Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Content based image retrieval using deep learning process

RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …

A privacy-preserving framework for large-scale content-based information retrieval

L Weng, L Amsaleg, A Morton… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We propose a privacy protection framework for large-scale content-based information
retrieval. It offers two layers of protection. First, robust hash values are used as queries to …

Privacy-preserving nearest neighbor methods: Comparing signals without revealing them

S Rane, PT Boufounos - IEEE Signal Processing Magazine, 2013 - ieeexplore.ieee.org
Comparing two signals is one of the most essential and prevalent tasks in signal processing.
A large number of applications fundamentally rely on determining the answers to the …

Private approximate nearest neighbor search with sublinear communication

S Servan-Schreiber, S Langowski… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nearest neighbor search is a fundamental building-block for a wide range of applications. A
privacy-preserving protocol for nearest neighbor search involves a set of clients who send …

Deep secure quantization: On secure biometric hashing against similarity-based attacks

Y Chen, Y Wo, R Xie, C Wu, G Han - Signal Processing, 2019 - Elsevier
The widespread application of biometric recognition has emerged solid protection on the
privacy of biometric templates. Non-invertible transformations such as random projections …

Exploring hashing and cryptonet based approaches for privacy-preserving speech emotion recognition

M Dias, A Abad, I Trancoso - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The outsourcing of machine learning classification and data mining tasks can be an effective
solution for those parties that need machine learning services, but lack the appropriate …

Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification

Y Wang, J Wan, J Guo, YM Cheung… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Similarity search is essential to many important applications and often involves searching at
scale on high-dimensional data based on their similarity to a query. In biometric …

Multi-user image retrieval with suppression of search pattern leakage

H Liu, Y Zhang, Y Xiang, B Liu, EC Guo - Information Sciences, 2022 - Elsevier
In image retrieval applications for multi-users, users can retrieve similar images in a
database. The server can collude with the user and exploit the search patterns to infer the …

Privacy-preserving outsourced media search

L Weng, L Amsaleg, T Furon - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This work proposes a privacy-protection framework for an important application called
outsourced media search. This scenario involves a data owner, a client, and an untrusted …