussian mixture model for efficient and privacy-preserving speaker recognition, Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), IEEE, 2018, pp. 1–8.
[172]
Y. Rahulamathavan, K.R. Sutharsini, I.G. Ray, Lu R., M. Rajarajan, Privacy-preserving i-vector based speaker verification, IEEE/ACM Trans. Audio Speech Lang. Process. (TASLP) 27 (3) (2019) 496–506.
[173]
D. Ramos, J. Gonzalez-Rodrigues, Cross-entropy analysis of the information in forensic speaker recognition, Proceedings of the IEEE Odyssey, 2008.
[174]
S. Rane, Standardization of biometric template protection, IEEE Multimed. 21 (4) (2014) 94–99.
[175]
C. Rathgeb, A. Uhl, A survey on biometric cryptosystems and cancelable biometrics, EURASIP J. Inf. Secur. (JIS) (2011) 3.
[176]
D.A. Reynolds, T.F. Quatieri, R.B. Dunn, Speaker verification using adapted gaussian mixture models, Conversat. Speech Digit. Signal Process. 10 (2000) 19–41.
[177]
M.S. Riazi, M. Samragh, Chen H., K. Laine, K. Lauter, F. Koushanfar, Xonn: Xnor-based oblivious deep neural network inference, Proceedings of the USENIX Security Symposium, 2019.
[178]
M.S. Riazi, C. Weinert, O. Tkachenko, E.M. Songhori, T. Schneider, F. Koushanfar, Chameleon: a hybrid secure computation framework for machine learning applications, Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2018, pp. 707–721.
[179]
E.A. Rua, E. Maiorana, J.L.A. Castro, P. Campisi, Biometric template protection using universal background models: an application to online signature, IEEE Trans. Inf. Forensics Secur. (TIFS) 7 (1) (2012) 269–282.
[180]
I. Rubinstein, N. Good, Privacy by design: a counterfactual analysis of Google and Facebook incidents, Berkeley Technol. Law J. 28 (2013) 1133–1413.
[181]
A.-R. Sadeghi, T. Schneider, Generalized universal circuits for secure evaluation of private functions with application to data classification, Proceedings of the International Conference on Information Security and Cryptology (ICISC), Springer, 2008, pp. 336–353.
[182]
A.-R. Sadeghi, T. Schneider, I. Wehrenberg, Efficient privacy-preserving face recognition, Proceedings of the International Conference on Information Security and Cryptology (ICISC), 2009, pp. 229–244.
[183]
S.O. Sadjadi, S. Ganapathy, J.W. Pelecanos, Speaker age estimation on conversational telephone speech using senone posterior based i-vectors, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016, pp. 5040–5044.
[184]
A. Sanyal, M.J. Kusner, A. Gascón, V. Kanade, TAPAS: tricks to accelerate (encrypted) prediction as a service, Comput. Res. Repos. (CoRR) (2018).
[185]
B. Schuller, A. Batliner, Computational Paralinguistics: Emotion, Affect and Personality in Speech and Language Processing, John Wiley & Sons, 2013.
[186]
I. Shafran, M. Riley, M. Mohri, Voice signatures, Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU), 2003, pp. 31–36.
[187]
Shen E., Shi E., B. Waters, Predicate privacy in encryption systems, Proceedings of the Theory of Cryptography Conference (TCC), 2009, pp. 457–473.
[188]
R. Shokri, V. Shmatikov, Privacy-preserving deep learning, Proceedings of the ACM SIGSAC conference on Computer and Communications Security (CCS), 2015, pp. 1310–1321.
[189]
K. Simoens, P. Tuyls, B. Preneel, Privacy weaknesses in biometric sketches, Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2009, pp. 188–203.
[190]
K. Simoens, Yang B., Zhou X., F. Beato, C. Busch, et al., Criteria towards metrics for benchmarking template protection algorithms, Proceedings of the IAPR International Conference on Biometrics (ICB), IAPR, 2012, pp. 498–505.
[191]
D. Snyder, D. Garcia-Romero, A. McCree, G. Sell, D. Povey, S. Khudanpur, Spoken language recognition using x-vectors, Proceedings of the Odyssey 2014: The Speaker and Language Recognition Workshop, 2018, pp. 105–111.
[192]
D. Snyder, D. Garcia-Romero, D. Povey, S. Khudanpur, Deep neural network-based speaker embeddings for end-to-end speaker verification, Proceedings of the IEEE Spoken Language Technology Workshop (SLT), 2016, pp. 165–170.
[193]
D. Snyder, D. Garcia-Romero, D. Povey, S. Khudanpur, Deep neural network embeddings for text-independent speaker verification, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), ISCA, 2017, pp. 999–1003.
[194]
D. Snyder, D. Garcia-Romero, G. Sell, D. Povey, S. Khudanpur, X-vectors: robust DNN embeddings for speaker recognition, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018, pp. 5329–5333.
[195]
Song D.X., D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2000, pp. 44–55.
[196]
S. Spiekermann, L.F. Crannor, Engineering privacy, IEEE Trans. Softw. Eng. (TSE) 35 (1) (2009) 67–82.
[197]
D. Stehlé, R. Steinfeld, K. Tanaka, K. Xagawa, Efficient public key encryption based on ideal lattices, Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2009, pp. 617–635.
[198]
S.S. Stevens, J. Volkmann, E.B. Newman, A scale for the measurement of the psychological magnitude pitch, J. Acoust. Soc. Am. (JASA) 8 (3) (1937) 185–190.
[199]
F. Teixeira, A. Abad, I. Trancoso, Patient privacy in paralinguistic tasks, Proceedings of the Annual Conference of the International Speech Communication Association (INTERSPEECH), 2018, pp. 3428–3432.
[201]
O. Tkachenko, C. Weinert, T. Schneider, K. Hamacher, Large-scale privacy-preserving statistical computations for distributed genome-wide association studies, Proceedings of the ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2018, pp. 221–235.
[202]
T. Toda, A.W. Black, K. Tokuda, Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory, Trans. Acoust. Speech Lang. Process. (TASLP) 15 (8) (2007) 2222–2235.
[203]
P.G. Vilda, R. Fernández-Baíllo, M.V.R. Biarge, V.N. Lluis, A.Á. Marquina, L.M. Mazaira-Fernández, R. Martínez-Olalla, J.I. Godino-Llorente, Glottal source biometrical signature for voice pathology detection, Speech Commun. 51 (9) (2009) 759–781.
[204]
Wang Q., Hu S., Ren K., He M., Du M., Wang Z., CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud, Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2015, pp. 186–205.
[205]
Wang S., Hu J., Design of alignment-free cancelable fingerprint templates via curtailed circular convolution, Pattern Recognit. 47 (3) (2014) 1321–1329.
[206]
Xu Y., Cui W., M. Peinado, Controlled-channel attacks: deterministic side channels for untrusted operating systems, Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2015, pp. 640–656.
[207]
Yao A.C., Protocols for secure computations, Proceedings of the Annual Symposium on Foundations of Computer Science (SFCS), 1982, pp. 160–164.
[208]
M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama, T. Koshiba, Packed homomorphic encryption based on ideal lattices and its application to biometrics, Proceedings of the International Conference on Availability, Reliability, and Security (ARES), 2013, pp. 55–74.
[209]
M. Yasuda, T. Shimoyama, J. Kogure, K. Yokoyama, T. Koshiba, New packing method in somewhat homomorphic encryption and its applications, Secur. Commun. Netw. 8 (13) (2015) 2194–2213.
[210]
S. Zahur, M. Rosulek, D. Evans, Two halves make a whole: reducing data transfer in garbled circuits using half gates, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2015, pp. 220–250.

