Skip to main content

Privacy Preserving Biometric Voice Authentication System – SIPPA-based Approach

  • Conference paper
Progress in Systems Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 366))

  • 2079 Accesses

Abstract

This research is focused on developing a privacy preserving biometric voice authentication system based on SIPPA – Secure Information Processing with Privacy Assurance. SIPPA is a 2-party secure computation protocol that allows private data comparison and exchange. The significance of SIPPA protocol is its ability to guarantee correctness and privacy under the realistic model that any party could behave maliciously. The contribution of this research is a novel application of SIPPA to realize a practical biometric voice authentication system. Specifically, the authentication credential is not stored in plain anywhere, and is regenerated on demand; thereby eliminating the risk of information leakage when the system is compromised.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Reference

  1. Bon K. Sy and Arun P. Kumara Krishnan, “Generation of Cryptographic Keys from Personal Biometrics: An Illustration based on Fingerprints,” New Trends and Developments in Biometrics, ISBN 980-953-307-576-6, InTech, 2012.

    Google Scholar 

  2. Arun P. Kumara Krishnan and Bon K. Sy, “SIPPA-2.0 - Secure Information Processing with Privacy Assurance (version 2.0),” Proc. of the 9th Annual Conference on Privacy, Security, and Trust, Paris, France, July 2012.

    Google Scholar 

  3. William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, W. Timothy Polk, Sarbari Gupta, Emad A. Nabbus, Electronic Authentication Guideline; Special Publication 800-63-1; Dec 2011.

    Google Scholar 

  4. Peter G. Neumann, “System and Network Trustworthiness in Perspective,” CCS 06, October 30–November 3, 2006, Alexandria, Virginia, USA.

    Google Scholar 

  5. Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, "Concepts and Languages for Privacy-Preserving Attribute-Based Authentication," Policies and Research in Identity Management: IFIP Advances in Information and Communication Technology, Volume 396, 2013, pp 34-52.

    Google Scholar 

  6. Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid, "Privacy Pre-serving Schema and Data Matching," Proceedings of the 2007 ACM SIGMOD international conference on Management of data, Jun 2007, Beijing China.

    Google Scholar 

  7. J. Bourgain, “On Lipschitz Embedding of Finite Metric Spaces in Hilbert Space,” Israel Journal of Mathematics, 52 (1985), no. 1-2, 46.

    Google Scholar 

  8. R. Cramer, I. Damgard, Jesper Buus Nielsen, Multiparty Computation: An Introduction; http://www.daimi.au.dk/~ivan/mpc.pdf

  9. Thrasyvoulou T., Benton S.: Speech Parameterization Using the Mel Scale (Part II), (2003).

    Google Scholar 

  10. M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein, A. Smith, “Detectable Byzantine Agreement Secure Against Faulty Majorities,” Proc. of the 21st ACM Symposium on Principles of Distibuted Computing (PODC), July 2002.

    Google Scholar 

Download references

Acknowledgement

This work is supported in part from a grant by PSC CUNY Research Award.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bon K. Sy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sy, B.K. (2015). Privacy Preserving Biometric Voice Authentication System – SIPPA-based Approach. In: Selvaraj, H., Zydek, D., Chmaj, G. (eds) Progress in Systems Engineering. Advances in Intelligent Systems and Computing, vol 366. Springer, Cham. https://doi.org/10.1007/978-3-319-08422-0_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08422-0_74

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08421-3

  • Online ISBN: 978-3-319-08422-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics