Difference between revisions of "SUSPECT (SecUre SPEeCh Technologies)"

From HLT@INESC-ID

Line 33: Line 33:
  
 
== Publications ==
 
== Publications ==
 
Journals:
 
 
Invited talks:
 
 
International conferences:
 
  
 
Manas Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/8976.pdf Privacy-preserving speaker authentication], In ISC 2012, Springer-Verlag , series LNCS 7483, pages 1-22, Passau, Germany, September 2012 (Keynote Talk by Bhiksha Raj)
 
Manas Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/8976.pdf Privacy-preserving speaker authentication], In ISC 2012, Springer-Verlag , series LNCS 7483, pages 1-22, Passau, Germany, September 2012 (Keynote Talk by Bhiksha Raj)
Line 46: Line 40:
 
José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/7420.pdf On the Implementation of a Secure Musical Database Matching], In Proc. EUSIPCO 2011 - 19th European Signal Processing Conference, EURASIP, Barcelona, Spain, August 2011
 
José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, [http://www.inesc-id.pt/pt/indicadores/Ficheiros/7420.pdf On the Implementation of a Secure Musical Database Matching], In Proc. EUSIPCO 2011 - 19th European Signal Processing Conference, EURASIP, Barcelona, Spain, August 2011
  
+
== Seminars ==
 +
 
 +
Bhiksha Raj, Privacy-Preserving Speech and Audio Processing, INESC-ID, September 28th 2012
 +
 
 +
Luís Brandão, 1-output 2-party secure function evaluation in a malicious setting, via a cut and choose of garbled circuits, INESC_ID, October 2nd 2012
 +
 
 
[[category:Research]]
 
[[category:Research]]
 
[[category:Projects]]
 
[[category:Projects]]
 
[[category:National Projects]]
 
[[category:National Projects]]

Revision as of 22:23, 6 February 2013

Sponsored by: FCT (PTDC/EIA-CCO/122542/2010)
Start: February 2012
End: January 2015

News

Team

Project Leader: Isabel Trancoso

Consultant: Bhiksha Raj

Summary

The goal of this project is to develop privacy-preserving frameworks for processing voice data. Processing will be performed without having access to the voice, i.e., access to any form of the speech that can be analyzed to obtain information about the talker or what they spoke. Using a combination of tools from cryptography and secure-multiparty computation we will render voice processing algorithms secure (i.e. privacy-preserving), so that the privacy of all parties is preserved. We specifically propose to develop solutions for secure speaker verification and keyword spotting problems. We envision a mechanism whereby police/security agencies could obtain publicly- accepted forms of legal sanction to look for pre-specified voices or phrases. The privacy-preserving framework will ensure that they are only notified when these occur, but will have no access to the voice data itself, thus preserving citizens’ privacy. Although this proposal addresses only speech processing techniques, the impact of this type of technique is not restricted to this area. In fact, it may affect all types of multimedia documents.

Workplan

  • T1 - Secure multi-party computation
  • T2 - Secure speech parametrization
  • T3 - Secure speaker verification
  • T4 - Secure keyword spotting
  • T5 - Proof of concept
  • T6 - Evaluation
  • T7 - Management and dissemination

Publications

Manas Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso, Privacy-preserving speaker authentication, In ISC 2012, Springer-Verlag , series LNCS 7483, pages 1-22, Passau, Germany, September 2012 (Keynote Talk by Bhiksha Raj)

José Portelo, Bhiksha Raj, Isabel Trancoso, Attacking a Privacy Preserving Music Matching Algorithm, In ICASSP 2012, IEEE, Kyoto, Japan, March 2012

José Portelo, Bhiksha Raj, Alberto Abad, Isabel Trancoso, On the Implementation of a Secure Musical Database Matching, In Proc. EUSIPCO 2011 - 19th European Signal Processing Conference, EURASIP, Barcelona, Spain, August 2011

Seminars

Bhiksha Raj, Privacy-Preserving Speech and Audio Processing, INESC-ID, September 28th 2012

Luís Brandão, 1-output 2-party secure function evaluation in a malicious setting, via a cut and choose of garbled circuits, INESC_ID, October 2nd 2012