Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing

The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the secu...

Full description

Saved in:
Bibliographic Details
Main Author: Chee, Kong Yik
Format: Final Year Project / Dissertation / Thesis
Published: 2018
Subjects:
Online Access:http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf
http://eprints.utar.edu.my/3609/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utar-eprints.3609
record_format eprints
spelling my-utar-eprints.36092019-12-05T04:51:32Z Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing Chee, Kong Yik TK Electrical engineering. Electronics Nuclear engineering The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the security and the privacy of the information stored in the database. Template protection scheme is designed to secure the user biometric from being recovered by attackers. However, current voice template protection schemes do not completely provide the required security properties, such as non-invertibility, unlinkability and revocability. In this dissertation, two voice template protection schemes that are inspired from Winner-Takes-All hashing are proposed. These two newly proposed schemes are named as Random Binary Orthogonal Matrices Projection hashing and two-dimensional Winner-Takes-All hashing. The former scheme is designed for one-dimensional input while the latter scheme is designed for two-dimensional input. To further increase the security of the proposed schemes, additional factor of authentication is incorporated (i.e., random token and additional biometric modality). Extensive analysis is performed to justify the trade-off between the performance and the security of the proposed schemes. The experimental results and analysis have demonstrated that both of the proposed schemes are able to survive against major privacy and security attacks (e.g., attack-via-record multiplicity and stolen token attack) while preserving the performance of the proposed schemes. 2018 Final Year Project / Dissertation / Thesis NonPeerReviewed application/pdf http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf Chee, Kong Yik (2018) Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing. Master dissertation/thesis, UTAR. http://eprints.utar.edu.my/3609/
institution Universiti Tunku Abdul Rahman
building UTAR Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tunku Abdul Rahman
content_source UTAR Institutional Repository
url_provider http://eprints.utar.edu.my
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Chee, Kong Yik
Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
description The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the security and the privacy of the information stored in the database. Template protection scheme is designed to secure the user biometric from being recovered by attackers. However, current voice template protection schemes do not completely provide the required security properties, such as non-invertibility, unlinkability and revocability. In this dissertation, two voice template protection schemes that are inspired from Winner-Takes-All hashing are proposed. These two newly proposed schemes are named as Random Binary Orthogonal Matrices Projection hashing and two-dimensional Winner-Takes-All hashing. The former scheme is designed for one-dimensional input while the latter scheme is designed for two-dimensional input. To further increase the security of the proposed schemes, additional factor of authentication is incorporated (i.e., random token and additional biometric modality). Extensive analysis is performed to justify the trade-off between the performance and the security of the proposed schemes. The experimental results and analysis have demonstrated that both of the proposed schemes are able to survive against major privacy and security attacks (e.g., attack-via-record multiplicity and stolen token attack) while preserving the performance of the proposed schemes.
format Final Year Project / Dissertation / Thesis
author Chee, Kong Yik
author_facet Chee, Kong Yik
author_sort Chee, Kong Yik
title Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_short Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_full Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_fullStr Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_full_unstemmed Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_sort design and analysis of voice template protection schemes based on winner-takes-all hashing
publishDate 2018
url http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf
http://eprints.utar.edu.my/3609/
_version_ 1654964132345020416
score 13.211869