Elsevier

Pattern Recognition

Volume 76, April 2018, Pages 273-287
Pattern Recognition

Cancellable speech template via random binary orthogonal matrices projection hashing

https://doi.org/10.1016/j.patcog.2017.10.041Get rights and content

Highlights

  • A new scheme (RBOMP) to protect speech template e.g. i-vector.

  • Modification of Winner Take All hashing to strengthen the privacy security.

  • RBOMP provides strong security and privacy against ARM attacks

  • RBOMP can be applied to variety of biometric feature with real-valued vector.

Abstract

The increasing advancement of mobile technology explosively popularizes the mobile devices (e.g. iPhone, iPad). A large number of mobile devices provide great convenience and cost effectiveness for the speaker recognition based applications. However, the compromise of speech template stored in mobile devices highly likely lead to the severe security and privacy breaches while the existing proposals for speech template protection do not completely guarantee the required properties such as unlinkability and non-invertibility. In this paper, we propose a cancellable transform, namely Random Binary Orthogonal Matrices Projection (RBOMP) hashing, to protect a well-known speech representation (i.e. i-vector). RBOMP hashing is inspired from Winner-Takes-All hash and further strengthened by the integration of the prime factorization (PF) function. Briefly, RBOMP hashing projects the i-vector using random binary orthogonal matrices and records the discrete value. Due to the strong non-linearity of RBOMP, the resultant hashed code withstands the template invertibility attack. Further, the experimental results suggest that the speech template generated using RBOMP hashing can still be verified with reasonable accuracy. Besides that, rigorous analysis shows that the proposed cancellable technique for speech resists several major attacks while the other criteria of biometric template protection can be justified simultaneously.

Introduction

Given the advancement of technologies and the increase in the popularity of mobile devices, speaker recognition system is emerging into a rapid growing field of research. In [1], Unar et al. stated the possibilities of using voice biometric modalities in different applications involving mobile commerce and transactions. Voice, consisting of unique features of different speakers, is often used to identify and verify the legitimate user in numerous applications. Typically, speaker recognition can be categorized as speaker identification and speaker verification. Speaker identification classifies a given voice to a specific speaker, while speaker verification decides a pair of voices as from the same speaker. State-of-the-art speaker recognition systems widely use i-vector modeling as a frontend technique to jointly model speaker and channel variabilities in a speech utterance due to its favorable performance as well as its condensed representation [2]. Moreover, Probabilistic Linear Discriminative Analysis (PLDA) is commonly adopted as a supervised backend modeling approach to strengthen speaker information while restraining channel variability and other sources of undesired variabilities [3], [4], [5]. Instances of speaker recognition systems that use both i-vector and PLDA can refer to [6], [7]. It is worth mentioning that two general methods applying Deep Neural Network (DNN) to speaker recognition system brought impressive gains in performance. The first method trained a DNN acoustic model to produce frame alignments by the standard Gaussian Mixture Model (GMM) in the conventional framework [8]. The second method used the DNN acoustic model to extract phonetic features [9], [10]. The phonetic features are the outputs of the bottleneck layer of a DNN or the low dimensional features after applying PCA to DNN’s outputs of tied triphone state phoneme posterior probabilities. The phonetic features were then concatenated to Mel Frequency Cepstral Coefficient (MFCC) to generate tandem feature.

In i-vector/PLDA framework, a speaker recognition system can determine the authenticity of a user by matching the voice reference (i.e. i-vector) stored in the database. However, this raises the concern on the protection of the voice reference (also known as template) stored in the database to prevent security and privacy threats. In [11], [12], it has shown that biometric template leakage is considered as one of the most harmful attacks in the biometric security system. The compromised biometric template can lead the impostor to create physical spoof from the stolen template, replace the template and gain illegitimate access to the system [12], [13], [14]. It is further complicated by the fact that biometric traits are irreplaceable once compromised. Therefore, a biometric-based application equipped with template protection capability is urgently needed.

