Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group
Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system...
Gespeichert in:
Veröffentlicht in: | International journal of information security and privacy 2015-10, Vol.9 (4), p.1-19 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 19 |
---|---|
container_issue | 4 |
container_start_page | 1 |
container_title | International journal of information security and privacy |
container_volume | 9 |
creator | Nidhyananthan, S Selva Prasad M Shantha Selva Kumari R |
description | Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition. |
doi_str_mv | 10.4018/IJISP.2015100101 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2931964857</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759569857</galeid><sourcerecordid>A759569857</sourcerecordid><originalsourceid>FETCH-LOGICAL-c467t-8ed859d6f024eea2833f5adb73bae88b2320581bcb7477bfe57302408d389abc3</originalsourceid><addsrcrecordid>eNp1kc9PwyAUxxujifPH3SOJFy-bUEoLR110zhinTs-E0teJdqVCG7P_XnSLUzPD4RHy-X7f432j6IjgQYIJPx1fj6d3gxgTRjAmmGxFPSIo7pM0Fdvfd4Z3oz3vXzBmjCVxL7qfgu4coGkD6hUcegBtZ7Vpja1R5009Q-ejWzR0i6a1fuFbmKN30z6jO2fmgCauCJpzU5kalEMjZ7vmINopVeXhcFX3o6fLi8fhVf9mMhoPz276Okmzts-h4EwUaYnjBEDFnNKSqSLPaK6A8zymMWac5DrPkizLS2AZDSjmBeVC5ZruRydL38bZtw58K-fGa6gqVYPtvCScJwSnGSMBPf6DvtjO1WE6GQtKRJrw4P5NzVQF0tSlbZ3Sn6byLGOCpWJJDTZQ4RQwN9rWUJrw_kuAlwLtrPcOStmE3Sm3kATLz-jkV3RyHd36a2Zm1qP-xWRTlAG93IA6kKtA5Y9AZef_aynoBxQVrg8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2931964857</pqid></control><display><type>article</type><title>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</title><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Nidhyananthan, S Selva ; Prasad M ; Shantha Selva Kumari R</creator><creatorcontrib>Nidhyananthan, S Selva ; Prasad M ; Shantha Selva Kumari R</creatorcontrib><description>Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.</description><identifier>ISSN: 1930-1650</identifier><identifier>EISSN: 1930-1669</identifier><identifier>DOI: 10.4018/IJISP.2015100101</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Authentication ; Computer information security ; Computer systems ; Cryptography ; Multiplication ; Speech ; Speech recognition ; Surveillance ; Tasks</subject><ispartof>International journal of information security and privacy, 2015-10, Vol.9 (4), p.1-19</ispartof><rights>COPYRIGHT 2015 IGI Global</rights><rights>Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c467t-8ed859d6f024eea2833f5adb73bae88b2320581bcb7477bfe57302408d389abc3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2931964857?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,33722,43781</link.rule.ids></links><search><creatorcontrib>Nidhyananthan, S Selva</creatorcontrib><creatorcontrib>Prasad M</creatorcontrib><creatorcontrib>Shantha Selva Kumari R</creatorcontrib><title>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</title><title>International journal of information security and privacy</title><description>Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.</description><subject>Authentication</subject><subject>Computer information security</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Multiplication</subject><subject>Speech</subject><subject>Speech recognition</subject><subject>Surveillance</subject><subject>Tasks</subject><issn>1930-1650</issn><issn>1930-1669</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kc9PwyAUxxujifPH3SOJFy-bUEoLR110zhinTs-E0teJdqVCG7P_XnSLUzPD4RHy-X7f432j6IjgQYIJPx1fj6d3gxgTRjAmmGxFPSIo7pM0Fdvfd4Z3oz3vXzBmjCVxL7qfgu4coGkD6hUcegBtZ7Vpja1R5009Q-ejWzR0i6a1fuFbmKN30z6jO2fmgCauCJpzU5kalEMjZ7vmINopVeXhcFX3o6fLi8fhVf9mMhoPz276Okmzts-h4EwUaYnjBEDFnNKSqSLPaK6A8zymMWac5DrPkizLS2AZDSjmBeVC5ZruRydL38bZtw58K-fGa6gqVYPtvCScJwSnGSMBPf6DvtjO1WE6GQtKRJrw4P5NzVQF0tSlbZ3Sn6byLGOCpWJJDTZQ4RQwN9rWUJrw_kuAlwLtrPcOStmE3Sm3kATLz-jkV3RyHd36a2Zm1qP-xWRTlAG93IA6kKtA5Y9AZef_aynoBxQVrg8</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Nidhyananthan, S Selva</creator><creator>Prasad M</creator><creator>Shantha Selva Kumari R</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20151001</creationdate><title>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</title><author>Nidhyananthan, S Selva ; Prasad M ; Shantha Selva Kumari R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c467t-8ed859d6f024eea2833f5adb73bae88b2320581bcb7477bfe57302408d389abc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Authentication</topic><topic>Computer information security</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Multiplication</topic><topic>Speech</topic><topic>Speech recognition</topic><topic>Surveillance</topic><topic>Tasks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nidhyananthan, S Selva</creatorcontrib><creatorcontrib>Prasad M</creatorcontrib><creatorcontrib>Shantha Selva Kumari R</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of information security and privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nidhyananthan, S Selva</au><au>Prasad M</au><au>Shantha Selva Kumari R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</atitle><jtitle>International journal of information security and privacy</jtitle><date>2015-10-01</date><risdate>2015</risdate><volume>9</volume><issue>4</issue><spage>1</spage><epage>19</epage><pages>1-19</pages><issn>1930-1650</issn><eissn>1930-1669</eissn><abstract>Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/IJISP.2015100101</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1930-1650 |
ispartof | International journal of information security and privacy, 2015-10, Vol.9 (4), p.1-19 |
issn | 1930-1650 1930-1669 |
language | eng |
recordid | cdi_proquest_journals_2931964857 |
source | Alma/SFX Local Collection; ProQuest Central |
subjects | Authentication Computer information security Computer systems Cryptography Multiplication Speech Speech recognition Surveillance Tasks |
title | Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T22%3A35%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Speaker%20Recognition%20using%20BGN%20Cryptosystem%20with%20Prime%20Order%20Bilinear%20Group&rft.jtitle=International%20journal%20of%20information%20security%20and%20privacy&rft.au=Nidhyananthan,%20S%20Selva&rft.date=2015-10-01&rft.volume=9&rft.issue=4&rft.spage=1&rft.epage=19&rft.pages=1-19&rft.issn=1930-1650&rft.eissn=1930-1669&rft_id=info:doi/10.4018/IJISP.2015100101&rft_dat=%3Cgale_proqu%3EA759569857%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2931964857&rft_id=info:pmid/&rft_galeid=A759569857&rfr_iscdi=true |