Privacy Preserving Techniques for Speech Processing

نویسنده

  • Manas A. Pathak
چکیده

Speech is perhaps the most private form of personal communication but current speech processing techniques are not designed to preserve the privacy of the speaker and require complete access to the speech recording. We propose to develop techniques for speech processing which do preserve privacy. While our proposed methods can be applied to a variety of speech processing problems and also generally to problems in other domains, we focus on the problems of keyword spotting, speaker identification, speaker verification, and speech recognition. Each of these applications involve the two separate but overlapping problems of private classifier evaluation and private classifier release. Towards the former, we study designing privacy preserving protocols using primitives such as homomorphic encryption, oblivious transfer, and blind and permute in the framework of secure multiparty computation (SMC). Towards the latter, we study the differential privacy model, and techniques such as exponential method and sensitivity method for releasing differentially private classifiers trained on private data. We summarize our preliminary work on the subject including techniques such as SMC protocols for eigenvector computation, isolated keyword recognition and differentially private release mechanisms for large margin Gaussian mixture models, and classifiers trained from data belonging to multiple parties. Finally, we discuss the proposed directions of research including techniques such as training differentially private hidden Markov models, and a multiparty framework for differentially private classification by data perturbation, and protocols for applications such as privacy preserving music matching and keyword spotting, speaker verification and identification.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Privacy Preserving Data Mining using Random Decision Tree

Data processing with information privacy and information utility has been emerged to manage distributed information expeditiously. In this paper, to deal with this advancement in privacy protective data processing technology victimization intensify approach of Random Decision Tree (RDT). Random Decision Tree provides higher potency and information privacy than Privacy secured Data mining Techni...

متن کامل

A Survey on Privacy Preserving Association Rule Mining of Outsourced Databases

Data mining finds useful patterns from the large dataset. Data analysis techniques that are frequent itemset mining and association rule mining are two popular and broadly utilized for different applications. Personal or sensitive information of individuals, industries or organizations must be kept private before it is shared for the data mining. Hence privacy preserving data mining has become ...

متن کامل

On the Comparison of Innovative Perturbative Masking Technique and Existing Perturbative Masking Techniques

Abstract— The increasing facility to track and collect large amounts of data with the use of this has led to an interest in the development of data mining algorithms which preserve user privacy. With the growth of data analysis and processing technique, the privacy disclosure problem about individual or company is inevitably exposed when releasing or sharing data to mine useful decision informa...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010