In the literature, a number of proposals have been reported to secure the biometric templates. The existing proposals in protecting biometric template can be divided into three types: biometric cryptosystems (or helper data methods), feature transformation (or cancellable biometrics) and hybrid biometric cryptosystem [12]. Biometric cryptosystems require the usage of helper data, a biometric-dependent public information which does not reveal the original biometric template, to retrieve or generate keys. Instance of biometric cryptosystem can refer to [15]. The authentication process for this approach is to perform biometric comparison to determine the validity of the key retrieved or generated. Depending on how the helper data is derived, this approach can further be divided into key-binding or key-generation systems [16]. On the other hand, cancellable biometrics transforms the original biometric feature in such a way that it is computationally difficult to reconstruct the original biometric feature [16], [17]. The advantages of using this approach is that the adversary is computationally hard to recover the original biometric feature even if the transformed feature vector had been compromised. However, the transformation of feature often leads to the loss of accuracy and this will likely degrade the performance of the biometric recognition system [17]. Instances of cancellable biometric can refer to [18], [19]. Lastly, the hybrid biometric cryptosystem is the combination of biometric cryptosystems and cancellable biometrics to enjoy the strength from each type of method. An ideal template protection scheme is required and must fulfill all of the following requirements [20]:

  • 1.

    Irreversibility. It should always be computationally hard for the adversary to invert the protected biometric template.

  • 2.

    Unlinkability. It should always be computationally hard for the adversary to distinguish whether multiple protected biometric templates were generated using the same biometric trait of a user.

  • 3.

    Revocability. The protected biometric template should be able to be revoked or renewed to replace the old template while the original template should be computationally hard to be inverted from multiple protected biometric templates derived from the same biometric trait of a user.

  • 4.

    Performance. The performance of the biometric recognition rate should not be seriously degraded.

In this section, the previous works on the speech template protection are discussed and summarized. Generally, the revisit of the speech template protection schemes follows the categories of biometric template protection, i.e. cancellable biometrics, biometric cryptosystems and hybrid biometric cryptosystem [12].

Cancellable biometrics, the intentional distortion of the biometric feature, was formalized by Ratha et al. [21] to protect the privacy of the user. In the event that the cancellable feature is compromised, the same biometric feature can be mapped into another new distinct template using the pre-designed distortion characteristics. Cancellable biometrics can further be divided into biometric salting and non-invertible transformation.

Biometric salting [22] blends an auxiliary data (e.g. a user specific key or password) with the biometric feature. A concrete example of biometric salting for speech template protection is probabilistic random projection proposed by Chong and Teoh [23]. Two-dimensional principal component analysis was applied on the feature matrix before going through a random projection process via an externally derived pseudo random-number. The projected matrix was then fed into a Gaussian Mixture Model (GMM) to obtain probabilistic speaker models. The presented scheme was shown to be resisted from the stolen-token attacks where even if the token had been compromised, the recognition performance of the system was still able to retain at the feature vector level. However, the scheme was vulnerable to attack via record multiplicity (ARM) as the adversary can recover the original feature template by exploiting multiple templates generated using different random projection matrices [24].

Cancellable biometrics also often refers to the use of one-way transformation function that converts the voice feature to a protected template that is computationally hard to be inverted [22]. In 2008, Xu and Cheng [25] proposed a cancellable voice template protection method based on fuzzy vault scheme [26]. Chaff points were added to the unordered Mel-Frequency Cepstral Coefficient matrix to create a vault and a prime accumulator was used to separate the genuine points from chaff points. Besides, a non-invertible function was used to conceal the raw features while polynomial reconstruction was used for authentication. However, Chang et al. [27] revealed that the selection of the chaff points is not independent as the selection of new chaff point depends on the location of the previous selected point. It was observed that the latecomers, referring to the points added later, will likely to have more nearby points. Hence, increasing the number of chaff points will likely lead the adversary to correctly guess the genuine points. In addition to that, if the prime accumulator had been compromised, the adversary will be able to easily determine the genuine points.

