Title :
Privacy-preserving speaker verification as password matching
Author :
Pathak, Manas A. ; Raj, Bhiksha
Author_Institution :
Carnegie Mellon Univ., Pittsburgh, PA, USA
Abstract :
We present a text-independent privacy-preserving speaker verification system that functions similar to conventional password-based authentication. Our privacy constraints require that the system does not observe the speech input provided by the user, as this can be used by an adversary to impersonate the user in the same system or elsewhere. We represent the speech input using supervectors and apply locality sensitive hashing (LSH) to transform these into bit strings, where two supervectors, and therefore inputs, are likely to be similar if they map to the same string. This transformation, therefore, reduces the problem of identifying nearest neighbors to string comparison. The users then apply a cryptographic hash function to the strings obtained from their enrollment and verification data, thereby obfuscating it from the server, who can only check if two hashed strings match without being able to reconstruct their content. We present execution time and accuracy experiments with the system on the YOHO dataset, and observe that the system achieves acceptable accuracy with minimal computational overhead needed to satisfy the privacy constraints.
Keywords :
cryptography; data privacy; speaker recognition; bit strings; cryptographic hash function; hashed strings; locality sensitive hashing; nearest neighbors; password matching; password-based authentication; privacy constraints; speech input; supervectors; text-independent privacy-preserving speaker verification system; verification data; Accuracy; Cryptography; Privacy; Protocols; Servers; Speech; Vectors; LSH; Privacy; Speaker Verification;
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
Conference_Location :
Kyoto
Print_ISBN :
978-1-4673-0045-2
Electronic_ISBN :
1520-6149
DOI :
10.1109/ICASSP.2012.6288262