Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

An overview of privacy-enhancing technologies in biometric recognition

P Melzi, C Rathgeb, R Tolosana, R Vera… - ACM Computing …, 2022 - dl.acm.org
Privacy-enhancing technologies are technologies that implement fundamental data
protection principles. With respect to biometric recognition, different types of privacy …

Deep hashing for secure multimodal biometrics

V Talreja, MC Valenti… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
When compared to unimodal systems, multimodal biometric systems have several
advantages, including lower error rate, higher accuracy, and larger population coverage …

Reversing the irreversible: A survey on inverse biometrics

M Gomez-Barrero, J Galbally - Computers & Security, 2020 - Elsevier
With the widespread use of biometric recognition, several issues related to the privacy and
security provided by this technology have been recently raised and analysed. As a result …

A cancelable biometric authentication system based on feature-adaptive random projection

W Yang, S Wang, M Shahzad, W Zhou - Journal of Information Security and …, 2021 - Elsevier
Biometric template data protection is critical in preventing user privacy and identity from
leakage. Random projection based cancelable biometrics is an efficient and effective …

A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection

T Wu, L Leng, MK Khan - Artificial Intelligence Review, 2023 - Springer
Direct usage of original biometric features/templates definitely leads to serious privacy
leakage. In biometric cryptosystems, a biometric key is generated and then strictly protected …

Deep face fuzzy vault: Implementation and performance

C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …

Secureface: Face template protection

G Mai, K Cao, X Lan, PC Yuen - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
It has been shown that face images can be reconstructed from their representations
(templates). We propose a randomized CNN to generate protected face biometric templates …

Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications

AD Algarni, G El Banby, S Ismail, W El-Shafai… - Entropy, 2020 - mdpi.com
The security of information is necessary for the success of any system. So, there is a need to
have a robust mechanism to ensure the verification of any person before allowing him to …

Evaluating voice conversion-based privacy protection against informed attackers

BML Srivastava, N Vauquier… - ICASSP 2020-2020 …, 2020 - ieeexplore.ieee.org
Speech data conveys sensitive speaker attributes like identity or accent. With a small
amount of found data, such attributes can be inferred and exploited for malicious purposes …