Title :
Concealed Key-Phrase Verification
Author_Institution :
IBM Thomas J. Watson Res. Center
Abstract :
It is a common task in conversational applications to validate a claimed identity through utterance verification mechanisms; for example, by asking for a password or a challenge question. Sometimes, due to the private nature of the keyphrase, it is desirable to impose restrictions on how this keyphrase, or information that leads to it, is handled during the verification process. In this paper we describe a method where the utterance verification takes place in a concealed way, i.e., in a way that the keyphrase cannot be inferred or obtained directly by an intruder, from the decoding and application artifacts. We achieve this by a novel algorithm based on matrix operations in the verification network´s nodes. If the traversed path corresponds to the keyphrase, the annotation converges to the dominant eigenvector of the occluded kernel matrix
Keywords :
eigenvalues and eigenfunctions; grammars; matrix algebra; security of data; speech recognition; concealed key-phrase verification; eigenvector; occluded kernel matrix; utterance verification mechanisms; Cryptography; Decoding; Information analysis; Kernel; Network servers; Performance analysis; Reverse engineering; Speech analysis; Telecommunication traffic; Telephony;
Conference_Titel :
Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on
Conference_Location :
Toulouse
Print_ISBN :
1-4244-0469-X
DOI :
10.1109/ICASSP.2006.1660086