2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2015
DOI: 10.1109/icassp.2015.7178280
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving Query-by-Example Speech Search

Abstract: This paper investigates a new privacy-preserving paradigm for the task of Query-by-Example Speech Search using Secure Binary Embeddings, a hashing method that converts vector data to bit strings through a combination of random projections followed by banded quantization. The proposed method allows performing spoken query search in an encrypted domain, by analyzing ciphered information computed from the original recordings. Unlike other hashing techniques, the embeddings allow the computation of the distance be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…This scheme allows information to be leaked if the corresponding SBE hashes of two vectors are close enough, while preserving information-theoretic security. It has been applied to several speech processing tasks such as speaker verification [3] and query-by-example speech search [4]. An extension of SBE, Secure Modular Hashing (SMH) [5], allows the user to control the extension of the information leakage, thus enabling a trade-off between accuracy and security.…”
Section: Introductionmentioning
confidence: 99%
“…This scheme allows information to be leaked if the corresponding SBE hashes of two vectors are close enough, while preserving information-theoretic security. It has been applied to several speech processing tasks such as speaker verification [3] and query-by-example speech search [4]. An extension of SBE, Secure Modular Hashing (SMH) [5], allows the user to control the extension of the information leakage, thus enabling a trade-off between accuracy and security.…”
Section: Introductionmentioning
confidence: 99%