SUSPECT (SecUre SPEeCh Technologies): Difference between revisions

From HLT@INESC-ID

No edit summary
 
(28 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{TOCright}}
{| align="center"
|[[Image:SUSPECT-logo-SUSPECT.png|300px]]
|}
Sponsored by: FCT (PTDC/EIA-CCO/122542/2010)<br/>  
Sponsored by: FCT (PTDC/EIA-CCO/122542/2010)<br/>  
Start: February 2012<br/>
Start: February 2012<br/>
Line 15: Line 20:
* [http://www.gsd.inesc-id.pt/~rjoaquim/ Rui Joaquim]
* [http://www.gsd.inesc-id.pt/~rjoaquim/ Rui Joaquim]
* [[Gonçalo Carito]]
* [[Gonçalo Carito]]
* [[Luís Marujo]]


Consultant: [http://www.cs.cmu.edu/~bhiksha/homepage.html Bhiksha Raj]
Consultant: [http://www.cs.cmu.edu/~bhiksha/homepage.html Bhiksha Raj]
Line 32: Line 38:


== Publications ==
== Publications ==
Journal Publications


Rui Joaquim, Paulo Ferreira, Carlos Ribeiro, [http://www.sciencedirect.com/science/article/pii/S0167404812001642 EVIV: an End-to-end Verifiable Internet Voting System], In Computer & Security, 32, pp. 170-191, Jan. 2013, Elsevier
José Portêlo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/11006.pdf Logsum using Garbled Circuits], PLoS One, vol. 10, n. 3, doi: 0.1371/journal.pone.0122236, March 2015
 
Rui Joaquim, Paulo Ferreira, Carlos Ribeiro, [http://www.sciencedirect.com/science/article/pii/S0167404812001642 EVIV: an End-to-end Verifiable Internet Voting System], Computer & Security, Elsevier, Volume 32, pp. 170-191, Feb. 2013, doi:10.1016/j.cose.2012.10.001
 
Conference Publications
 
Luís Marujo, José Portêlo, Wang Ling, David Martins de Matos, João Paulo da Silva Neto, Anatole Gershman, Jaime Carbonell, Isabel Trancoso, Bhiksha Raj, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/11108.pdf Privacy-Preserving Multi-Document Summarization], In ACM SIGIR Workshop on Privacy-Preserving Information Retrieval, Santiago, Chile, August 2015
 
Isabel Trancoso, José Portêlo,  Bhiksha Raj,  Gerard Chollet, Nigel Cannings, Dijana Petrovska-Delacretaz, Atta Badii, Jean-Jacques Quisquater, [https://www.inesc-id.pt/ficheiros/publicacoes/11109.pdf Privacy Preserving Speech Processing], CHIST-ERA Conference 2015, Lisbon, Portugal, June 2015 (poster)
 
José Portêlo, Alberto Abad, Bhiksha Raj, Isabel Trancoso, [https://www.inesc-id.pt/ficheiros/publicacoes/11074.pdf Privacy-Preserving Query-by-Example Speech Search], In ICASSP 2015, Brisbane, Australia, April 2015
 
José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, [https://www.inesc-id.pt/ficheiros/publicacoes/10386.pdf Privacy-Preserving Speaker Verification Using Garbled GMMs], In Proc. EUSIPCO 2014, Lisbon, Portugal, September 2014
 
Luís Marujo, José Portelo, David Martins de Matos, João Neto, Anatole Gershman, Jaime Carbonell, Isabel Trancoso, Bhiksha Raj, [https://www.inesc-id.pt/ficheiros/publicacoes/10262.pdf Privacy-Preserving Important Passage Retrieval], In PIR14: Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security (SIGIR 2014 Workshop), ACM, Gold Coast, Australia, July 2014
 
Maria Joana Correia, Alberto Abad, Isabel Trancoso, [https://www.inesc-id.pt/ficheiros/publicacoes/10388.pdf Preventing converted speech spoofing attacks in speaker verification], In Proc. MYPRO 2014, Opatja, Croatia, May 2014
 
José Portêlo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, [https://www.inesc-id.pt/ficheiros/publicacoes/10385.pdf Privacy-Preserving Speaker Verification using Secure Binary Embeddings], In Proc. MYPRO 2014, Opatja, Croatia, May 2014
 
Maria Joana Correia, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/9385.pdf Towards an Anti-spoofing System Based on Phase and Modulation Features], INESC-ID Technical Report RT/28/2013, December 2013
 
Alberto Abad and Ramon Astudillo and Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/9352.pdf The L2F Spoken Web Search system for Mediaeval 2013], In Proc. Mediaeval Workshop, Barcelona, Spain, October 2013  
 
José Portelo, Bhiksha Raj, Petros Boufounos, Isabel Trancoso, Alberto Abad, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/9274.pdf Speaker verification using secure binary embeddings], In EUSIPCO 2013, Marrakech, Morocco, September 2013
 
José Portelo, Alberto Abad, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/9273.pdf Secure binary embeddings of front-end factor analysis for privacy preserving speaker verification], In INTERSPEECH 2013, Lyon, France, August 2013


