Preserving privacy in speaker and speech characterisation

Abstract Speech recordings are a rich source of personal, sensitive data that can be used to support a plethora of diverse applications, from health profiling to biometric recognition. It is therefore essential that speech recordings are adequately protected so that they cannot be misused. Such protection, in the form of privacy-preserving technologies, is required to ensure that: (i) the biometric profiles of a given individual (e.g., across different biometric service operators) are unlinkable; (ii) leaked, encrypted biometric information is irreversible, and that (iii) biometric references are renewable. Whereas many privacy-preserving technologies have been developed for other biometric characteristics, very few solutions have been proposed to protect privacy in the case of speech signals. Despite privacy preservation this is now being mandated by recent European and international data protection regulations. With the aim of fostering progress and collaboration between researchers in the speech, biometrics and applied cryptography communities, this survey article provides an introduction to the field, starting with a legal perspective on privacy preservation in the case of speech data. It then establishes the requirements for effective privacy preservation, reviews generic cryptography-based solutions, followed by specific techniques that are applicable to speaker characterisation (biometric applications) and speech characterisation (non-biometric applications). Glancing at non-biometrics, methods are presented to avoid function creep, preventing the exploitation of biometric information, e.g., to single out an identity in speech-assisted health care via speaker characterisation. In promoting harmonised research, the article also outlines common, empirical evaluation metrics for the assessment of privacy-preserving technologies for speech data.

[1]  Vinod Vaikuntanathan,et al.  Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..

[2]  Bhiksha Raj,et al.  Speaker verification using Secure Binary Embeddings , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).

[3]  Yuval Ishai,et al.  Extending Oblivious Transfers Efficiently , 2003, CRYPTO.

[4]  Bhiksha Raj,et al.  Privacy-preserving speaker verification using garbled GMMS , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[5]  Hassan Takabi,et al.  CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.

[6]  María Victoria Rodellar Biarge,et al.  Glottal Source biometrical signature for voice pathology detection , 2009, Speech Commun..

[7]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption , 2013 .

[8]  Louis-Jean Boë,et al.  Forensic voice identification in France , 2000, Speech Commun..

[9]  Nicholas W. D. Evans,et al.  The EURECOM Submission to the First DIHARD Challenge , 2018, INTERSPEECH.

[10]  Brent Waters,et al.  Functional Encryption: Definitions and Challenges , 2011, TCC.

[11]  Germán Castellanos-Domínguez,et al.  Automatic age detection in normal and pathological voice , 2015, INTERSPEECH.

[12]  Allison Bishop,et al.  Function-Hiding Inner Product Encryption , 2015, ASIACRYPT.

[13]  David Evans,et al.  Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates , 2015, EUROCRYPT.

[14]  Andreas Uhl,et al.  Cancelable biometrics for finger vein recognition , 2016, 2016 First International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE).

[15]  Vincenzo Piuri,et al.  Implementing FingerCode-based identity matching in the encrypted domain , 2010, 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications.

[16]  Jascha Kolberg,et al.  Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters , 2018, Odyssey.

[17]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[18]  Qian Wang,et al.  Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.

[19]  Jean-François Bonastre,et al.  A novel speaker binary key derived from anchor models , 2010, INTERSPEECH.

[20]  Arun Ross,et al.  Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms , 2013, Comput. Vis. Image Underst..

[21]  Sandro Cumani Fast Scoring of Full Posterior PLDA Models , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[22]  Demetrius Klitou Privacy-invading technologies and privacy by design : safeguarding privacy, liberty and security in the 21st century , 2014 .

[23]  Els Kindt A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR , 2019, Handbook of Biometric Anti-Spoofing, 2nd Ed..

[24]  Joan Feigenbaum,et al.  Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation , 2016, Financial Cryptography Workshops.

[25]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[26]  Petros Boufounos,et al.  Secure binary embeddings for privacy preserving nearest neighbors , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[27]  Bhiksha Raj,et al.  Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers , 2010, NIPS.

[28]  Isabel Trancoso,et al.  Logsum Using Garbled Circuits , 2015, PloS one.

[29]  Jordi Luque,et al.  On the modeling of natural vocal emotion expressions through binary key , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[30]  Niko Brümmer,et al.  Application-independent evaluation of speaker detection , 2006, Comput. Speech Lang..

[31]  Jean-François Bonastre,et al.  Fast speaker diarization based on binary keys , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[32]  Feng Li,et al.  Outsourceable two-party privacy-preserving biometric authentication , 2014, AsiaCCS.

[33]  Sanjeev Khudanpur,et al.  Deep neural network-based speaker embeddings for end-to-end speaker verification , 2016, 2016 IEEE Spoken Language Technology Workshop (SLT).

[34]  Yehuda Lindell,et al.  More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.

[35]  Pietro Laface,et al.  Pairwise Discriminative Speaker Verification in the ${\rm I}$-Vector Space , 2011, IEEE Transactions on Audio, Speech, and Language Processing.

[36]  Shantanu Rane,et al.  Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.

[37]  Yehuda Lindell,et al.  An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants , 2018, IACR Cryptol. ePrint Arch..

[38]  Anton H. M. Akkermans,et al.  A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.

[39]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[40]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[41]  Benny Pinkas,et al.  Oblivious RAM Revisited , 2010, CRYPTO.

[42]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[43]  Yao Lu,et al.  Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..

[44]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[45]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[46]  Didier Meuwly,et al.  A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation. , 2017, Forensic science international.

[47]  Jonathan Katz,et al.  Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.

[48]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[49]  Christian Rathgeb,et al.  Efficient two-stage speaker identification based on universal background models , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[50]  Elmar Nöth,et al.  Language-Independent Age Estimation from Speech Using Phonological and Phonemic Features , 2015, TSD.

[51]  E. J. Kindt,et al.  Having yes, using no? About the new legal regime for biometric data , 2017, Comput. Law Secur. Rev..

[52]  Sanjeev Khudanpur,et al.  X-Vectors: Robust DNN Embeddings for Speaker Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[53]  David Cash,et al.  Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..

[54]  Kui Ren,et al.  CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud , 2015, ESORICS.

[55]  Constance Morel,et al.  Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..

[56]  Lawrence Lessig,et al.  Code - version 2.0 , 2006 .

[57]  E. B. Newman,et al.  A Scale for the Measurement of the Psychological Magnitude Pitch , 1937 .

[58]  Kay Hamacher,et al.  Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies , 2018, AsiaCCS.

[59]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .

[60]  Farinaz Koushanfar,et al.  XONN: XNOR-based Oblivious Deep Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..

[61]  Niko Brümmer,et al.  The PAV algorithm optimizes binary proper scoring rules , 2013, ArXiv.

[62]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Authentication , 2012, ISC.

[63]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[64]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[65]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[66]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[67]  Daniel Garcia-Romero,et al.  Analysis of i-vector Length Normalization in Speaker Recognition Systems , 2011, INTERSPEECH.

[68]  Patrick Kenny,et al.  Joint Factor Analysis of Speaker and Session Variability: Theory and Algorithms , 2006 .

[69]  Isabel Trancoso,et al.  Exploring Hashing and Cryptonet Based Approaches for Privacy-Preserving Speech Emotion Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[70]  Muttukrishnan Rajarajan,et al.  Privacy preserving encrypted phonetic search of speech data , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[71]  Luiz Costa,et al.  Privacy and the regulation of 2012 , 2012, Comput. Law Secur. Rev..

[72]  Yehuda Lindell,et al.  Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2010, IACR Cryptol. ePrint Arch..

[73]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[74]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[75]  Julien Bringer,et al.  Biometric Identification over Encrypted Data Made Feasible , 2009, ICISS.

[76]  Ira S. Rubinstein,et al.  Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents , 2012 .

[77]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[78]  Lukás Burget,et al.  Language Recognition in iVectors Space , 2011, INTERSPEECH.

[79]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[80]  Julian Fiérrez,et al.  Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..

[81]  Vladimir Kolesnikov,et al.  Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.

[82]  Carlos V. Rozas,et al.  Innovative instructions and software model for isolated execution , 2013, HASP '13.

[83]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[84]  Julien Bringer,et al.  GSHADE: faster privacy-preserving distance computation and biometric identification , 2014, IH&MMSec '14.

[85]  Sanjeev Khudanpur,et al.  Spoken Language Recognition using X-vectors , 2018, Odyssey.

[86]  Srinivas Devadas,et al.  Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..

[87]  David Pointcheval,et al.  Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.

[88]  Bernadette Dorizzi,et al.  Enhancing Information Security and Privacy by Combining Biometrics with Cryptography , 2012, Synthesis Lectures on Information Security, Privacy, and Trust.

