Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group

Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of information security and privacy 2015-10, Vol.9 (4), p.1-19
Hauptverfasser: Nidhyananthan, S Selva, Prasad M, Shantha Selva Kumari R
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 19
container_issue 4
container_start_page 1
container_title International journal of information security and privacy
container_volume 9
creator Nidhyananthan, S Selva
Prasad M
Shantha Selva Kumari R
description Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.
doi_str_mv 10.4018/IJISP.2015100101
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2931964857</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759569857</galeid><sourcerecordid>A759569857</sourcerecordid><originalsourceid>FETCH-LOGICAL-c467t-8ed859d6f024eea2833f5adb73bae88b2320581bcb7477bfe57302408d389abc3</originalsourceid><addsrcrecordid>eNp1kc9PwyAUxxujifPH3SOJFy-bUEoLR110zhinTs-E0teJdqVCG7P_XnSLUzPD4RHy-X7f432j6IjgQYIJPx1fj6d3gxgTRjAmmGxFPSIo7pM0Fdvfd4Z3oz3vXzBmjCVxL7qfgu4coGkD6hUcegBtZ7Vpja1R5009Q-ejWzR0i6a1fuFbmKN30z6jO2fmgCauCJpzU5kalEMjZ7vmINopVeXhcFX3o6fLi8fhVf9mMhoPz276Okmzts-h4EwUaYnjBEDFnNKSqSLPaK6A8zymMWac5DrPkizLS2AZDSjmBeVC5ZruRydL38bZtw58K-fGa6gqVYPtvCScJwSnGSMBPf6DvtjO1WE6GQtKRJrw4P5NzVQF0tSlbZ3Sn6byLGOCpWJJDTZQ4RQwN9rWUJrw_kuAlwLtrPcOStmE3Sm3kATLz-jkV3RyHd36a2Zm1qP-xWRTlAG93IA6kKtA5Y9AZef_aynoBxQVrg8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2931964857</pqid></control><display><type>article</type><title>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</title><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Nidhyananthan, S Selva ; Prasad M ; Shantha Selva Kumari R</creator><creatorcontrib>Nidhyananthan, S Selva ; Prasad M ; Shantha Selva Kumari R</creatorcontrib><description>Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.</description><identifier>ISSN: 1930-1650</identifier><identifier>EISSN: 1930-1669</identifier><identifier>DOI: 10.4018/IJISP.2015100101</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Authentication ; Computer information security ; Computer systems ; Cryptography ; Multiplication ; Speech ; Speech recognition ; Surveillance ; Tasks</subject><ispartof>International journal of information security and privacy, 2015-10, Vol.9 (4), p.1-19</ispartof><rights>COPYRIGHT 2015 IGI Global</rights><rights>Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c467t-8ed859d6f024eea2833f5adb73bae88b2320581bcb7477bfe57302408d389abc3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2931964857?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,33722,43781</link.rule.ids></links><search><creatorcontrib>Nidhyananthan, S Selva</creatorcontrib><creatorcontrib>Prasad M</creatorcontrib><creatorcontrib>Shantha Selva Kumari R</creatorcontrib><title>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</title><title>International journal of information security and privacy</title><description>Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.</description><subject>Authentication</subject><subject>Computer information security</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Multiplication</subject><subject>Speech</subject><subject>Speech recognition</subject><subject>Surveillance</subject><subject>Tasks</subject><issn>1930-1650</issn><issn>1930-1669</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kc9PwyAUxxujifPH3SOJFy-bUEoLR110zhinTs-E0teJdqVCG7P_XnSLUzPD4RHy-X7f432j6IjgQYIJPx1fj6d3gxgTRjAmmGxFPSIo7pM0Fdvfd4Z3oz3vXzBmjCVxL7qfgu4coGkD6hUcegBtZ7Vpja1R5009Q-ejWzR0i6a1fuFbmKN30z6jO2fmgCauCJpzU5kalEMjZ7vmINopVeXhcFX3o6fLi8fhVf9mMhoPz276Okmzts-h4EwUaYnjBEDFnNKSqSLPaK6A8zymMWac5DrPkizLS2AZDSjmBeVC5ZruRydL38bZtw58K-fGa6gqVYPtvCScJwSnGSMBPf6DvtjO1WE6GQtKRJrw4P5NzVQF0tSlbZ3Sn6byLGOCpWJJDTZQ4RQwN9rWUJrw_kuAlwLtrPcOStmE3Sm3kATLz-jkV3RyHd36a2Zm1qP-xWRTlAG93IA6kKtA5Y9AZef_aynoBxQVrg8</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Nidhyananthan, S Selva</creator><creator>Prasad M</creator><creator>Shantha Selva Kumari R</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20151001</creationdate><title>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</title><author>Nidhyananthan, S Selva ; Prasad M ; Shantha Selva Kumari R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c467t-8ed859d6f024eea2833f5adb73bae88b2320581bcb7477bfe57302408d389abc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Authentication</topic><topic>Computer information security</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Multiplication</topic><topic>Speech</topic><topic>Speech recognition</topic><topic>Surveillance</topic><topic>Tasks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nidhyananthan, S Selva</creatorcontrib><creatorcontrib>Prasad M</creatorcontrib><creatorcontrib>Shantha Selva Kumari R</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of information security and privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nidhyananthan, S Selva</au><au>Prasad M</au><au>Shantha Selva Kumari R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group</atitle><jtitle>International journal of information security and privacy</jtitle><date>2015-10-01</date><risdate>2015</risdate><volume>9</volume><issue>4</issue><spage>1</spage><epage>19</epage><pages>1-19</pages><issn>1930-1650</issn><eissn>1930-1669</eissn><abstract>Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/IJISP.2015100101</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1930-1650
ispartof International journal of information security and privacy, 2015-10, Vol.9 (4), p.1-19
issn 1930-1650
1930-1669
language eng
recordid cdi_proquest_journals_2931964857
source Alma/SFX Local Collection; ProQuest Central
subjects Authentication
Computer information security
Computer systems
Cryptography
Multiplication
Speech
Speech recognition
Surveillance
Tasks
title Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T22%3A35%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Speaker%20Recognition%20using%20BGN%20Cryptosystem%20with%20Prime%20Order%20Bilinear%20Group&rft.jtitle=International%20journal%20of%20information%20security%20and%20privacy&rft.au=Nidhyananthan,%20S%20Selva&rft.date=2015-10-01&rft.volume=9&rft.issue=4&rft.spage=1&rft.epage=19&rft.pages=1-19&rft.issn=1930-1650&rft.eissn=1930-1669&rft_id=info:doi/10.4018/IJISP.2015100101&rft_dat=%3Cgale_proqu%3EA759569857%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2931964857&rft_id=info:pmid/&rft_galeid=A759569857&rfr_iscdi=true