access icon free Biometric template protection for speaker recognition based on universal background models

(Voice-) biometric data is considered as personally identifiable information, that is, the increasing demand on (mobile) speaker recognition systems calls for applications which prevent from privacy threats, such as identity-theft or tracking without consent. Technologies of biometric template protection, in particular biometric cryptosystems, fulfil standardised properties of irreversibility and unlinkability which represent appropriate countermeasures to such vulnerabilities of conventional biometric recognition systems. Thereby, public confidence in and social acceptance of biometric applications is strengthened. In this work the authors propose a binarisation technique, which is used to extract scalable high-entropy binary voice reference data (templates) from speaker models, based on Gaussian mixture models and universal background models. Binary feature vectors are then protected within a template protection scheme in particular, fuzzy commitment scheme, in which error correction list-decoding is employed to overcome high intra-class variance of voice samples. In experiments, which are evaluated out on a text-independent speaker corpus of 339 individuals, it is demonstrated that the fully ISO/IEC IS 24745 compliant system achieves privacy protection at a negligible loss of biometric performance, confirming the soundness of the presented approach.

Inspec keywords: biometrics (access control); Gaussian processes; fuzzy set theory; speaker recognition; data privacy

Other keywords: binarisation technique; social acceptance; identity theft; universal background models; template protection scheme; privacy threats; mobile speaker recognition systems; Gaussian mixture models; fuzzy commitment scheme; speaker models; personally identifiable information; biometric cryptosystems; biometric recognition systems; voice biometric data; error correction list decoding; biometric template protection

Subjects: Speech processing techniques; Combinatorial mathematics; Data security; Combinatorial mathematics; Other topics in statistics; Other topics in statistics; Speech recognition and synthesis

References

    1. 1)
      • 25. Johnson, R.C., Scheirer, W.J., Boult, T.E.: ‘Secure voice based authentication for mobile devices: Vaulted voice verification’, CoRR, 2012, abs/1212.0042.
    2. 2)
    3. 3)
      • 13. Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: ‘Using voice to generate cryptographic keys’. Proc. Speaker Odyssey 2001, The Speech Recognition Workshop, 2001, pp. 237242.
    4. 4)
      • 20. Inthavisas, K., Lopresti, D.: ‘Speech cryptographic key regeneration based on password’. Proc. 2011 Int. Joint Conf. on Biometrics, ser. IJCB'11, IEEE, 2011, pp. 17.
    5. 5)
    6. 6)
    7. 7)
    8. 8)
    9. 9)
    10. 10)
      • 23. Johnson, R., Boult, T.: ‘With vaulted voice verification my voice is my key’. Int. Conf. on Technologies for Homeland Security (HST'13), November 2013, pp. 453459.
    11. 11)
      • 27. Pelecanos, J., Sridharan, S.: ‘Feature warping for robust speaker verification’.
    12. 12)
      • 35. Rathgeb, C., Uhl, A.: ‘Adaptive fuzzy commitment scheme based on iris-code error analysis’. Second European Workshop on Visual Information Processing (EUVIP'10), 2010, pp. 4144.
    13. 13)
      • 12. Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: ‘Cryptographic key generation from voice’. Proc. IEEE Symp. on Security and Privacy, IEEE, 2001, pp. 202213.
    14. 14)
      • 5. Inthavisas, K., Lopresti, D.: ‘Attacks on speech biometric authentication’. Proc. of Int. Conf. on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011), 2011, pp. 310316.
    15. 15)
      • 7. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Secur., 2011, 2011, (3) pp. 125.
    16. 16)
    17. 17)
      • 24. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’. Proc. IEEE Int. Symp. on Information Theory, 2002, p. 408.
    18. 18)
    19. 19)
    20. 20)
      • 37. Simoens, K., Yang, B., Zhou, X., Beato, F., Busch, C., Newton, E., Preneel, B.: ‘Criteria towards metrics for benchmarking template protection algorithms’. Fifth IAPR Int. Conf. on Biometrics (ICB), 2012, pp. 498505.
    21. 21)
    22. 22)
      • 8. ISO/IEC JTC1 SC27 Security Techniques: ISO/IEC 24745:2011. Information Technology–Security Techniques–Biometric Information Protection, International Organization for Standardization, 2011.
    23. 23)
      • 22. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. Proc. Sixth ACM Conf. on Computer and Communications Security, ACM, 1999, pp. 2836.
    24. 24)
    25. 25)
    26. 26)
    27. 27)
      • 40. ISO/IEC TC JTC1 SC37 Biometrics: ‘ISO/IEC 19795-1:2006. Information Technology – Biometric Performance Testing and Reporting – Part 1: Principles and Framework’. Int. Organization for Standardization and Int. Electrotechnical Committee, March 2006.
    28. 28)
    29. 29)
    30. 30)
      • 11. Monrose, F., Reiter, M.K., Wetzel, S.: ‘Password hardening based on keystroke dynamics’. Proc. Sixth ACM Conf. on Computer and Communications Security, ACM, 1999, pp. 7382.
    31. 31)
    32. 32)
    33. 33)
      • 31. Viveros, R., Balasubramanian, K., Balakrishnan, N.: ‘Binomial and negative binomial analogues under correlated bernoulli trials’, Am. Stat., 1984, 48, (3), pp. 243247.
    34. 34)
    35. 35)
    36. 36)
      • 15. Atah, J.A., Howells, G.: ‘Key generation in a voice based template free biometric security system’. Proc. of the 2009 Joint COST 2101 and 2102 Int. Conf. on Biometric ID Management and Multimodal Communication, Springer-Verlag, 2009, pp. 170177.
    37. 37)
      • 18. Rathgeb, C., Uhl, A.: ‘Two-factor authentication or how to potentially counterfeit experimental results in biometric systems’. Proc. of the Seventh Int. Conf. on Image Analysis and Recognition–Volume Part II, ser. ICIAR'10, Springer-Verlag, 2010, pp. 296305.
    38. 38)
      • 28. You, C., Li, H., Ma, B., Lee, K.-A.: ‘Effect of relevance factor of maximum a posteriori adaptation for gmm-svm in speaker and language recognition’. Proc. of INTERSPEECH. ISCA, 2012.
    39. 39)
      • 32. Stoianov, A., Kevenaar, T., van der Veen, M.: ‘Security issues of biometric encryption’. 2009 IEEE Toronto Int. Conf. on Science and Technology for Humanity (TIC-STH), 2009, pp. 3439.
    40. 40)
      • 19. Adler, A.: ‘Vulnerabilities in biometric encryption systems’. Audio- and Video-Based Biometric Person Authentication, ser. LNCS, Springer, 2005, vol. 3546, pp. 11001109.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0031
Loading

Related content

content/journals/10.1049/iet-bmt.2014.0031
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading