2020
DOI: 10.1109/access.2020.2972975
|View full text |Cite
|
Sign up to set email alerts
|

Using Granule to Search Privacy Preserving Voice in Home IoT Systems

Abstract: The Home IoT Voice System (HIVS) such as Amazon Alexa or Apple Siri can provide voicebased interfaces for people to conduct the search tasks using their voice. However, how to protect privacy is a big challenge. This paper proposes a novel personalized search scheme of encrypting voice with privacypreserving by the granule computing technique. Firstly, Mel-Frequency Cepstrum Coefficients (MFCC) are used to extract voice features. These features are obfuscated by obfuscation function to protect them from being … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 46 publications
(33 reference statements)
0
15
0
Order By: Relevance
“…The study of the selected papers led us to deduce the following main findings: The processes that check third-party extensions submitted to the app stores of both Amazon and Google do a demonstrably poor job of ensuring that the apps properly authenticate from the third-party server to the Alexa/Google cloud. Several novel methods of user authentication to the VA device have been proposed, each using a different secondary device to offer a form of two-factor authentication [ 16 , 23 , 31 ]. Each of the user authentication methods do go some way to mitigating the voice/replay attacks outlined in the findings of RQ1.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The study of the selected papers led us to deduce the following main findings: The processes that check third-party extensions submitted to the app stores of both Amazon and Google do a demonstrably poor job of ensuring that the apps properly authenticate from the third-party server to the Alexa/Google cloud. Several novel methods of user authentication to the VA device have been proposed, each using a different secondary device to offer a form of two-factor authentication [ 16 , 23 , 31 ]. Each of the user authentication methods do go some way to mitigating the voice/replay attacks outlined in the findings of RQ1.…”
Section: Discussionmentioning
confidence: 99%
“…Several novel methods of user authentication to the VA device have been proposed, each using a different secondary device to offer a form of two-factor authentication [ 16 , 23 , 31 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, Li et al presented a fastest robust path optimization algorithm to form the best routing by combining the effect of traffic events [52]. Li and his colleagues adopted granular computing to design boosted k nearest neighbor classifiers [53] and search voice encrypted scheme [54]. Mencar and Pedrycz proposed the definition of granular counting, which realized in the presence of uncertain data modeled through possibility distributions [55] and this is also a new angle to study uncertain data.…”
Section: Related Workmentioning
confidence: 99%
“…There are a lot of applications of Granular Computing. And these applications like forecasting time series [40], [41], manufacturing [42], search encryption voice [43], prediction tasks [44], concept learning [45], optimization [46], K-nearest granule classifiers [47], attribute reduction [48], analysis of microarray data [49] and so on, are reported in recent studies. It is of worthy of emphasizing that information granules infiltrate almost all researches.…”
Section: Introductionmentioning
confidence: 99%