Mauro Silva, João Leitão, Carlos Ribeiro, [http://inforum.org.pt/INForum2012/docs/20120164.pdf MobUser: Publish-Subscribe Communication for Mobile Nodes], Proc. 18th IEEE International Conference on Parallel and Distributed Systems, Dec. 2012
Mauro Silva, João Leitão, Carlos Ribeiro, [http://inforum.org.pt/INForum2012/docs/20120164.pdf MobUser: Publish-Subscribe Communication for Mobile Nodes], Proc. 18th IEEE International Conference on Parallel and Distributed Systems, Dec. 2012
Rui Joaquim, Carlos Ribeiro, [http://link.springer.com/chapter/10.1007%2F978-3-642-32747-6_7 An Efficient and Highly Sound Voter Verification Technique and its Implementation], presented at E-Voting and Identity, Sep. 2012, volume 7187 of LNCS, Springer, September 2012.


Manas Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/8976.pdf Privacy-preserving speaker authentication], In ISC 2012, Springer-Verlag , series LNCS 7483, pages 1-22, Passau, Germany, September 2012 (Keynote Talk by Bhiksha Raj)
Manas Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/8976.pdf Privacy-preserving speaker authentication], In ISC 2012, Springer-Verlag , series LNCS 7483, pages 1-22, Passau, Germany, September 2012 (Keynote Talk by Bhiksha Raj)
Line 41: Line 76:
José Portelo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/8276.pdf Attacking a Privacy Preserving Music Matching Algorithm], In ICASSP 2012, IEEE, Kyoto, Japan, March 2012
José Portelo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/8276.pdf Attacking a Privacy Preserving Music Matching Algorithm], In ICASSP 2012, IEEE, Kyoto, Japan, March 2012


José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/7420.pdf On the Implementation of a Secure Musical Database Matching], In Proc. EUSIPCO 2011 - 19th European Signal Processing Conference, EURASIP, Barcelona, Spain, August 2011
José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/7420.pdf On the Implementation of a Secure Musical Database Matching], In Proc. EUSIPCO 2011 - 19th European Signal Processing Conference, EURASIP, Barcelona, Spain, August 2011(work done prior to official project start)


== Seminars ==
== Seminars ==
Bhiksha Raj, [https://www.l2f.inesc-id.pt/wiki/index.php/Unsupervised_semantic_structure_discovery_for_audio Unsupervised semantic structure discovery for audio], INESC-ID, October 31st, 2013
José Portelo, [https://www.l2f.inesc-id.pt/wiki/index.php/Privacy_Preserving_Speaker_Verification_using_Secure_Binary_Embeddings Privacy Preserving Speaker Verification using Secure Binary Embeddings], INESC-ID, October 4th, 2013


Bhiksha Raj, [https://www.l2f.inesc-id.pt/wiki/index.php/Privacy-Preserving_Speech_and_Audio_Processing Privacy-Preserving Speech and Audio Processing], INESC-ID, September 28th 2012
Bhiksha Raj, [https://www.l2f.inesc-id.pt/wiki/index.php/Privacy-Preserving_Speech_and_Audio_Processing Privacy-Preserving Speech and Audio Processing], INESC-ID, September 28th 2012


Luís Brandão, [https://www.l2f.inesc-id.pt/wiki/index.php/1-output_2-party_secure_function_evaluation_in_a_malicious_setting,_via_a_cut_and_choose_of_garbled_circuits 1-output 2-party secure function evaluation in a malicious setting], via a cut and choose of garbled circuits, INESC-ID, October 2nd 2012  
Luís Brandão, [https://www.l2f.inesc-id.pt/wiki/index.php/1-output_2-party_secure_function_evaluation_in_a_malicious_setting,_via_a_cut_and_choose_of_garbled_circuits 1-output 2-party secure function evaluation in a malicious setting via a cut and choose of garbled circuits], INESC-ID, October 2nd 2012  


== See also ==
== See also ==

Latest revision as of 17:00, 25 November 2015

Sponsored by: FCT (PTDC/EIA-CCO/122542/2010)
Start: February 2012
End: January 2015

Team

Project Leader: Isabel Trancoso

Consultant: Bhiksha Raj

Summary

The goal of this project is to develop privacy-preserving frameworks for processing voice data. Processing will be performed without having access to the voice, i.e., access to any form of the speech that can be analyzed to obtain information about the talker or what they spoke. Using a combination of tools from cryptography and secure-multiparty computation we will render voice processing algorithms secure (i.e. privacy-preserving), so that the privacy of all parties is preserved. We specifically propose to develop solutions for secure speaker verification and keyword spotting problems. We envision a mechanism whereby police/security agencies could obtain publicly- accepted forms of legal sanction to look for pre-specified voices or phrases. The privacy-preserving framework will ensure that they are only notified when these occur, but will have no access to the voice data itself, thus preserving citizens’ privacy. Although this proposal addresses only speech processing techniques, the impact of this type of technique is not restricted to this area. In fact, it may affect all types of multimedia documents.