[89]  Elaine Shi,et al.  Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..

[90]  David J. Wu,et al.  Function-Hiding Inner Product Encryption is Practical , 2018, IACR Cryptol. ePrint Arch..

[91]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[92]  Bhiksha Raj,et al.  Privacy-preserving Query-by-Example Speech Search , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[93]  Bhiksha Raj,et al.  Privacy-preserving speaker verification as password matching , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[94]  Ramón Fernández Astudillo,et al.  Exploiting Phone Log-Likelihood Ratio Features for the Detection of the Native Language of Non-Native English Speakers , 2016, INTERSPEECH.

[95]  Simon J. D. Prince,et al.  Computer Vision: Models, Learning, and Inference , 2012 .

[96]  Muttukrishnan Rajarajan,et al.  Privacy-Preserving iVector-Based Speaker Verification , 2019, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[97]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[98]  Patrizio Campisi,et al.  Security and Privacy in Biometrics , 2013, Springer London.

[99]  A. Oppenheim,et al.  Homomorphic analysis of speech , 1968 .

[100]  Julian Fiérrez,et al.  Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[101]  Carmela Troncoso,et al.  Engineering Privacy by Design , 2011 .

[102]  Ahmad-Reza Sadeghi,et al.  Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.

[103]  Mihir Bellare,et al.  Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.

[104]  Yehuda Lindell,et al.  How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..

[105]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[106]  Ron Steinfeld,et al.  Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.

[107]  Marta Gomez-Barrero,et al.  General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.

[108]  Michal Choras,et al.  Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption , 2015, DPM/QASA@ESORICS.

[109]  Xavier Anguera Miró,et al.  Fast Single- and Cross-Show Speaker Diarization Using Binary Key Speaker Modeling , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[110]  Anantha Chandrakasan,et al.  Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..

[111]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[112]  Bhiksha Raj,et al.  Secure Modular Hashing , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[113]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[114]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[115]  Hugo Krawczyk,et al.  Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.

[116]  Bhiksha Raj,et al.  Privacy Preserving Speaker Verification Using Adapted GMMs , 2011, INTERSPEECH.

[117]  Lukás Burget,et al.  Gaussian meta-embeddings for efficient scoring of a heavy-tailed PLDA model , 2018, Odyssey.

[118]  Pascal Paillier,et al.  Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..

[119]  Muttukrishnan Rajarajan,et al.  Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition , 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).

[120]  John H. L. Hansen,et al.  Speaker Recognition by Machines and Humans: A tutorial review , 2015, IEEE Signal Processing Magazine.

[121]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[122]  Takeshi Koshiba,et al.  Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics , 2013, CD-ARES Workshops.

[123]  Giovanni Costantini,et al.  Speech emotion recognition using amplitude modulation parameters and a combined feature selection procedure , 2014, Knowl. Based Syst..

[124]  Davide Maltoni,et al.  A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[125]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[126]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[127]  Stan Davis,et al.  Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Se , 1980 .

[128]  Maria Zhdanova,et al.  Time to Rethink: Trust Brokerage Using Trusted Execution Environments , 2015, TRUST.

[129]  Joaquín González-Rodríguez,et al.  Cross-entropy analysis of the information in forensic speaker recognition , 2008, Odyssey.

[130]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[131]  Isabel Trancoso,et al.  Patient Privacy in Paralinguistic Tasks , 2018, INTERSPEECH.

[132]  Driss Matrouf,et al.  Discriminant binary data representation for speaker recognition , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[133]  Miguel Angel Ferrer-Ballester,et al.  A novel hand reconstruction approach and its application to vulnerability assessment , 2014, Inf. Sci..

[134]  Enrique Argones-Rúa,et al.  Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.

[135]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[136]  Murat Kantarcioglu,et al.  Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.

[137]  Patrick Kenny,et al.  Joint Factor Analysis Versus Eigenchannels in Speaker Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[138]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[139]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[140]  MARTA GOMEZ-BARRERO,et al.  Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection , 2017, IEEE Access.

[141]  Pierre-Michel Bousquet,et al.  Session compensation using binary speech representation for speaker recognition , 2014, Pattern Recognit. Lett..

[142]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[143]  Liming Chen,et al.  Voice-Based Gender Identification in Multimedia Applications , 2005, Journal of Intelligent Information Systems.

[144]  Ahmad-Reza Sadeghi,et al.  Secure Multiparty Computation from SGX , 2017, Financial Cryptography.

[145]  Bhiksha Raj,et al.  Privacy preserving Distance computation using somewhat-trusted third parties , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[146]  Dejing Dou,et al.  Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.

[147]  Catherine Jasserand Legal Nature of Biometric Data: From 'Generic' Personal Data to Sensitive Data: Which Changes Does the New Data Protection Framework Introduce? , 2016 .

[148]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[149]  Michael Naehrig,et al.  CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.

[150]  Lukás Burget,et al.  Comparison of scoring methods used in speaker recognition with Joint Factor Analysis , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[151]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[152]  Bhiksha Raj,et al.  A two factor transformation for speaker verification through ℓ1 comparison , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[153]  Björn Schuller,et al.  Computational Paralinguistics , 2013 .

[154]  Tomoki Toda,et al.  Voice Conversion Based on Maximum-Likelihood Estimation of Spectral Parameter Trajectory , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[155]  Hugo Krawczyk,et al.  Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..

[156]  James H. Elder,et al.  Probabilistic Linear Discriminant Analysis for Inferences About Identity , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[157]  Farinaz Koushanfar,et al.  Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..

[158]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[159]  Gérard Chollet,et al.  Assessment of speaker verification systems , 1995 .

[160]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[161]  Christoph Busch,et al.  Biometric template protection for speaker recognition based on universal background models , 2015, IET Biom..

[162]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[163]  Yihua Zhang,et al.  Secure Computation on Floating Point Numbers , 2013, NDSS.

[164]  Takeshi Koshiba,et al.  New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.

[165]  Mehryar Mohri,et al.  Voice signatures , 2003, 2003 IEEE Workshop on Automatic Speech Recognition and Understanding (IEEE Cat. No.03EX721).

[166]  Ahmad-Reza Sadeghi,et al.  Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification , 2009, IACR Cryptol. ePrint Arch..

[167]  Marina Blanton,et al.  Secure outsourced computation of iris matching , 2012, J. Comput. Secur..

[168]  Jorge Guajardo,et al.  Efficient strategies to play the indistinguishability game for fuzzy sketches , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[169]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[170]  Florin Curelaru,et al.  Front-End Factor Analysis For Speaker Verification , 2018, 2018 International Conference on Communications (COMM).

[171]  Marcus Peinado,et al.  Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.

[172]  Charalampos Papamanthou,et al.  Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..

[173]  Yehuda Lindell,et al.  Private Web Search with Malicious Adversaries , 2010, Privacy Enhancing Technologies.

[174]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[175]  Seyed Omid Sadjadi,et al.  Speaker age estimation on conversational telephone speech using senone posterior based i-vectors , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[176]  Brett Hemenway,et al.  SoK: General Purpose Compilers for Secure Multi-Party Computation , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[177]  Jiankun Hu,et al.  Design of alignment-free cancelable fingerprint templates via curtailed circular convolution , 2014, Pattern Recognit..

[178]  Bhiksha Raj,et al.  Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[179]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[180]  Ahmad-Reza Sadeghi,et al.  Automated Synthesis of Optimized Circuits for Secure Computation , 2015, CCS.

[181]  Varun Kanade,et al.  TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service , 2018, ICML.

[182]  Ieee Staff 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) , 2013 .

[183]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[184]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[185]  Michael Zohner,et al.  ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.

[186]  Valerio Schiavoni,et al.  X-search: revisiting private web search using intel SGX , 2017, Middleware.

[187]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[188]  Ahmad-Reza Sadeghi,et al.  VoiceGuard: Secure and Private Speech Processing , 2018, INTERSPEECH.

[189]  Ahmed Ben Hamida,et al.  Cancelable speaker verification system based on binary Gaussian mixtures , 2018, 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[190]  Ninghui Li,et al.  Privacy at Scale: Local Dierential Privacy in Practice , 2018 .

[191]  Haizhou Li,et al.  An overview of text-independent speaker recognition: From features to supervectors , 2010, Speech Commun..

[192]  Christoph Busch,et al.  Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection , 2016, Odyssey.

[193]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[194]  Julien Bringer,et al.  Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).

[195]  Sanjeev Khudanpur,et al.  Deep Neural Network Embeddings for Text-Independent Speaker Verification , 2017, INTERSPEECH.