DESIGN AND ANALYSIS OF VOICE TEMPLATE PROTECTION SCHEMES BASED ON WINNER-TAKES-ALL HASHING By CHEE

ii ACKNOWLEDGEMENTS iv PERMISSION SHEET v APPROVAL SHEET vi DECLARATION vii TABLE OF CONTENTS viii LIST OF TABLES x LIST OF FIGURES xi

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  J. Huang,et al.  Curse of dimensionality and particle filters , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).

[3]  Ee-Chien Chang,et al.  Finding the original point set hidden among chaff , 2006, ASIACCS '06.

[4]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[6]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[7]  Patrick Kenny,et al.  Bayesian Speaker Verification with Heavy-Tailed Priors , 2010, Odyssey.

[8]  Daniel Garcia-Romero,et al.  Analysis of i-vector Length Normalization in Speaker Recognition Systems , 2011, INTERSPEECH.

[9]  Daniel P. Lopresti,et al.  Speech cryptographic key regeneration based on password , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[10]  Anil K. Jain,et al.  Biometric Authentication: System Security and User Privacy , 2012, Computer.

[11]  Yanxiong Li,et al.  A two -step hybrid approach for voiceprint-biometric template protection , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[12]  Rabul Hussain Laskar,et al.  Study on biometric authentication systems, challenges and future trends: A review , 2013 .

[13]  Ioannis A. Kakadiaris,et al.  Biometric and Surveillance Technology for Human and Activity Identification XII , 2013 .

[14]  R. C. Johnson,et al.  Secure voice-based authentication for mobile devices: vaulted voice verification , 2012, Defense, Security, and Sensing.

[15]  S. Viswanadha Raju,et al.  ENHANCING SECURITY OF STORED BIOMETRIC TEMPLATE IN CLOUD COMPUTING USING FEC , 2014 .

[16]  Sri Harish Reddy Mallidi,et al.  Neural Network Bottleneck Features for Language Identification , 2014, Odyssey.

[17]  Yun Lei,et al.  A novel scheme for speaker recognition using a phonetically-aware deep neural network , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[18]  Daniel Garcia-Romero,et al.  Time delay deep neural network-based universal background models for speaker recognition , 2015, 2015 IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU).

[19]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[20]  Venu Govindaraju,et al.  Deep Secure Encoding for Face Template Protection , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[21]  Ming Li,et al.  Generalized I-vector Representation with Phonetic Tokenizations and Tandem Features for both Text Independent and Text Dependent Speaker Verification , 2015, Journal of Signal Processing Systems.

[22]  Jiankun Hu,et al.  Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs , 2017, Pattern Recognit..

[23]  Jiankun Hu,et al.  A fingerprint and finger-vein based cancelable multi-biometric system , 2018, Pattern Recognit..

[24]  Zhe Jin,et al.  An alignment-free cancelable fingerprint template for bio-cryptosystems , 2018, J. Netw. Comput. Appl..

[25]  Ming Li,et al.  Cancellable speech template via random binary orthogonal matrices projection hashing , 2018, Pattern Recognit..

[26]  Florin Curelaru,et al.  Front-End Factor Analysis For Speaker Verification , 2018, 2018 International Conference on Communications (COMM).