Recently, Pandev et al. [28], [29] proposed a new technique called deep secure encoding for protecting face template. The face features were first extracted and trained using deep convolutional neural networks to generate an unprotected binary template. The unprotected binary template was divided into n k-bit blocks. Each k-bit block was then fed as an input of a cryptographic hash function (e.g. SHA-256). Finally, the n outputs of hash function were stored in the database for matching purposes. During the matching phase, the face image is first queried. Subsequently, similar training and feature extraction processes will be carried out using the queried face image to generate an unprotected binary template. The unprotected template is then divided into n k-bit blocks as the inputs of the underlying hash function. The n outputs of the hash will then be compared with the hashed codes stored in the database. The matching is successful if i out of n outputs of the hash are matched where i must be greater than the pre-defined threshold value. The proposed scheme is interesting as a random key is chosen and is embedded during face extraction and training processes to generate an unprotected binary template while no key is needed to secure the unprotected binary template. If the template is compromised, a new key will be selected and the training process must be carried out again to re-generate a new unprotected binary template. Thus, Pandev et al. claimed that their scheme offers the property of cancellability without using key (where no key is needed after the feature extraction and training processes). This idea is different with typical template protection schemes where key is needed in securing the unprotected template to offer the property of cancellability. The size of protected template is of n × k bits. In the experiment performed by Pandev et al. using two different datasets (i.e. CMU PIE and Extended Yale B), the size of a protected template is of 64×1024=65536 bits. Since a typical feature extraction method does not involve any key, we propose a template protection scheme involving a key after the feature extraction method. Our proposed scheme enjoys the benefit that one does not need to focus on the training and feature extraction processes of the underlying biometrics and our scheme can be generalised to other biometric modalities with real value representation. Other than the brute-force attack examined by Pandev et al. on their proposed method, we also provide extensive analysis on different security concerns of our proposed template protection scheme.

Biometric cryptosystems [30] can broadly be divided into key-binding and key-generation. The representative instances of key-binding schemes are fuzzy commitment [31] and fuzzy vault [26]. Fuzzy commitment scheme was first proposed by Juels and Wattenburg. Fuzzy commitment is a two-steps algorithm consisting of commitment and decommitment. The fuzzy commitment scheme F commits a random codeword c using a one-way hash function h and a template x, where both c and x can be expressed as n-bit strings. Mathematically, we have F(c,x)=(h(c),xc) and the output is stored in the database. To decommit a query, x′ denoted as the witness is used such that the extracted commitment c=f(x(xc)) where f is the decommit function. Decommitment is successful if h(c)=h(c).The decommitment can always succeed if the distance between the query and the template is less than approximate half the minimum distance. In this case, the minimum distance is considered as the minimum Hamming distance between two codewords encoded by an error-correcting code.

The fuzzy commitment scheme was first realized by Inthavasis and Lopresti [32] who proposed password based cryptographic key regeneration. They utilized Dynamic Time Warping (DTW) on the extracted feature vector and mapped DTW features to a binary string called feature descriptor. Subsequently, the feature descriptor was used to define distinguishing features. The template was hardened by perturbing the template many times and one of the stable features is extracted each time. The extracted feature will be the key in DTW. The process continued until the distinguishing descriptor had less than or equal to half of the feature vector length. Finally, the harden template was fed through the transformation, permutation and key binding processes using fuzzy commitment framework. It was shown that the security of this scheme is dominated by the password instead of the biometric feature [32].

Billeb et al. [33] proposed to construct a voice protection scheme based on the Universal Background Model (UBM). The proposed scheme binarized the supervector derived from UBM and an adapted fuzzy commitment scheme was used as the basis for the template protection scheme. Even though security analysis against unlinkability and privacy protection was provided, the proposed scheme still suffers from ARM when both key and the difference vectors are compromised. The adversary can exploit the compromised information to reconstruct the template stored in the database.

