메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2405-2408

Privacy preserving speaker verification using adapted GMMs

Author keywords

Secure biometrics; Speaker verification

Indexed keywords

CLIENT DEVICES; DATA SETS; PRIVACY PRESERVING; PROTOTYPE IMPLEMENTATIONS; SPEAKER VERIFICATION; SPEECH DATA; SPEECH PATTERNS; VERIFICATION SYSTEMS;

EID: 84865702898     PISSN: None     EISSN: 19909772     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (12)
  • 1
    • 0032664931 scopus 로고    scopus 로고
    • An experimental study of speaker verification sensitivity to computer voice-altered imposters
    • B.L. Pellom and J.H.L. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters," in ICASSP, 1999.
    • (1999) ICASSP
    • Pellom, B.L.1    Hansen, J.H.L.2
  • 3
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Andrew Yao, "Protocols for secure computations," in FOCS, 1982.
    • (1982) FOCS
    • Yao, A.1
  • 5
    • 80051624586 scopus 로고    scopus 로고
    • Privacy preserving probabilistic inference with hidden Markov models
    • Manas Pathak, Shantanu Rane, Wei Sun, and Bhiksha Raj, "Privacy preserving probabilistic inference with hidden Markov models," in ICASSP, 2011.
    • (2011) ICASSP
    • Pathak, M.1    Rane, S.2    Sun, W.3    Raj, B.4
  • 6
    • 2942594475 scopus 로고    scopus 로고
    • A tutorial on text-independent speaker verification
    • Frederic Bimbot et. al., "A tutorial on text-independent speaker verification," EURASIP Journal on Applied Signal Processing, vol. 4, pp. 430-451, 2004.
    • (2004) EURASIP Journal on Applied Signal Processing , vol.4 , pp. 430-451
    • Bimbot, F.1
  • 7
    • 0028996937 scopus 로고
    • Testing with the YOHO CD-ROM voice verification corpus
    • Joseph P. Campbell, "Testing with the YOHO CD-ROM voice verification corpus," in ICASSP, 1995, pp. 341-344.
    • (1995) ICASSP , pp. 341-344
    • Campbell, J.P.1
  • 8
    • 85075924869 scopus 로고    scopus 로고
    • Comparison of background normalization methods for text-independent speaker verification
    • Douglas A. Reynolds, "Comparison of background normalization methods for text-independent speaker verification," in Eurospeech, 1997, vol. 2, pp. 963-966.
    • (1997) Eurospeech , vol.2 , pp. 963-966
    • Reynolds, D.A.1
  • 9
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Pascal Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 10
    • 84885886133 scopus 로고    scopus 로고
    • "Appendix," http://mlsp.cs.cmu.edu/publications/pdfs/ppsv.pdf.
    • Appendix
  • 11
    • 84865786575 scopus 로고    scopus 로고
    • "Openssl," http://www.openssl.org/docs/crypto/bn.html.
    • Openssl
  • 12
    • 85086419359 scopus 로고    scopus 로고
    • Privacy-preserving data mining in the malicious model
    • Murat Kantarcioglu and Onur Kardes, "Privacy-preserving data mining in the malicious model," J. Information and Computer Security, vol. 2, no. 4, pp. 353-375, 2008.
    • (2008) J. Information and Computer Security , vol.2 , Issue.4 , pp. 353-375
    • Kantarcioglu, M.1    Kardes, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.