Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise
- 13 February 2013
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Signal Processing Magazine
- Vol. 30 (2), 62-74
- https://doi.org/10.1109/msp.2012.2230222
Abstract
Speech is one of the most private forms of communication. People do not like to be eavesdropped on. They will frequently even object to being recorded; in fact, in many places it is illegal to record people speaking in public, even when it is acceptable to capture their images on video [1]. Yet, when a person uses a speech-based service such as a voice authentication system or a speech recognition service, they must grant the service complete access to their voice recordings. This exposes the user to abuse, with security, privacy and economic implications. For instance, the service could extract information such as gender, ethnicity, and even the emotional state of the user from the recording-factors not intended to be exposed by the user-and use them for undesired purposes. The recordings may be edited to create fake recordings that the user never spoke, or to impersonate them for other services. Even derivatives from the voice are risky to expose. For example, a voice-authentication service could make unauthorized use of the models or voice prints it has for users to try to identify their presence in other media such as YouTube.Keywords
This publication has 27 references indexed in Scilit:
- The Problem of Robustness in Automatic Speech RecognitionPublished by Wiley ,2012
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing MinimaLecture Notes in Computer Science, 2009
- Privacy-preserving decision trees over vertically partitioned dataACM Transactions on Knowledge Discovery From Data, 2008
- Secure outsourcing of sequence comparisonsInternational Journal of Information Security, 2005
- Evaluating 2-DNF Formulas on CiphertextsLecture Notes in Computer Science, 2005
- Public-Key Cryptosystems Based on Composite Degree Residuosity ClassesPublished by Springer Science and Business Media LLC ,1999
- Robust text-independent speaker identification using Gaussian mixture speaker modelsIEEE Transactions on Speech and Audio Processing, 1995
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentencesIEEE Transactions on Acoustics, Speech, and Signal Processing, 1980
- Probabilistic Functions of Finite State Markov ChainsThe Annals of Mathematical Statistics, 1969