Cited By

View all
  • (2024)Vulnerability issues in Automatic Speaker Verification (ASV) systemsEURASIP Journal on Audio, Speech, and Music Processing10.1186/s13636-024-00328-82024:1Online publication date: 10-Feb-2024
  • (2024)Anonymization of Voices in Spaces for Civic Dialogue: Measuring Impact on Empathy, Trust, and Feeling HeardProceedings of the ACM on Human-Computer Interaction10.1145/36870218:CSCW2(1-22)Online publication date: 8-Nov-2024
  • (2024)UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial PerturbationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.324229221:1(31-46)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer Speech and Language
Computer Speech and Language  Volume 58, Issue C
Nov 2019
481 pages

Publisher

Academic Press Ltd.

United Kingdom

Publication History

Published: 01 November 2019

Author Tags

  1. Data privacy
  2. Voice biometrics
  3. Standardisation
  4. Cryptography
  5. Legislation

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Vulnerability issues in Automatic Speaker Verification (ASV) systemsEURASIP Journal on Audio, Speech, and Music Processing10.1186/s13636-024-00328-82024:1Online publication date: 10-Feb-2024
  • (2024)Anonymization of Voices in Spaces for Civic Dialogue: Measuring Impact on Empathy, Trust, and Feeling HeardProceedings of the ACM on Human-Computer Interaction10.1145/36870218:CSCW2(1-22)Online publication date: 8-Nov-2024
  • (2024)UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial PerturbationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.324229221:1(31-46)Online publication date: 1-Jan-2024
  • (2024)Application of personalized federated learning methods to environmental sound classificationEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108760135:COnline publication date: 1-Sep-2024
  • (2024)Voice Privacy Using Time-Scale and Pitch ModificationSN Computer Science10.1007/s42979-023-02549-85:2Online publication date: 27-Jan-2024
  • (2023)Digital Ethics for Biometric Applications in a Smart CityDigital Government: Research and Practice10.1145/36302614:4(1-6)Online publication date: 31-Dec-2023
  • (2023)VoicePM: A Robust Privacy Measurement on Voice AnonymityProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590175(215-226)Online publication date: 29-May-2023
  • (2022)Paralinguistic Privacy Protection at the EdgeACM Transactions on Privacy and Security10.1145/357016126:2(1-27)Online publication date: 3-Nov-2022
  • (2022)Safe audio AI services in smart buildingsProceedings of the 9th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation10.1145/3563357.3564076(266-269)Online publication date: 9-Nov-2022
  • (2022)Bias in Automated Speaker RecognitionProceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency10.1145/3531146.3533089(230-247)Online publication date: 21-Jun-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media