Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Hidebehind: Enjoy voice input with voiceprint unclonability and anonymity

J Qian, H Du, J Hou, L Chen, T Jung, XY Li - Proceedings of the 16th …, 2018 - dl.acm.org
We are speeding toward a not-too-distant future when we can perform human-computer
interaction using solely our voice. Speech recognition is the key technology that powers …

Towards privacy-preserving speech data publishing

J Qian, F Han, J Hou, C Zhang… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
Privacy-preserving data publishing has been a heated research topic in the last decade.
Numerous ingenious attacks on users' privacy and defensive measures have been …

Speech sanitizer: Speech content desensitization and voice anonymization

J Qian, H Du, J Hou, L Chen, T Jung… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Voice input users' speech recordings are being collected by service providers and shared
with third parties, who may abuse users' voiceprints, identify them by voice, and learn their …

Privacy-preserving PLDA speaker verification using outsourced secure computation

A Treiber, A Nautsch, J Kolberg, T Schneider… - Speech …, 2019 - Elsevier
The usage of biometric recognition has become prevalent in various verification processes,
ranging from unlocking mobile devices to verifying bank transactions. Automatic speaker …

Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model

M Aliasgari, M Blanton, F Bayatbabolghani - International Journal of …, 2017 - Springer
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications
in pattern recognition. In some of these applications, such as speaker recognition, the …

Over-the-air tv detection using mobile devices

M Ibrahim, M Gruteser, KA Harras… - 2017 26th International …, 2017 - ieeexplore.ieee.org
We introduce a mobile sensing technique to detect a nearby active television, the channel it
is tuned to, and whether it is receiving this channel over the air or not. This technique can …

Oblivious maximum bipartite matching size algorithm with applications to secure fingerprint identification

M Blanton, S Saraph - … --ESORICS 2015: 20th European Symposium on …, 2015 - Springer
The increasing availability and use of biometric data leads to situations when sensitive
biometric data is to be handled by entities who may not be fully trusted or otherwise are not …