DocumentCode
454618
Title
Concealed Key-Phrase Verification
Author
Huerta, Juan M.
Author_Institution
IBM Thomas J. Watson Res. Center
Volume
1
fYear
2006
fDate
14-19 May 2006
Abstract
It is a common task in conversational applications to validate a claimed identity through utterance verification mechanisms; for example, by asking for a password or a challenge question. Sometimes, due to the private nature of the keyphrase, it is desirable to impose restrictions on how this keyphrase, or information that leads to it, is handled during the verification process. In this paper we describe a method where the utterance verification takes place in a concealed way, i.e., in a way that the keyphrase cannot be inferred or obtained directly by an intruder, from the decoding and application artifacts. We achieve this by a novel algorithm based on matrix operations in the verification network´s nodes. If the traversed path corresponds to the keyphrase, the annotation converges to the dominant eigenvector of the occluded kernel matrix
Keywords
eigenvalues and eigenfunctions; grammars; matrix algebra; security of data; speech recognition; concealed key-phrase verification; eigenvector; occluded kernel matrix; utterance verification mechanisms; Cryptography; Decoding; Information analysis; Kernel; Network servers; Performance analysis; Reverse engineering; Speech analysis; Telecommunication traffic; Telephony;
fLanguage
English
Publisher
ieee
Conference_Titel
Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on
Conference_Location
Toulouse
ISSN
1520-6149
Print_ISBN
1-4244-0469-X
Type
conf
DOI
10.1109/ICASSP.2006.1660086
Filename
1660086
Link To Document