Paulini et al. [34] proposed the use of multi-bit allocation instead of single bit allocation. Different to Billeb’s work, the proposed scheme divided the feature space into 2k intervals and encodes each interval with k bits. A modified fuzzy commitment scheme was then applied on the binarized features. Their work outperformed the single bit allocation approach and preserved the performance of the recognition system with lesser degradation in the recognition ability. However, similar to Billeb’s work, the presented scheme was vulnerable to ARM.

On the other hand, fuzzy vault scheme was proposed by Juels and Sudan [26]. The general idea of the proposed fuzzy vault scheme is to lock the secret key k under an unordered set A. A polynomial p was selected in such a way that it is able to encode k into variable x. Random chaff points that do not lie on p were then added to set A, creating a vault which consists of collection of points which lie on p and chaff points. To unlock the key k by the means of set B, if B overlaps substantially with A, the collection of points that lie on polynomial p can be determined. Using these points, with error correction ability, the polynomial p can be reconstructed and thereby key k.

Johnson et al. [35] proposed a vaulted verification protocol, where a challenge-respond protocol and fuzzy vault were used in their security scheme. This work used the same database as the work [32] and the results had shown that it was able to achieve a better performance as compared to [32] under the scenario that all the keys had been compromised. The user voice feature was first separated into several blocklets and a chaff/fake blocklet was added to each real blocklet, forming many pairs of real and chaff blockets. These pairs were then encrypted by password and stored in the template. During the authentication phase, the template was first decrypted and a challenging bitstring was generated such that real block represents “0” and chaff block represents “1”. The pairs were then randomly swapped. The score computation was carried out by matching the bitstring response given by the user with the template. However, limited biometric information such as limited voice samples will not be able to vary the data in the challenge-response process due to lesser pairs of real and chaff blocks and thus the adversary will have higher probability in guessing the correct response [35].

As biometric cryptosystems have limitations such as unable to generate multiple unlinkable templates, a hybrid approach of combining cancellable biometrics with biometric cryptosystems is proposed to overcome such limitation [12]. As the name implied, hybrid biometric cryptosystem is a combination of two or more template protection schemes such as bio-hashing with fuzzy vault scheme and key-binding scheme with non-invertible transformation [36]. Hybrid biometric cryptosystem reaps the benefit of cancellable properties from cancellable biometric while providing stronger security and privacy protection inherited from biometric cryptosystem. An instance of hybrid biometric cryptosystem is the cancellable speech template based on chaff point mixture method proposed by Zhu et al. [37] where a two-step hybrid approach (i.e. random projection and fuzzy vault) was used. The voice feature matrix was first randomly projected into another feature space and chaff points were added to the projected space instead of directly to the original feature matrix. Binary indices were used to bind the points and accumulator of genuine indices (key) were calculated using OR operator. The key will be sent to the matcher to filter out the genuine points from query using AND operator. The proposed work had shown that it was able to preserve the performance of the recognition system, however the security of the proposed work is not analyzed in detail as ARM analysis and lost key scenario were not considered. In the event that the binary indices and the key are compromised, the adversary will be able to differentiate the genuine points from randomly added chaff points.

Feng et al. [38] proposed a three-step hybrid framework for face template protection. A random projection matrix was first applied to the original biometric template to provide cancellability. To strike the balance between the security and the recognition performance, a class distribution preserving transform was then used to enhance the discriminatory power of the template and at the same time convert the template from real value to binary space. A distance function and thresholding were used in such a way that if the distance measured between the distinguishing points and the template is lower than the threshold, a “0” bit is generated, otherwise “1” bit is generated. The final step of the proposed framework was to hash the generated binary template using MD5 hashing algorithm. The proposed work had shown a significant improvement on the recognition performance; however the proposed work was vulnerable to several security attacks. Wang and Yu [39] had outlined several drawbacks of using MD5 hash and concluded that finding a collision for MD5 is feasible.

