Abstract
This research is focused on developing a privacy preserving biometric voice authentication system based on SIPPA – Secure Information Processing with Privacy Assurance. SIPPA is a 2-party secure computation protocol that allows private data comparison and exchange. The significance of SIPPA protocol is its ability to guarantee correctness and privacy under the realistic model that any party could behave maliciously. The contribution of this research is a novel application of SIPPA to realize a practical biometric voice authentication system. Specifically, the authentication credential is not stored in plain anywhere, and is regenerated on demand; thereby eliminating the risk of information leakage when the system is compromised.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Reference
Bon K. Sy and Arun P. Kumara Krishnan, “Generation of Cryptographic Keys from Personal Biometrics: An Illustration based on Fingerprints,” New Trends and Developments in Biometrics, ISBN 980-953-307-576-6, InTech, 2012.
Arun P. Kumara Krishnan and Bon K. Sy, “SIPPA-2.0 - Secure Information Processing with Privacy Assurance (version 2.0),” Proc. of the 9th Annual Conference on Privacy, Security, and Trust, Paris, France, July 2012.
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, W. Timothy Polk, Sarbari Gupta, Emad A. Nabbus, Electronic Authentication Guideline; Special Publication 800-63-1; Dec 2011.
Peter G. Neumann, “System and Network Trustworthiness in Perspective,” CCS 06, October 30–November 3, 2006, Alexandria, Virginia, USA.
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, "Concepts and Languages for Privacy-Preserving Attribute-Based Authentication," Policies and Research in Identity Management: IFIP Advances in Information and Communication Technology, Volume 396, 2013, pp 34-52.
Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid, "Privacy Pre-serving Schema and Data Matching," Proceedings of the 2007 ACM SIGMOD international conference on Management of data, Jun 2007, Beijing China.
J. Bourgain, “On Lipschitz Embedding of Finite Metric Spaces in Hilbert Space,” Israel Journal of Mathematics, 52 (1985), no. 1-2, 46.
R. Cramer, I. Damgard, Jesper Buus Nielsen, Multiparty Computation: An Introduction; http://www.daimi.au.dk/~ivan/mpc.pdf
Thrasyvoulou T., Benton S.: Speech Parameterization Using the Mel Scale (Part II), (2003).
M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein, A. Smith, “Detectable Byzantine Agreement Secure Against Faulty Majorities,” Proc. of the 21st ACM Symposium on Principles of Distibuted Computing (PODC), July 2002.
Acknowledgement
This work is supported in part from a grant by PSC CUNY Research Award.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sy, B.K. (2015). Privacy Preserving Biometric Voice Authentication System – SIPPA-based Approach. In: Selvaraj, H., Zydek, D., Chmaj, G. (eds) Progress in Systems Engineering. Advances in Intelligent Systems and Computing, vol 366. Springer, Cham. https://doi.org/10.1007/978-3-319-08422-0_74
Download citation
DOI: https://doi.org/10.1007/978-3-319-08422-0_74
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08421-3
Online ISBN: 978-3-319-08422-0
eBook Packages: EngineeringEngineering (R0)