{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:29:04Z","timestamp":1766579344139},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333828"},{"type":"electronic","value":"9783642333835"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33383-5_1","type":"book-chapter","created":{"date-parts":[[2012,9,5]],"date-time":"2012-09-05T22:51:51Z","timestamp":1346885511000},"page":"1-22","source":"Crossref","is-referenced-by-count":10,"title":["Privacy-Preserving Speaker Authentication"],"prefix":"10.1007","author":[{"given":"Manas","family":"Pathak","sequence":"first","affiliation":[]},{"given":"Jose","family":"Portelo","sequence":"additional","affiliation":[]},{"given":"Bhiksha","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Trancoso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Adler, A.: Biometric System Security. In: Jain, A.K., Flynn, P., Ross, A. (eds.) Handbook of Biometrics. Springer (2007)","key":"1_CR1"},{"doi-asserted-by":"crossref","unstructured":"Pathak, M., Raj, B.: Privacy Preserving Speaker Verification using adapted GMMs. In: Proc. Interspeech (2011)","key":"1_CR2","DOI":"10.1109\/ICASSP.2012.6288262"},{"doi-asserted-by":"crossref","unstructured":"Pathak, M., Raj, B.: Privacy-Preserving Speaker Verification as Password Matching. In: Proc. ICASSP (2012)","key":"1_CR3","DOI":"10.1109\/ICASSP.2012.6288262"},{"doi-asserted-by":"crossref","unstructured":"Boufounos, P., Rane, S.: Secure Binary Embeddings for Privacy Preserving Nearest Neighbors. In: Proc. Workshop on Information Forensics and Security, WIFS (2011)","key":"1_CR4","DOI":"10.1109\/WIFS.2011.6123149"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1109\/TIT.2011.2173899","volume":"58","author":"P. Boufounos","year":"2012","unstructured":"Boufounos, P.: Universal Rate-Efficient Scalar Quantization. IEEE Trans. on Information Theory\u00a058(3), 1861\u20131872 (2012)","journal-title":"IEEE Trans. on Information Theory"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TASSP.1980.1163420","volume":"28","author":"S.B. Davis","year":"1980","unstructured":"Davis, S.B., Mermelstein, P.: Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Sentences. IEEE Transactions on Acoustics, Speech, and Signal Processing\u00a028(4), 357\u2013366 (1980)","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing"},{"issue":"1-3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"D.A. Reynolds","year":"2000","unstructured":"Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker Verification using Adapted Gaussian Mixture Models. Digital Signal Processing\u00a010(1-3), 19\u201341 (2000)","journal-title":"Digital Signal Processing"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/TASL.2006.881693","volume":"15","author":"P. Kenny","year":"2007","unstructured":"Kenny, P., Boulianne, G., Ouellet, P., Dumouchel, P.: Joint Factor Analysis Versus Eigenchannels in Speaker Recognition. IEEE Trans. Audio, Speech and Language Processing\u00a015(4), 1435\u20131447 (2007)","journal-title":"IEEE Trans. Audio, Speech and Language Processing"},{"doi-asserted-by":"crossref","unstructured":"Sennoussaoui, M., Kenny, P., Brummer, N., de Villiers, E., Dumouchel, P.: Mixture of PLDA Models in I-Vector Space for Gender-Independent Speaker Recognition. In: Proc. Interspeech 2011, Florence, Italy (August 2011)","key":"1_CR9","DOI":"10.21437\/Interspeech.2011-7"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.csl.2005.06.003","volume":"20","author":"W.M. Campbell","year":"2006","unstructured":"Campbell, W.M., Campbell, J.R., Reynolds, D.A., Singer, E., Torres-Carrasquillo, P.A.: Support Vector Machines for Speaker and Language Recognition. Computer Speech and Language\u00a020, 210\u2013229 (2006)","journal-title":"Computer Speech and Language"},{"unstructured":"Campbell, J.P.: Testing with the YOHO CD-ROM voice verification corpus. In: Proc. ICASSP (1995)","key":"1_CR11"},{"doi-asserted-by":"crossref","unstructured":"Yu, H., Han, J., Chang, K.C.C.: PEBL: Positive Example based Learning for Web Page Classification using SVM. In: