• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ding Yong, Li Jiahui, Tang Shijie, Wang Huiyong. Template Protection of Speaker Recognition Based on Random Mapping Technology[J]. Journal of Computer Research and Development, 2020, 57(10): 2201-2208. DOI: 10.7544/issn1000-1239.2020.20200474
Citation: Ding Yong, Li Jiahui, Tang Shijie, Wang Huiyong. Template Protection of Speaker Recognition Based on Random Mapping Technology[J]. Journal of Computer Research and Development, 2020, 57(10): 2201-2208. DOI: 10.7544/issn1000-1239.2020.20200474

Template Protection of Speaker Recognition Based on Random Mapping Technology

Funds: This work was supported by the National Natural Science Foundation of China (61772150, 61862012, 61962012), the Guangxi Key Research and Development Program (AB17195025), the Guangxi Natural Science Foundation (2018GXNSFDA281054, 2018GXNSFAA281232, 2019GXNSFFA245015, 2019GXNSFGA245004, AD19245048), and the Peng Cheng Laboratory Project of Guangdong Province (PCL2018KP004).
More Information
  • Published Date: September 30, 2020
  • Speaker recognition realizes a simple and fast biometric authentication method which is non-contact, not easy to forge and can be authenticated remotely, However, it is not completely secure, as in the process of authentication, storing user data in a third party brings many security and privacy concerns. In order to mitigate the challenge, the template protection of speaker recognition problem is studied based on identity vector (i-Vector) and linear discriminant analysis (LDA), and an improved random mapping technique is proposed, which is used to randomize the voiceprint features. Then we construct a template protection scheme for speaker recognition, which allows users to register in random domain and to complete speaker recognition. Finally, we use the open Chinese speech data set (AISHELL) to simulate the proposed scheme. The results show that the scheme does not significantly affect the accuracy of voiceprint authentication, and realize confidential comparisons of voiceprint templates, which effectively ensures the security and privacy of voice data in speaker recognition.
  • Related Articles

    [1]Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    [2]Chen Yan, Gao Zhenguo, Wang Haijun, Ouyang Yun, Gou Jin. Node Localization Protocol with Adjustable Privacy Protection Capability[J]. Journal of Computer Research and Development, 2022, 59(9): 2075-2088. DOI: 10.7544/issn1000-1239.20210009
    [3]Wang Bin, Zhang Lei, Zhang Guoyin. A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme[J]. Journal of Computer Research and Development, 2020, 57(3): 616-630. DOI: 10.7544/issn1000-1239.2020.20190086
    [4]Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan. Weighted Large-Scale Social Network Data Privacy Protection Method[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377. DOI: 10.7544/issn1000-1239.2020.20190018
    [5]Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li. Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370. DOI: 10.7544/issn1000-1239.2018.20180080
    [6]Yan Xixi, Liu Yuan, Li Zichen, Tang Yongli. Multi-Authority Attribute-Based Encryption Scheme with Privacy Protection[J]. Journal of Computer Research and Development, 2018, 55(4): 846-853. DOI: 10.7544/issn1000-1239.2018.20161043
    [7]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [8]Wu Xuangou, Wang Pengfei, Zheng Xiao, Fan Xu, Wang Xiaolin. Trajectory Privacy Protection Based on Road Segment Report in VANETs[J]. Journal of Computer Research and Development, 2017, 54(11): 2467-2474. DOI: 10.7544/issn1000-1239.2017.20170371
    [9]Zhang Honglei, Shi Yuliang, Zhang Shidong, Zhou Zhongmin, Cui Lizhen. A Privacy Protection Mechanism for Dynamic Data Based on Partition-Confusion[J]. Journal of Computer Research and Development, 2016, 53(11): 2454-2464. DOI: 10.7544/issn1000-1239.2016.20150553
    [10]Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340
  • Cited by

    Periodical cited type(5)

    1. 郭萌,徐胜,陈锦龙,李玉靖,杜江,杨帅. 电力调度系统人员声纹特征AI回溯提取方法. 微型电脑应用. 2025(01): 134-137 .
    2. 朱东骏,汪如毅,江婷,朱雨薪,熊剑峰. 基于AI识别技术的拆回计量器具自动化分拣方法. 机械制造与自动化. 2023(03): 152-155 .
    3. 江楠,陈洁,肖潘,唐文强,林志泉. 基于声纹识别的电力会议多角色语音的分离和识别研究. 高电压技术. 2023(S1): 40-46 .
    4. 张晶晶,李晨鸣. 智慧家居混合声纹识别系统的应用及研究. 自动化与仪器仪表. 2023(12): 139-143 .
    5. 张波,佟玉强. 基于双随机相位编码的多特征人脸模板保护方法. 激光与光电子学进展. 2022(18): 215-222 .

    Other cited types(5)

Catalog

    Article views (727) PDF downloads (292) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return