From the existing voice template protection schemes, we have observed that there are several issues that need to be addressed as follows:

  • 1.

    Robustness to attacks: It is observed that most of the speech template protection schemes were vulnerable to different attacks such as attack-via multiplicity (ARM) and stolen-token attacks. The vulnerability of the scheme is most likely due to the high correlation between the templates generated using the same biometric feature. Hence, the adversary is able to derive the original template by analyzing multiple compromised templates. Thus there is an urgent need to ensure that the generated templates are independent to each another, fulfilling the unlinkability and revocability criteria.

  • 2.

    Performance degradation: It can be seen from [32] and [36] that the transformation of the biometric feature from one space to another will cause the loss of the discriminative features. Thus, it will result in the increase of the intra-class variation and eventually lead to the drop of accuracy in the performance. Therefore, the template protection scheme should be able to preserve the performance of the system as much as possible while providing sufficient security protection.

In this paper, we propose a cancellable transform named Random Binary Orthogonal Matrices Projection (RBOMP) hashing, for the well-known voice representation, namely i-vector [2] to address the aforementioned security and privacy issues. Our proposed method is inspired from a hashing method, i.e. Winner Takes All [40] which is designed for the task of fast similarity search initially. Our main contributions are listed as follow:

  • We proposed a cancellable transform e.g. RBOMP hashing to project the biometric feature to ordinal space using binary orthogonal matrices which will induce a strong non-invertible property and is resilient to small intra-class variation simultaneously.

  • Prime Factorization (PF) feature is proposed to further enhance the security and privacy, more specifically, a many-to-one function, namely prime factorization approach together with a user-specific key, are incorporated.

  • Security and Performance analysis. Through analysis on the security and performance of the proposed method are given to justify the common tradeoff of security and performance.

  • Attack-via-Multiplicity (ARM) analysis. Extensive theoretical and simulation analyses on ARM are conducted to boost confidence towards the security against this major attack.

For the rest of the paper, a brief introduction to the generation of i-vector is provided in Section 2. Section 3 presents the proposed RBOMP hashing in detail. Section 4 demonstrates the experimental results and general security analysis. Besides, Section 5 provides detailed ARM analysis. Finally, an outline of the conclusion for this work is given in Section 6.

Section snippets

Generation of i-vector

The state-of-art feature extraction technique through i-vector provides a fixed-length low dimensional representation of speech utterances that preserves the speaker-specific information of each speaker. The Mel Frequency Cepstral Coefficient (MFCC), represented in a form of vectors and derived from a given utterance [4], was fed into a Universal Background Model (UBM). UBM is a K-component Gaussian Mixture Model (GMM), λ=(wk,mk,Σk), where each of the symbols represents weight, mean and

Baseline system

In this section, Gaussian Probabilistic Linear Discriminant Analysis (GPLDA) is used as the baseline system. The detailed explanation and the matching protocol are discussed in Sections 3.1.1 and 3.1.2 respectively.

Experiment and analysis

The training set in this experiment is the database released through the Linguistic Data Consortium (LDC) for the NIST Speaker Recognition Evaluation (SRE) 2004–2010, as well as Switchboard-2 Phase II corpora. The Gaussian PLDA model with a full covariance residual noise term is trained on i-vectors extracted from all training data which amounted to 2790 speakers and 30,600 speech files. The eigenvoice subspace in the PLDA model is assumed to be full-rank. Besides that, there are 2391 enrolled

Security analysis against Attack-Via-Record Multiplicity (ARM)

ARM refers to a privacy attack whereby the attacker uses multiple compromised templates with or without the associated information such as the parameters and algorithms to recover the original biometric template [46]. In our work, our main concern will be on whether the adversary is able to guess the rank of the biometric feature. This is mainly due to the fact that guessing the rank of the biometric feature is relatively easier as there are lesser possibilities as compared to recovering the