Proc. of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 239\u2013248. ACM (2002)","key":"1_CR12","DOI":"10.1145\/775047.775083"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-540-72540-4_4","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"Y. Lindell","year":"2007","unstructured":"Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 52\u201378. Springer, Heidelberg (2007)"},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T. Kinnunena","year":"2010","unstructured":"Kinnunena, T., Li, H.: An overview of text-independent speaker recognition: From features to supervectors. Speech Communication\u00a052(1), 12\u201340 (2010)","journal-title":"Speech Communication"},{"doi-asserted-by":"crossref","unstructured":"Smaragdis, P., Shashanka, M.: A Framework for Secure Speech Recognition. IEEE Transactions on Audio, Speech, and Language Processing\u00a015(4), 1404\u20131413","key":"1_CR15","DOI":"10.1109\/TASL.2007.894526"},{"doi-asserted-by":"crossref","unstructured":"Pathak, M., Rane, S., Sun, W., Raj, B.: Privacy Preserving Probabilistic Inference with Hidden Markov Models. In: Proc. ICASSP, Prague, Czech Republic (May 2011)","key":"1_CR16","DOI":"10.1109\/ICASSP.2011.5947696"},{"doi-asserted-by":"crossref","unstructured":"Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: security and privacy concerns. IEEE Security & Privacy\u00a01(2), 33\u201342","key":"1_CR17","DOI":"10.1109\/MSECP.2003.1193209"},{"issue":"1-3","key":"1_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"D.A. Reynolds","year":"2000","unstructured":"Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker Verification Using Adapted Gaussian Mixture Models. Digital Signal Processing\u00a010(1-3), 19\u201341 (2000)","journal-title":"Digital Signal Processing"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1155\/S1110865704310024","volume":"4","author":"F. Bimbot","year":"2004","unstructured":"Bimbot, F., Bonastre, J.-F., Fredouille, C., Gravier, G., Magrin-Chagnolleau, I., Meignier, S., Merlin, T., Ortega-Garc\u00eda, J., Petrovska-Delacr\u00e9taz, D., Reynolds, D.A.: A Tutorial on Text-Independent Speaker Verification. EURASIP Journal on Advances in Signal Processing\u00a04, 430\u2013451 (2004)","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Reynolds, D.A.: Comparison of Background Normalization Methods for Text-Independent Speaker Verification. In: Proceedings of the European Conference on Speech Communication and Technology (September 1997)","key":"1_CR20","DOI":"10.21437\/Eurospeech.1997-337"},{"doi-asserted-by":"crossref","unstructured":"Shou-Chun, Rose, R., Kenny, P.: Adaptive score normalization for progressive model adaptation in text independent speaker verification. In: Proc. ICASSP, Las Vegas, Nevada, USA (April 2008)","key":"1_CR21","DOI":"10.1109\/ICASSP.2008.4518745"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"doi-asserted-by":"crossref","unstructured":"Kershbaum, F., Biswas, D., de Hoogh, S.: Performance Comparison of Secure Comparison Protocols. In: Proceedings of the 2009 20th International Workshop on Database and Expert Systems Application, pp. 133\u2013136 (2009)","key":"1_CR23","DOI":"10.1109\/DEXA.2009.37"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1007\/0-387-34805-0_60","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"J.-J. Quisquater","year":"1990","unstructured":"Quisquater, J.-J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 628\u2013631. Springer, Heidelberg (1990)"},{"unstructured":"Gionis, A., Indyk, P., Motwani, R.: Similarity Search in High Dimensions via Hashing. In: Proceedings of the 25th Very Large Database (VLDB) Conference (1999)","key":"1_CR25"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33383-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T11:56:01Z","timestamp":1687694161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33383-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333828","9783642333835"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33383-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}