|
Volumn , Issue , 2012, Pages 1849-1852
|
Privacy-preserving speaker verification as password matching
|
Author keywords
LSH; Privacy; Speaker Verification
|
Indexed keywords
ACCURACY EXPERIMENT;
BIT-STRINGS;
COMPUTATIONAL OVERHEADS;
CRYPTOGRAPHIC HASH FUNCTIONS;
DATA SETS;
EXECUTION TIME;
LOCALITY SENSITIVE HASHING;
LSH;
NEAREST NEIGHBORS;
PASSWORD-BASED AUTHENTICATION;
PRIVACY CONSTRAINTS;
PRIVACY PRESERVING;
SPEAKER VERIFICATION;
SPEAKER VERIFICATION SYSTEM;
SPEECH INPUT;
STRING COMPARISON;
VERIFICATION DATA;
AUTHENTICATION;
DATA PRIVACY;
HASH FUNCTIONS;
SIGNAL PROCESSING;
SPEECH RECOGNITION;
|
EID: 84867598353
PISSN: 15206149
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICASSP.2012.6288262 Document Type: Conference Paper |
Times cited : (28)
|
References (11)
|