943 Hits in 5.1 sec

Benchmarking and challenges in security and privacy for voice biometrics [article]

Jean-Francois Bonastre, Hector Delgado, Nicholas Evans, Tomi Kinnunen, Kong Aik Lee, Xuechen Liu, Andreas Nautsch, Paul-Gauthier Noe, Jose Patino, Md Sahidullah, Brij Mohan Lal Srivastava, Massimiliano Todisco (+4 others)
2021 arXiv   pre-print
to voice biometrics.  ...  It targets the non-speech audience and describes the benchmarking methodology that has spearheaded progress in traditional research and which now drives recent security and privacy initiatives related  ...  In this article we describe two specific benchmarking challenges launched by the speech processing research community to expedite solutions to security and privacy concerns.  ... 
arXiv:2109.00281v1 fatcat:zq7lz4aqhjckfevhsjapginplq

Benchmarking and challenges in security and privacy for voice biometrics

Jean-François Bonastre, Héctor Delgado, Nicholas Evans, Tomi Kinnunen, Kong Aik Lee, Xuechen Liu, Andreas Nautsch, ‪Paul-Gauthier Noé‬, Jose Patino, Md Sahidullah, Brij Mohan Lal Srivastava, Massimiliano Todisco (+4 others)
2021 2021 ISCA Symposium on Security and Privacy in Speech Communication   unpublished
to voice biometrics.  ...  It targets the non-speech audience and describes the benchmarking methodology that has spearheaded progress in traditional research and which now drives recent security and privacy initiatives related  ...  Acknowledgements The work reported in this paper was supported by: the French ANR (VoicePrivacy, VoicePersonae, DEEP-PRIVACY, Harpocrates); the European Commission (H2020 COMPRISE); the Japan Science and  ... 
doi:10.21437/spsc.2021-11 fatcat:nrsiko6xpjfy7pzmbvgm3jq5ka

Secure voice based authentication for mobile devices: Vaulted Voice Verification [article]

R.C. Johnson and Walter J. Scheirer and Terrance E. Boult
2012 arXiv   pre-print
Following that we show a performance evaluation and then conclude with a discussion of security and future work.  ...  We first discuss the protocol, which has recently been introduced in research literature, and then describe its limitations.  ...  ACKNOWLEDGMENTS We thank Michael Wilber and Brian Heflin for their contributions to Figures 2 and 3 .  ... 
arXiv:1212.0042v1 fatcat:2rabnxrzq5fxvdonobyvgr7ty4

One-Time Biometrics for Online Banking and Electronic Payment Authentication [chapter]

Aude Plateaux, Patrick Lacharme, Audun Jøsang, Christophe Rosenberger
2014 Lecture Notes in Computer Science  
More precisely, a new protocol for the generation of one-time passwords from biometric data is presented, ensuring the security and privacy of the entire transaction.  ...  The security analysis of our protocol also illustrates the benefits in terms of strengthened security.  ...  The authors would like to thank the Eurostars program for assistance to the project, as well as for financial support.  ... 
doi:10.1007/978-3-319-10975-6_14 fatcat:iaor5gl5j5fwrjlwzyqqftkc44

Privacy-Preserving iVector-Based Speaker Verification

Yogachandran Rahulamathavan, Kunaraj R Sutharsini, Indranil Ghosh Ray, Rongxing Lu, Muttukrishnan Rajarajan
2019 IEEE/ACM Transactions on Audio Speech and Language Processing  
However, various security and privacy challenges deter the public confidence in adopting biometric based authentication systems.  ...  There are several security and privacy challenges that exist in such systems as described below: Non-revocability: :It is impossible to reverse the biometric data once its compromised; hence, once lost  ... 
doi:10.1109/taslp.2018.2882731 fatcat:uy322tpyo5dztmsmbxdjlq6k4u

Biometrics for Internet-of-Things Security: A Review

Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli
2021 Sensors  
With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking  ...  As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed.  ...  The leakage of these data endangers the privacy of users. The security challenges in the IoT can be overcome by authentication, confidentiality, integrity, and end-to-end security.  ... 
doi:10.3390/s21186163 pmid:34577370 fatcat:urk3rlktjbahvdc5evaanqjn3y

Preserving Privacy in Speaker and Speech Characterisation

Andreas Nautsch, Abelino Jiménez, Amos Treiber, Jascha Kolberg, Catherine Jasserand, Els Kindt, Héctor Delgado, Massimiliano Todisco, Mohamed Amine Hmani, Aymen Mtibaa, Mohammed Ahmed Abdelraheem, Alberto Abad (+11 others)
2019 Computer Speech and Language  
Whereas many privacy-preserving technologies have been developed for other biometric characteristics, very few solutions have been proposed to protect privacy in the case of speech signals.  ...  advances in speaker and language recognition and characterisation.  ...  653586; the Privacy Preserving Secure Speech Recognition (PPSSR) project which had received  ... 
doi:10.1016/j.csl.2019.06.001 fatcat:lgq6bz2y5zepvfbrfznhboplha

