Publication Type
Journal Article
Version
publishedVersion
Publication Date
3-2023
Abstract
Voiceprint Authentication as a Service (VAaS) offers great convenience due to ubiquity, generality, and usability. Despite its attractiveness, it suffers from user voiceprint leakage over the air or at the cloud, which intrudes user voice privacy and retards its wide adoption. The literature still lacks an effective solution on this issue. Traditional methods based on cryptography are too complex to be practically deployed while other approaches distort user voiceprints, which hinders accurate user identification. In this article, we propose a leakage resilient user authentication cloud service with privacy preservation based on random personal voice challenges, named VOLERE (VOice LEakage REsilient). It applies a novel voiceprint synthesis method based on a Log Magnitude Approximate (LMA) vocal tract model to fuse original voices of different speaking modes in order to generate a synthesized voiceprint for authentication. Thus, raw voiceprints of users can be well protected. We implement VOLERE and conduct a series of user tests. Experimental results show sound performance of VOLERE regarding authentication accuracy, efficiency, stability, leakage resilience and user acceptance. In particular, its authentication accuracy is reasonably stable regardless user nationality, gender, age, elapsed time, and environment, as well as variance of speaking modes.
Keywords
User authentication, biometric authentication, voiceprint, privacy preservation, leakage resilience
Discipline
Information Security
Research Areas
Cybersecurity
Publication
IEEE Transactions on Dependable and Secure Computing
Volume
20
Issue
2
First Page
1002
Last Page
1016
ISSN
1545-5971
Identifier
10.1109/TDSC.2022.3147504
Publisher
Institute of Electrical and Electronics Engineers
Citation
ZHANG, Rui; YAN, Zheng; WANG, Xuerui; and DENG, Robert H..
VOLERE: Leakage resilient user authentication based on personal voice challenges. (2023). IEEE Transactions on Dependable and Secure Computing. 20, (2), 1002-1016.
Available at: https://ink.library.smu.edu.sg/sis_research/7820
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/TDSC.2022.3147504