Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing

The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the secu...

Full description

Bibliographic Details
Main Author: Chee, Kong Yik
Format: Final Year Project / Dissertation / Thesis
Published: 2018
Subjects:
Online Access:http://eprints.utar.edu.my/3609/
http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf
_version_ 1848885945041944576
author Chee, Kong Yik
author_facet Chee, Kong Yik
author_sort Chee, Kong Yik
building UTAR Institutional Repository
collection Online Access
description The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the security and the privacy of the information stored in the database. Template protection scheme is designed to secure the user biometric from being recovered by attackers. However, current voice template protection schemes do not completely provide the required security properties, such as non-invertibility, unlinkability and revocability. In this dissertation, two voice template protection schemes that are inspired from Winner-Takes-All hashing are proposed. These two newly proposed schemes are named as Random Binary Orthogonal Matrices Projection hashing and two-dimensional Winner-Takes-All hashing. The former scheme is designed for one-dimensional input while the latter scheme is designed for two-dimensional input. To further increase the security of the proposed schemes, additional factor of authentication is incorporated (i.e., random token and additional biometric modality). Extensive analysis is performed to justify the trade-off between the performance and the security of the proposed schemes. The experimental results and analysis have demonstrated that both of the proposed schemes are able to survive against major privacy and security attacks (e.g., attack-via-record multiplicity and stolen token attack) while preserving the performance of the proposed schemes.
first_indexed 2025-11-15T19:30:39Z
format Final Year Project / Dissertation / Thesis
id utar-3609
institution Universiti Tunku Abdul Rahman
institution_category Local University
last_indexed 2025-11-15T19:30:39Z
publishDate 2018
recordtype eprints
repository_type Digital Repository
spelling utar-36092019-12-05T04:51:32Z Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing Chee, Kong Yik TK Electrical engineering. Electronics Nuclear engineering The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the security and the privacy of the information stored in the database. Template protection scheme is designed to secure the user biometric from being recovered by attackers. However, current voice template protection schemes do not completely provide the required security properties, such as non-invertibility, unlinkability and revocability. In this dissertation, two voice template protection schemes that are inspired from Winner-Takes-All hashing are proposed. These two newly proposed schemes are named as Random Binary Orthogonal Matrices Projection hashing and two-dimensional Winner-Takes-All hashing. The former scheme is designed for one-dimensional input while the latter scheme is designed for two-dimensional input. To further increase the security of the proposed schemes, additional factor of authentication is incorporated (i.e., random token and additional biometric modality). Extensive analysis is performed to justify the trade-off between the performance and the security of the proposed schemes. The experimental results and analysis have demonstrated that both of the proposed schemes are able to survive against major privacy and security attacks (e.g., attack-via-record multiplicity and stolen token attack) while preserving the performance of the proposed schemes. 2018 Final Year Project / Dissertation / Thesis NonPeerReviewed application/pdf http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf Chee, Kong Yik (2018) Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing. Master dissertation/thesis, UTAR. http://eprints.utar.edu.my/3609/
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Chee, Kong Yik
Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_full Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_fullStr Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_full_unstemmed Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_short Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
title_sort design and analysis of voice template protection schemes based on winner-takes-all hashing
topic TK Electrical engineering. Electronics Nuclear engineering
url http://eprints.utar.edu.my/3609/
http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf