2019
DOI: 10.1016/j.specom.2019.09.004
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving PLDA speaker verification using outsourced secure computation

Abstract: The usage of biometric recognition has become prevalent in various verification processes, ranging from unlocking mobile devices to verifying bank transactions. Automatic speaker verification (ASV) allows an individual to verify its identity towards an online service provider by comparing freshly sampled speech data to reference information stored on the service provider's server. Due to the sensitive nature of biometric data, the storage and usage thereof is subject to recent EU regulations introduced as mean… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 58 publications
0
3
0
Order By: Relevance
“…Treiber et al addressed this issue and proposed architecture to enable privacy-preserving ASV in the encrypted domain. The authors stated that their proposed architecture is performing better than a previous scheme, namely the homomorphic encryption (HE), where the usage of the latter encryption comes with a rather heavy overhead, leading to a slow verification process [8].…”
Section: Published Work In the Year 2019mentioning
confidence: 98%
“…Treiber et al addressed this issue and proposed architecture to enable privacy-preserving ASV in the encrypted domain. The authors stated that their proposed architecture is performing better than a previous scheme, namely the homomorphic encryption (HE), where the usage of the latter encryption comes with a rather heavy overhead, leading to a slow verification process [8].…”
Section: Published Work In the Year 2019mentioning
confidence: 98%
“…There are ample amount of literature available for face images in cancelable biometrics and in cryptobiometrics [76] also in homomorphic encryption [43], [96], [115]. And also there are limited amount of literature available for speech in the cancelable biometrics [17], [92], [99], [129], [142] and in homomorphic encryption [93], [131]. The privacy-preserving techniques in AV biometrics have not received much attention in the audio-visual domain equivalent to other biometrics.…”
Section: Privacy Preserving Techniques In Av Biometricsmentioning
confidence: 99%
“…There are ample amount of literature available for face images in cancelable biometrics and in cryptobiometrics [77] also in homomorphic encryption [44], [97], [116]. And also there are limited amount of literature available for speech in the cancelable biometrics [17], [93], [100], [130], [143] and in homomorphic encryption [94], [132]. The privacy-preserving techniques in AV biometrics have not received much attention in the audio-visual domain equivalent to other biometrics.…”
Section: Privacy Preserving Techniques In Av Biometricsmentioning
confidence: 99%