Efficient and Privacy-Preserving Speaker Recognition for Cybertwin-Driven 6G

被引:8
作者
Li, Qi [1 ]
Lin, Xiaodong [1 ]
机构
[1] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
关键词
Speaker recognition; Spectrogram; Security; 6G mobile communication; Databases; Biometrics (access control); Speech recognition; Cybertwin-driven; privacy-preserving; speaker recognition; voiceprint; BIOMETRIC IDENTIFICATION; VERIFICATION;
D O I
10.1109/JIOT.2021.3097266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the introduction of cybertwin, a new approach to represent human or things in the cyberspace, it is foreseeable that vehicles will be able to offer more and more services in the future. Naturally, considering the safety of drivers, speaker recognition will be widely used in vehicle scenarios. Speaker recognition technologies are experiencing increasing popularity due to the unique and indissoluble link between individuals and their voices. However, the coming cybertwin-driven 6G brings speaker recognition technologies unprecedented challenges, especially in preventing the disclosure of voiceprint. To address these challenges, an efficient and privacy-preserving speaker recognition scheme for cybertwin-driven 6G, referred to as NEATEN, is proposed in this article. With NEATEN, the speaker identity can be recognized at multiple security levels without leaking the voiceprint data. More concretely, based on the random projection data perturbation, voiceprint perturbation algorithms in two phases and the corresponding ciphertext-based similarity computation algorithm are proposed. By using these algorithms, our efficient and accurate speaker recognition scheme can be achieved. Orthogonal to the previous works of biometric identification based on the Euclidean distance, NEATEN makes progress on the non-Euclidean distance, such as cosine distance and complicated distance. Detailed analysis shows that NEATEN can resist various known security threats. Experiments conducted on TIMIT and Voxceleb data sets have demonstrated that NEATEN is highly accurate and efficient, and can be flexibly deployed in a real cybertwin-driven 6G vehicle environment.
引用
收藏
页码:16195 / 16206
页数:12
相关论文
共 42 条
[1]  
[Anonymous], 2012, Second Generation Biometrics: ethical, Legal nad Social Context
[2]  
[Anonymous], 1993, LINGUISTIC DATA CONS, DOI DOI 10.35111/17GK-BN40
[3]  
Breezer R. A, 2019, 1 COURSE LINEAR ALGE
[4]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[5]   Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing [J].
Cao, Ning ;
Yang, Zhenyu ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :393-402
[6]   Front-End Factor Analysis for Speaker Verification [J].
Dehak, Najim ;
Kenny, Patrick J. ;
Dehak, Reda ;
Dumouchel, Pierre ;
Ouellet, Pierre .
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2011, 19 (04) :788-798
[7]   ArcFace: Additive Angular Margin Loss for Deep Face Recognition [J].
Deng, Jiankang ;
Guo, Jia ;
Xue, Niannan ;
Zafeiriou, Stefanos .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :4685-4694
[8]   On the vulnerability of face verification systems to hill-climbing attacks [J].
Galbally, Javier ;
McCool, Chris ;
Fierrez, Julian ;
Marcel, Sebastien ;
Ortega-Garcia, Javier .
PATTERN RECOGNITION, 2010, 43 (03) :1027-1038
[9]  
Garcia-Romero D, 2011, 12TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2011 (INTERSPEECH 2011), VOLS 1-5, P256
[10]  
Jain Anil K., 2005, 2005 13th European Signal Processing Conference, P1