Speaker identification features extraction methods: A systematic review

SS Tirumala, SR Shahamiri, AS Garhwal… - Expert Systems with …, 2017 - Elsevier
Speaker Identification (SI) is the process of identifying the speaker from a given utterance by
comparing the voice biometrics of the utterance with those utterance models stored …

Privacy–enhancing face biometrics: A comprehensive survey

B Meden, P Rot, P Terhörst, N Damer… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …

Introducing the VoicePrivacy initiative

N Tomashenko, BML Srivastava, X Wang… - arXiv preprint arXiv …, 2020 - arxiv.org
The VoicePrivacy initiative aims to promote the development of privacy preservation tools for
speech technology by gathering a new community to define the tasks of interest and the …

De-identification for privacy protection in multimedia content: A survey

S Ribaric, A Ariyaeeinia, N Pavesic - Signal Processing: Image …, 2016 - Elsevier
Privacy is one of the most important social and political issues in our information society,
characterized by a growing range of enabling and supporting technologies and services …

Speaker anonymization using x-vector and neural waveform models

F Fang, X Wang, J Yamagishi, I Echizen… - arXiv preprint arXiv …, 2019 - arxiv.org
The social media revolution has produced a plethora of web services to which users can
easily upload and share multimedia documents. Despite the popularity and convenience of …

Speaker anonymisation using the McAdams coefficient

J Patino, N Tomashenko, M Todisco, A Nautsch… - arXiv preprint arXiv …, 2020 - arxiv.org
Anonymisation has the goal of manipulating speech signals in order to degrade the
reliability of automatic approaches to speaker recognition, while preserving other aspects of …

Evaluating voice conversion-based privacy protection against informed attackers

BML Srivastava, N Vauquier… - ICASSP 2020-2020 …, 2020 - ieeexplore.ieee.org
Speech data conveys sensitive speaker attributes like identity or accent. With a small
amount of found data, such attributes can be inferred and exploited for malicious purposes …

[PDF][PDF] Trustworthy autonomous vehicles

D Fernández Llorca, E Gómez - Publications Office of the European Union …, 2021 - invett.es
This report aims to advance the discussion on those fundamental aspects to be considered
in order to have trustworthy Artificial Intelligence (AI) systems in the Automated/Autonomous …

[HTML][HTML] X-vector anonymization using autoencoders and adversarial training for preserving speech privacy

JM Perero-Codosero, FM Espinoza-Cuadros… - Computer speech & …, 2022 - Elsevier
The rapid increase in web services and mobile apps, which collect personal data from users,
has also increased the risk that their privacy may be severely compromised. In particular, the …

Design choices for x-vector based speaker anonymization

BML Srivastava, N Tomashenko, X Wang… - arXiv preprint arXiv …, 2020 - arxiv.org
The recently proposed x-vector based anonymization scheme converts any input voice into
that of a random pseudo-speaker. In this paper, we present a flexible pseudo-speaker …