Internet of things based vital signs monitoring system: A prototype validity test

Osman Yakubu, Emmanuel Wireko
2021 Indonesian Journal of Electrical Engineering and Computer Science  
Alerts are sent to caregivers using SMS, email and voice calls where urgent attention is required for the patient.  ...  To ensure privacy of patients, a caregiver has to be biometrically verified by either fingerprint or facial pattern.  ...  Security and privacy should be guaranteed; to gain access, the caregiver must be biometrically authenticated.  ... 
doi:10.11591/ijeecs.v23.i2.pp962-972 fatcat:2qcilswyijcufnisbknjcxzcbi


Jaseena K.U.
2018 International Journal of Advanced Research in Computer Science  
This paper presents an overview of different deep learning techniques for big data in biometrics and discusses some issues and solutions.  ...  Deep learning is appropriate for exploiting large volumes of data and for analysing raw data from multiple sources and in different styles.  ...  Some security and privacy challenges related to big data are also described.  ... 
doi:10.26483/ijarcs.v9i1.5136 fatcat:3oniwqwp4fbzzkicxozhn3ms5y

De-identification for privacy protection in multimedia content: A survey

Slobodan Ribaric, Aladdin Ariyaeeinia, Nikola Pavesic
2016 Signal processing. Image communication  
, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.  ...  This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents  ...  It is also the result of activities in COST Action IC1206 "De-identification for Privacy Protection in Multimedia Content".  ... 
doi:10.1016/j.image.2016.05.020 fatcat:lumwotiefzfqxpuxgkeym56dyy

A Study On Key Biometric Technologies: Characteristics And Applications

M. Praveen Kumar
2018 Zenodo  
This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the uses, benefits, and applications.  ...  This template is securely stored in a central database or a smart card issued to the user. The template is retrieved when an individual needs to be identified.  ...  A number of provisions and techniques have been proposed to safeguard security and privacy in biometrics.  ... 
doi:10.5281/zenodo.1189392 fatcat:jexf63o5v5dj5atxr3nied4tkm

Biometrics: In Search of Identity and Security (Q & A)

Zahid Akhtar, Abdenour Hadid, Mark Nixon, Massimo Tistarelli, Jean-Luc Dugelay, Sebastien Marcel
2017 IEEE Multimedia  
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial  ...  , Big data issues in biometrics, etc.  ...  However, there are still several challenging problems in improving privacy, security, usability, and ergonomics of novel mobile biometrics [5] .  ... 
doi:10.1109/mmul.2017.265090754 fatcat:lab3frtx2na6tc65gcp4cxfdqm

Biometric Template Protection: Bridging the performance gap between theory and practice

Karthik Nandakumar, Anil K. Jain
2015 IEEE Signal Processing Magazine  
and user privacy.  ...  Due to the strong and permanent link between individuals and their biometric traits, exposure of enrolled users' biometric information to adversaries can seriously compromise biometric system security  ...  vein, and voice) [1] .  ... 
doi:10.1109/msp.2015.2427849 fatcat:5st7zg5xzbhm7nfr45x2mw6nym

Biosec baseline corpus: A multimodal biometric database

Julian Fierrez, Javier Ortega-Garcia, Doroteo Torre Toledano, Joaquin Gonzalez-Rodriguez
2007 Pattern Recognition  
In this contribution, the acquisition setup and protocol are outlined, and the contents of the corpus -including data and population statistics-are described.  ...  The database will be publicly available for research purposes by mid 2006.  ...  In the case of individual biometric traits such as fingerprint, face, and voice, this has been promoted by the availability of biometric databases developed for international benchmarks such as Fingerprint  ... 
doi:10.1016/j.patcog.2006.10.014 fatcat:yjkjz7bnire2retsbulnllwn7u

A Tandem Framework Balancing Privacy and Security for Voice User Interfaces [article]

Ranya Aloufi, Hamed Haddadi, David Boyle
2021 arXiv   pre-print
Speech synthesis, voice cloning, and voice conversion techniques present severe privacy and security threats to users of voice user interfaces (VUIs).  ...  In this paper, we take a step towards balancing two seemingly conflicting requirements: security and privacy.  ...  RELATED WORK In this section, we overview the voice conversion technology in terms of its usage for privacy protection and security concerns against it.  ... 
arXiv:2107.10045v1 fatcat:vgw7mmseurb3bfr6s2xg4c3enq
« Previous Showing results 1 — 15 out of 943 results