Abstract
Rapid growth in the mobile technology manifolds the usage of mobile devices. It leads to the development and popularity of mobile application in diversified domains like finance, commerce, and government services. Extensive services can be explored conveniently and cost-effectively from these applications using speaker recognition based authentication to determine the identity of the individuals requesting service. Speech template that is stored in these mobile devices necessitates the prime concern of preserving the private data from unauthorized access and privacy breaches. It is highly feasible to prove the authenticity of the person using speech as a biometric to ensure that the rendered services are accessed only by the legitimate user. If the speech template stored in the database for comparison is compromised, then the authentication process will become obsolete. This issue had motivated the need for highly secured, faster and lightweight model named as (SCAN) - Speech biometriC templAte protectioN system based on the genus-2 hyper elliptic curve. Mobile devices are smaller in size and often restricted by memory and power constraints. Hence it requires a cryptosystem with lesser key size offering the higher degree of security and guard against sophisticated attacks. The proposed SCAN system provides the complete solution for this challenge uniquely by designing genus-2 hyper elliptic curve cryptosystem for speech template. The elaborate analysis from the results traces ideal values for MSE, PSNR, BRT, and EUD. This ratifies the suitability of this work that craves for higher encryption and decryption reliability. It offers high resistance to various attacks as it involves HECC that comes under the category of discrete logarithmic problem. This SCAN system can also reap the benefit of light weight processing, better ERR and authentication accuracy with induced parallelism.
















Similar content being viewed by others
References
Ali Z et al (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76–87
Billeb S et al (2015) Biometric template protection for speaker recognition based on universal background models. IET Biomet 4.2:116–126
Chee K-Y et al (2018) Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recogn 76:273–287
Feng YC, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. Biometric Technology for Human Identification V. Vol. 6944. International Society for Optics and Photonics
Hermansky H, Morgan N (1994) RASTA processing of speech. IEEE Trans Speech Audio Process 2.4:578–589
Hermansky H et al. (1986) Perceptually-based processing in automatic speech recognition. Acoust Speech Signal Process. IEEE Int Conf ICASSP'86 11. IEEE
Hermansky H et al. (1991) The challenge of inverse-E: the RASTA-PLP method. Signals, Systems and Computers. 1991 Conference Record of the Twenty-Fifth Asilomar Conference on. IEEE
Inthavisas K, Lopresti D (2011) Speech cryptographic key regeneration based on the password. Biometrics (IJCB), 2011 International Joint Conference on. IEEE
Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45.11:87–92
Jain AK, Ross A, Uludag U (2005) Biometric template security: challenges and solutions. Sign Process Conf 2005 13th European. IEEE
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Sign Process 2008:113
Jin Z et al (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50–62
Johnson RC, Scheirer WJ, Boult TE (2013) Secure voice-based authentication for mobile devices: vaulted voice verification. Biometric and Surveillance Technology for Human and Activity Identification X. Vol. 8712. International Society for Optics and Photonics
Juels A, Madhu S (2006) A fuzzy vault scheme. Des Codes Crypt 38.2:237–257
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. Proceedings of the 6th ACM conference on Computer and communications security. ACM
Lan X, Ma AJ, Yuen PC, Chellappa R (2015) Joint sparse representation and robust feature-level fusion for multi-cue visual tracking. IEEE Trans Image Process 24(12):5826–5841
Lan X, Zhang S, Yuen PC (2016) Robust joint discriminative feature learning for visual tracking. IJCAI: 3403–3410
Lan, X, Yuen PC, Chellappa R (2017) Robust MIL-based feature template learning for object tracking. AAAI: 4118–4125
Lan X, Zhang S, Yuen PC, Chellappa R (2018) Learning common and feature-specific patterns: a novel multiple-sparse-representation-based tracker. IEEE Trans Image Process 27(4):2022–2037
Lan X, Ye M, Zhang S, Zhou H, Yuen PC (2018) Modality-correlation-aware sparse representation for RGB-infrared object tracking. Pattern Recogn Lett
Lan X, Ye M, Zhang S, Yuen PC (2018) Robust collaborative discriminative learning for RGB-infrared tracking. AAAI
Mwema J, Kimwele M, Kimani S (2015) A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates. Int J Comput Trends Technol 20.1:12–18
Mwema J, Kimani S, Kimwele M (2015) A study of approaches and measures aimed at securing biometric fingerprint templates in verification and identification systems. Int J Comput Appl Technol Res 4.2:108–119
Nandakumar K, Jain AK (2015) Biometric template protection: Bridging the performance gap between theory and practice. IEEE Signal Process Mag 32.5:88–100
Pauline M et al. (2016) Multi-bit allocation: preparing voice biometrics for template protection. Odyssey
Rabiner LR, Juang B-H (1993) Fundamentals of speech recognition Vol. 14. PTR Prentice Hall, Englewood cliffs
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Sec 2011.1:3
Revathi A, Venkataramani Y (2011) Speaker independent continuous speech and isolated digit recognition using VQ and HMM. Commun Signal Process (ICCSP), 2011 Int Conf IEEE
Soutar C et al. (1999) Biometric encryption ICSA Guide to Cryptography: 649–675
Unar JA, Seng WC, Abbasi A (2014) A review of biometric technology along with trends and prospects. Pattern Recogn 47.8:2673–2688
Weng A (2003) Constructing hyperelliptic curves of genus two suitable for cryptography. Math Comput 72.241:435–458
Zhu H-H, He Q-H, Li Y-X (2012) A two-step hybrid approach for voiceprint-biometric template protection. Machine Learning and Cybernetics (ICMLC), 2012 International Conf 2. IEEE
Acknowledgements
This part of this research work is supported by Department of Science and Technology (DST), Science and Engineering Board (SERB), Government of India under the ECR grant (ECR/2017/000679/ES)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sasikaladevi, N., Geetha, K., Revathi, A. et al. SCAN-speech biometric template protection based on genus-2 hyper elliptic curve. Multimed Tools Appl 78, 18339–18361 (2019). https://doi.org/10.1007/s11042-019-7208-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7208-1