Conclusion

In this paper, we have proposed a cancellable speech template protection scheme namely RBOMP hashing. Extensive experimental results and theoretical analysis have vindicated that RBOMP is able to survive major security and privacy attacks at the same time able to preserve the verification performance. We also have demonstrated that the scheme is able to satisfy the evaluation criteria of the biometric scheme, for instance cancellability and revocability, and the user is not required to keep the

Acknowledgements

This research was funded in part by Ministry of Science, Technology and Innovation, Malaysia under MOSTI Science Fund number 01-02-11-SF0189, National Natural Science Foundation of China (61401524, 61773413), Natural Science Foundation of Guangdong Province (2014A030313123), Natural Science Foundation of Guangzhou City (201707010363), Science and Technology Development Foundation of Guangdong Province (2017B090901045) and National Key Research and Development Program (2016YFC0103905).

Kong-Yik Chee obtained his BSc degree (Hons) in Actuarial Science from Universiti Tunku Abdul Rahman (UTAR), Malaysia in 2015. Currently, he is pursuing M.Eng.Sc degree at UTAR. His research interests include biometrics security, particularly in voice template protection.

References (48)

  • P. Kenny

    Bayesian speaker verification with heavy-tailed priors

    The Speaker and Language Recognition Workshop (Odyssey)

    (2010)
  • Y. Lei et al.

    A novel scheme for speaker recognition using a phonetically-aware deep neural network

    IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP)

    (2014)
  • M. Li et al.

    Generalized i-vector representation with phonetic tokenizations and tandem features for both text independent and text dependent speaker verification

    J. Signal Process Syst.

    (2016)
  • P. Matějka et al.

    Neural network bottleneck features for language identification

    The Speaker and Language Recognition Workshop (Odyssey)

    (2014)
  • J. Mwema et al.

    A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates

    Int. J. Comput. Trends Technol.

    (2015)
  • A.K. Jain et al.

    Biometric authentication: system security and user privacy

    IEEE Comput.

    (2012)
  • A.K. Jain et al.

    Biometric template security

    EURASIP J. Adv. Sig. Proc.

    (2008)
  • J. Mwema et al.

    A study of approaches and measures aimed at securing biometric fingerprint templates in verification and identification systems

    Int. J. Comput. Appl. Technol. Res.

    (2015)
  • C. Rathgeb et al.

    A survey on biometric cryptosystems and cancelable biometrics

    EURASIP J. Inf. Secur.

    (2011)
  • A.K. Jain et al.

    Biometric template security: challenges and solutions

    13th European Signal Processing Conference (EUSIPCO)

    (2005)
  • K. Nandakumar et al.

    Biometric template protection: bridging the performance gap between theory and practice

    IEEE Signal Process. Mag.

    (2015)
  • N.K. Ratha et al.

    Generating cancelable fingerprint templates

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2007)
  • R.D. Labati et al.

    Biometric privacy protection: guidelines and technologies

    International Conference on E-Business and Telecommunications (ICETE)

    (2012)
  • L.Y. Chong et al.

    Probabilistic random projections and speaker verification

    International Conference on Biometrics (ICB)

    (2007)
  • Cited by (21)

    • Key protected classification for collaborative learning

      2020, Pattern Recognition
      Citation Excerpt :

      Besides, any of the methods considered under this line can still adopt differential privacy or secure multi-party computation techniques [31,32], in which model updates can be encrypted before sharing them with others. Other than these two major lines of research, the use of cryptographic tools has also been proposed for privacy-preserving machine learning [19,33–37]. Several differential privacy-based solutions have been proposed to prevent the GAN attack, in which a noise signal is added to gradients during the learning phase in order to achieve differential privacy, and hence prevent the GAN attack [38,39].

    • An alignment-free cancelable fingerprint template for bio-cryptosystems

      2018, Journal of Network and Computer Applications
      Citation Excerpt :

      This implies that many signal samples are possible and make the search of correct signal sample more difficult. As a nutshell, the proposed scheme can achieve the property of non-invertibility and is able to strengthen the scheme proposed by Jin et al. (2012) against ARM (Chee et al., 2018) and template inversion attacks due to the newly added random bit flipping strategy, random projection and discrete Fourier transform. The revocability is evaluated by matching a particular template with other fingerprint templates generated from distinct random projection matrices.

    • AVET: A Novel Transform Function to Improve Cancellable Biometrics Security

      2023, IEEE Transactions on Information Forensics and Security
    View all citing articles on Scopus

    Kong-Yik Chee obtained his BSc degree (Hons) in Actuarial Science from Universiti Tunku Abdul Rahman (UTAR), Malaysia in 2015. Currently, he is pursuing M.Eng.Sc degree at UTAR. His research interests include biometrics security, particularly in voice template protection.

    Zhe Jin obtained his BIT (Hons) in Software Engineering, MSc (I.T.) from Multimedia University (MMU), Malaysia in 2007 and 2011 respectively, and PhD degree in Engineering from University Tunku Abdul Rahman (UTAR), Malaysia in 2016. He is now a lecturer in School of Information Technology, Monash University Malaysia. His research interest is biometrics security, particularly in fingerprint template protection.

    Danwei Cai received his B.S. degree in software engineering from Sun Yat-Sen University, China, in 2016. He is currently a master student at Sun Yat-Sen University.

    Ming Li received his B.S. degree in communication engineering from Nanjing University, China, in 2005 and his M.S. degree in signal processing from the Institute of Acoustics, Chinese Academy of Sciences, in 2008. He joined the Signal Analysis and Interpretation Laboratory (SAIL) at USC on a Provost fellowship in 2008 and received his Ph.D. in Electrical Engineering in May 2013. He is currently an assistant professor at SYSU-CMU Joint Institute of Engineering, an associate professor at school of electronics and information technology at Sun Yat-Sen University. His research interests are in the areas of speech recognition, multimodal signal processing, multimodal human state recognition, speaker verification, language identification, multimodal biometrics, affective computing with applications to behavioural informatics notably in health and security. He has published more than 70 papers and served as scientific committee members and reviewers for multiple conferences and journals. Works co-authored with his colleagues have won awards at Body Computing Slam Contest 2009, IEEE DCOSS 2009, Interspeech2011-Speaker State Challenge, Interspeech2012-Speaker Trait Challenge, and ISCSLP 2014 best paper award. He received the IBM faculty award at 2016.

    Wun-She Yap holds the Chair in Centre for Cyber Security at the Universiti Tunku Adbul Rahman (UTAR). He is now an assistant professor in Lee Kong Chian Faculty of Engineering and Science, UTAR, Malaysia. He has been invited to serve as program committees of a number of peer-reviewed security conferences. His research interests include design and analysis of both asymmetric and symmetric cryptographic primitives.

    Yen-Lung Lai obtained his BSc degree (Hons) in Physics from Universiti Tunku Abdul Rahman (UTAR), Malaysia in 2015. Currently, he is pursuing M.Eng.Sc degree at UTAR. His research interests include biometrics (iris and fingerprint), information security and machine learning.

    Bok-Min Goi received his B.Eng degree from University of Malaya (UM) in 1998, and the M.Eng.Sc and PhD degrees from Multimedia University (MMU), Malaysia in 2002 and 2006, respectively. He is now the Dean and a professor in Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman (UTAR), Malaysia. He was also the General Chair for ProvSec 2010 and CANS 2010, Programme Chair for IEEE-STUDENT 2012 and Cryptology 2014, and the PC members for many crypto / security conferences. His research interests include cryptology, security protocols, information security, digital watermarking, computer networking and embedded systems design. He is a senior member of the IEEE and corporate member of the IEM, Malaysia.

    View full text