Workplan

  • T1 - Secure multi-party computation
  • T2 - Secure speech parametrization
  • T3 - Secure speaker verification
  • T4 - Secure keyword spotting
  • T5 - Proof of concept
  • T6 - Evaluation
  • T7 - Management and dissemination

Publications

Journal Publications

José Portêlo, Bhiksha Raj, Isabel Trancoso, Logsum using Garbled Circuits, PLoS One, vol. 10, n. 3, doi: 0.1371/journal.pone.0122236, March 2015

Rui Joaquim, Paulo Ferreira, Carlos Ribeiro, EVIV: an End-to-end Verifiable Internet Voting System, Computer & Security, Elsevier, Volume 32, pp. 170-191, Feb. 2013, doi:10.1016/j.cose.2012.10.001

Conference Publications

Luís Marujo, José Portêlo, Wang Ling, David Martins de Matos, João Paulo da Silva Neto, Anatole Gershman, Jaime Carbonell, Isabel Trancoso, Bhiksha Raj, Privacy-Preserving Multi-Document Summarization, In ACM SIGIR Workshop on Privacy-Preserving Information Retrieval, Santiago, Chile, August 2015

Isabel Trancoso, José Portêlo, Bhiksha Raj, Gerard Chollet, Nigel Cannings, Dijana Petrovska-Delacretaz, Atta Badii, Jean-Jacques Quisquater, Privacy Preserving Speech Processing, CHIST-ERA Conference 2015, Lisbon, Portugal, June 2015 (poster)

José Portêlo, Alberto Abad, Bhiksha Raj, Isabel Trancoso, Privacy-Preserving Query-by-Example Speech Search, In ICASSP 2015, Brisbane, Australia, April 2015

José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, Privacy-Preserving Speaker Verification Using Garbled GMMs, In Proc. EUSIPCO 2014, Lisbon, Portugal, September 2014

Luís Marujo, José Portelo, David Martins de Matos, João Neto, Anatole Gershman, Jaime Carbonell, Isabel Trancoso, Bhiksha Raj, Privacy-Preserving Important Passage Retrieval, In PIR14: Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security (SIGIR 2014 Workshop), ACM, Gold Coast, Australia, July 2014

Maria Joana Correia, Alberto Abad, Isabel Trancoso, Preventing converted speech spoofing attacks in speaker verification, In Proc. MYPRO 2014, Opatja, Croatia, May 2014

José Portêlo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, Privacy-Preserving Speaker Verification using Secure Binary Embeddings, In Proc. MYPRO 2014, Opatja, Croatia, May 2014

Maria Joana Correia, Towards an Anti-spoofing System Based on Phase and Modulation Features, INESC-ID Technical Report RT/28/2013, December 2013

Alberto Abad and Ramon Astudillo and Isabel Trancoso, The L2F Spoken Web Search system for Mediaeval 2013, In Proc. Mediaeval Workshop, Barcelona, Spain, October 2013

José Portelo, Bhiksha Raj, Petros Boufounos, Isabel Trancoso, Alberto Abad, Speaker verification using secure binary embeddings, In EUSIPCO 2013, Marrakech, Morocco, September 2013

José Portelo, Alberto Abad, Bhiksha Raj, Isabel Trancoso, Secure binary embeddings of front-end factor analysis for privacy preserving speaker verification, In INTERSPEECH 2013, Lyon, France, August 2013

Mauro Silva, João Leitão, Carlos Ribeiro, MobUser: Publish-Subscribe Communication for Mobile Nodes, Proc. 18th IEEE International Conference on Parallel and Distributed Systems, Dec. 2012

Rui Joaquim, Carlos Ribeiro, An Efficient and Highly Sound Voter Verification Technique and its Implementation, presented at E-Voting and Identity, Sep. 2012, volume 7187 of LNCS, Springer, September 2012.

Manas Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso, Privacy-preserving speaker authentication, In ISC 2012, Springer-Verlag , series LNCS 7483, pages 1-22, Passau, Germany, September 2012 (Keynote Talk by Bhiksha Raj)

José Portelo, Bhiksha Raj, Isabel Trancoso, Attacking a Privacy Preserving Music Matching Algorithm, In ICASSP 2012, IEEE, Kyoto, Japan, March 2012

José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, On the Implementation of a Secure Musical Database Matching, In Proc. EUSIPCO 2011 - 19th European Signal Processing Conference, EURASIP, Barcelona, Spain, August 2011(work done prior to official project start)

Seminars

Bhiksha Raj, Unsupervised semantic structure discovery for audio, INESC-ID, October 31st, 2013

José Portelo, Privacy Preserving Speaker Verification using Secure Binary Embeddings, INESC-ID, October 4th, 2013

Bhiksha Raj, Privacy-Preserving Speech and Audio Processing, INESC-ID, September 28th 2012

Luís Brandão, 1-output 2-party secure function evaluation in a malicious setting via a cut and choose of garbled circuits, INESC-ID, October 2nd 2012

See also

Carnegie Mellon Voice Verification Technology Prevents Impersonators From Obtaining Voiceprints, Press Release, September 2012

David Talbot, Wiping away your Siri fingerprint, MIT Technology Review, June 2012