Privacy-preserving speaker verification system based on binary I-vectors
暂无分享,去创建一个
Ahmed Ben Hamida | Jérôme Boudy | Dijana Petrovska-Delacrétaz | Aymen Mtibaa | J. Boudy | D. Petrovska-Delacrétaz | Aymen Mtibaa | A. Hamida
[1] Douglas E. Sturim,et al. SVM Based Speaker Verification using a GMM Supervector Kernel and NAP Variability Compensation , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[2] Christoph Busch,et al. Biometric template protection for speaker recognition based on universal background models , 2015, IET Biom..
[3] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[4] Sanjeev Khudanpur,et al. X-Vectors: Robust DNN Embeddings for Speaker Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] Andrew Beng Jin Teoh,et al. Secure speech template protection in speaker verification system , 2010, Speech Commun..
[6] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[7] Marta Gomez-Barrero,et al. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.
[8] Jonathan Spiteri,et al. The Payment Services Directive II and Competitiveness: The Perspective of European Fintech Companies , 2018, EUROPEAN RESEARCH STUDIES JOURNAL.
[9] Patrick Kenny,et al. A Study of Interspeaker Variability in Speaker Verification , 2008, IEEE Transactions on Audio, Speech, and Language Processing.
[10] Jascha Kolberg,et al. Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters , 2018, Odyssey.
[11] Nicholas W. D. Evans,et al. Preserving privacy in speaker and speech characterisation , 2019, Comput. Speech Lang..
[12] Bernadette Dorizzi,et al. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography , 2012, Synthesis Lectures on Information Security, Privacy, and Trust.
[13] Sridha Sridharan,et al. i-vector Based Speaker Recognition on Short Utterances , 2011, INTERSPEECH.
[14] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[15] Ahmed Ben Hamida,et al. Cancelable speaker verification system based on binary Gaussian mixtures , 2018, 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[16] Ming Li,et al. Cancellable speech template via random binary orthogonal matrices projection hashing , 2018, Pattern Recognit..
[17] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[19] Daniel Garcia-Romero,et al. Analysis of i-vector Length Normalization in Speaker Recognition Systems , 2011, INTERSPEECH.
[20] Liming Chen,et al. Voice-Based Gender Identification in Multimedia Applications , 2005, Journal of Intelligent Information Systems.
[21] Pierre-Michel Bousquet,et al. Speaker Modeling Using Local Binary Decisions , 2011, INTERSPEECH.
[22] Fabio Roli,et al. Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective , 2015, IEEE Signal Processing Magazine.
[23] Petros Boufounos,et al. Secure binary embeddings for privacy preserving nearest neighbors , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[24] Thomas Fang Zheng,et al. Binary speaker embedding , 2015, 2016 10th International Symposium on Chinese Spoken Language Processing (ISCSLP).
[25] Christophe Rosenberger,et al. Evaluation of Biometric Template Protection Schemes based on a Transformation , 2018, ICISSP.
[26] Bin Ma,et al. Text-dependent speaker verification: Classifiers, databases and RSR2015 , 2014, Speech Commun..
[27] Bhiksha Raj,et al. Privacy-preserving speaker verification using secure binary embeddings , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[28] Habib Benali,et al. Comparison of Telephone Recordings and Professional Microphone Recordings for Early Detection of Parkinson's Disease, Using Mel-Frequency Cepstral Coefficients with Gaussian Mixture Models , 2019, INTERSPEECH.
[29] Patrick Kenny,et al. Front-End Factor Analysis for Speaker Verification , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[30] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[31] Christoph Busch,et al. Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection , 2016, Odyssey.
[32] Bhiksha Raj,et al. Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[33] Bhiksha Raj,et al. Privacy-preserving speaker verification as password matching , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[34] Joon Son Chung,et al. VoxCeleb: A Large-Scale Speaker Identification Dataset , 2017, INTERSPEECH.
[35] A. Brener. Payment Service Directive II and Its Implications , 2018, Disrupting Finance.
[36] Larry P. Heck,et al. MSR Identity Toolbox v1.0: A MATLAB Toolbox for Speaker Recognition Research , 2013 .
[37] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[38] Bhiksha Raj,et al. Privacy Preserving Speaker Verification Using Adapted GMMs , 2011, INTERSPEECH.
[39] Nicholas Evans,et al. Privacy-Preserving Speaker Recognition with Cohort Score Normalisation , 2019, INTERSPEECH.