Speaker identification features extraction methods: A systematic review
SS Tirumala, SR Shahamiri, AS Garhwal… - Expert Systems with …, 2017 - Elsevier
Speaker Identification (SI) is the process of identifying the speaker from a given utterance by
comparing the voice biometrics of the utterance with those utterance models stored …
comparing the voice biometrics of the utterance with those utterance models stored …
Privacy–enhancing face biometrics: A comprehensive survey
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …
now used across a number of services and applications. However, this widespread …
Introducing the VoicePrivacy initiative
The VoicePrivacy initiative aims to promote the development of privacy preservation tools for
speech technology by gathering a new community to define the tasks of interest and the …
speech technology by gathering a new community to define the tasks of interest and the …
De-identification for privacy protection in multimedia content: A survey
S Ribaric, A Ariyaeeinia, N Pavesic - Signal Processing: Image …, 2016 - Elsevier
Privacy is one of the most important social and political issues in our information society,
characterized by a growing range of enabling and supporting technologies and services …
characterized by a growing range of enabling and supporting technologies and services …
Speaker anonymization using x-vector and neural waveform models
The social media revolution has produced a plethora of web services to which users can
easily upload and share multimedia documents. Despite the popularity and convenience of …
easily upload and share multimedia documents. Despite the popularity and convenience of …
Speaker anonymisation using the McAdams coefficient
Anonymisation has the goal of manipulating speech signals in order to degrade the
reliability of automatic approaches to speaker recognition, while preserving other aspects of …
reliability of automatic approaches to speaker recognition, while preserving other aspects of …
Evaluating voice conversion-based privacy protection against informed attackers
BML Srivastava, N Vauquier… - ICASSP 2020-2020 …, 2020 - ieeexplore.ieee.org
Speech data conveys sensitive speaker attributes like identity or accent. With a small
amount of found data, such attributes can be inferred and exploited for malicious purposes …
amount of found data, such attributes can be inferred and exploited for malicious purposes …
[PDF][PDF] Trustworthy autonomous vehicles
D Fernández Llorca, E Gómez - Publications Office of the European Union …, 2021 - invett.es
This report aims to advance the discussion on those fundamental aspects to be considered
in order to have trustworthy Artificial Intelligence (AI) systems in the Automated/Autonomous …
in order to have trustworthy Artificial Intelligence (AI) systems in the Automated/Autonomous …
[HTML][HTML] X-vector anonymization using autoencoders and adversarial training for preserving speech privacy
JM Perero-Codosero, FM Espinoza-Cuadros… - Computer speech & …, 2022 - Elsevier
The rapid increase in web services and mobile apps, which collect personal data from users,
has also increased the risk that their privacy may be severely compromised. In particular, the …
has also increased the risk that their privacy may be severely compromised. In particular, the …
Design choices for x-vector based speaker anonymization
The recently proposed x-vector based anonymization scheme converts any input voice into
that of a random pseudo-speaker. In this paper, we present a flexible pseudo-speaker …
that of a random pseudo-speaker. In this paper, we present a flexible pseudo-speaker …