Privacy-Preserving speaker authentication
ISC'12 Proceedings of the 15th international conference on Information Security
Secure and efficient approximate nearest neighbors search
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
We present a novel method to securely determine whether two signals are similar to each other, and apply it to approximate nearest neighbor clustering. The proposed method relies on a locality sensitive hashing scheme based on a secure binary embedding, computed using quantized random projections. Hashes extracted from the signals preserve information about the distance between the signals, provided this distance is small enough. If the distance between the signals is larger than a threshold, then no information about the distance is revealed. Theoretical and experimental justification is provided for this property. Further, when the randomized embedding parameters are unknown, then the mutual information between the hashes of any two signals decays to zero exponentially fast as a function of the l