Data shredding for speech recognition acoustic model training under data retention restrictions

UH Jost, PC Woodland, M Katz, SR Shahid… - US Patent …, 2016 - Google Patents
Training speech recognizers, eg, their language or acoustic models, using actual user data
is useful, but retaining personally identifiable information may be restricted in certain …

Fast encryption methods for audiovisual data confidentiality

CP Wu, CCJ Kuo - Multimedia Systems and Applications III, 2001 - spiedigitallibrary.org
Two methodologies for efficient audiovisual data encryption are studied in this research, ie
selective encryption and MHT (multiple-Huffman-table). We first discuss benefits and …

Protection of private information in a client/server automatic speech recognition system

WF Ganong III, PJ Vozila - US Patent 9,131,369, 2015 - Google Patents
(57) ABSTRACT A mobile device is adapted for protecting private information on the mobile
device in a hybrid automatic speech recognition arrangement. The mobile device includes a …

Securing speech recognition data

WF Ganong III, M Bisani - US Patent 9,065,593, 2015 - Google Patents
BACKGROUND Client/server speech recognition systems where a client computer sends
speech data to one or more serverside speech recognition servers for recognition and …

Data shredding for speech recognition language model training under data retention restrictions

UH Jost, PC Woodland, M Katz, SR Shahid… - US Patent …, 2016 - Google Patents
Training speech recognizers, eg, their language or acoustic models, using actual user data
is useful, but retaining personally identifiable information may be restricted in certain …

Secure speech communication over public switched telephone network

NM Anas, Z Rahman, A Shafii… - 2005 Asia-Pacific …, 2005 - ieeexplore.ieee.org
This paper is incorporated to explain the work to design a secure telephone prototype
namely" SecurePhone", with practical and reliable encryption, easy to operate and connects …

Design of speech information hiding telephone

W Zhi-Jun, N Xin-Xin, Y Yi-Xian - 2002 IEEE Region 10 …, 2002 - ieeexplore.ieee.org
The speech information hiding telephone (SITH) is a new steganography scheme based on
information hiding security technique system The overall system is designed in embedding …

[PDF][PDF] A Robust Real-time Secure Communication approach Over Public Switched Telephone Network

A Karaca, O Cetin - Journal of Naval Science and Engineering, 2011 - arastirmax.com
In this paper, a secure phone system implemented over Public Switched Telephone Network
(PSTN). Speech data is sent through a dial-up modem over PSTN to receiver after converted …

A novel covert speech communication system and its implementation

Z Deng, X Shao, Z Yang, B Zheng - Journal of Electronics (China), 2008 - Springer
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the
information hiding technique, which works on the internet. To solve the large embedding …

Kablolu iletişim ağlarında yeni bir şifreleme tabanlı güvenlik uygulaması

A Karaca - 2012 - search.proquest.com
Günümüzde haberleşme teknolojileri hızla gelişmekte ve güvenli iletişim önemli bir kavram
olarak ortaya çıkmaktadır. Gerek askeri gerek sivil uygulamalar da yapılan bir görüşmenin …