A survey on differential privacy for unstructured data content

Y Zhao, J Chen - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …

Deep learning methods in speaker recognition: a review

D Sztahó, G Szaszák, A Beke - arXiv preprint arXiv:1911.06615, 2019 - arxiv.org
This paper summarizes the applied deep learning practices in the field of speaker
recognition, both verification and identification. Speaker recognition has been a widely used …

The VoicePrivacy 2024 Challenge Evaluation Plan

N Tomashenko, X Miao, P Champion, S Meyer… - arXiv preprint arXiv …, 2024 - arxiv.org
The task of the challenge is to develop a voice anonymization system for speech data which
conceals the speaker's voice identity while protecting linguistic content and emotional states …

Introducing the VoicePrivacy initiative

N Tomashenko, BML Srivastava, X Wang… - arXiv preprint arXiv …, 2020 - arxiv.org
The VoicePrivacy initiative aims to promote the development of privacy preservation tools for
speech technology by gathering a new community to define the tasks of interest and the …

Speaker anonymisation using the McAdams coefficient

J Patino, N Tomashenko, M Todisco, A Nautsch… - arXiv preprint arXiv …, 2020 - arxiv.org
Anonymisation has the goal of manipulating speech signals in order to degrade the
reliability of automatic approaches to speaker recognition, while preserving other aspects of …

Evaluating voice conversion-based privacy protection against informed attackers

BML Srivastava, N Vauquier… - ICASSP 2020-2020 …, 2020 - ieeexplore.ieee.org
Speech data conveys sensitive speaker attributes like identity or accent. With a small
amount of found data, such attributes can be inferred and exploited for malicious purposes …

[HTML][HTML] X-vector anonymization using autoencoders and adversarial training for preserving speech privacy

JM Perero-Codosero, FM Espinoza-Cuadros… - Computer speech & …, 2022 - Elsevier
The rapid increase in web services and mobile apps, which collect personal data from users,
has also increased the risk that their privacy may be severely compromised. In particular, the …

{V-Cloak}: Intelligibility-, Naturalness-& {Timbre-Preserving}{Real-Time} Voice Anonymization

J Deng, F Teng, Y Chen, X Chen, Z Wang… - 32nd USENIX Security …, 2023 - usenix.org
Voice data generated on instant messaging or social media applications contains unique
user voiceprints that may be abused by malicious adversaries for identity inference or …

Design choices for x-vector based speaker anonymization

BML Srivastava, N Tomashenko, X Wang… - arXiv preprint arXiv …, 2020 - arxiv.org
The recently proposed x-vector based anonymization scheme converts any input voice into
that of a random pseudo-speaker. In this paper, we present a flexible pseudo-speaker …

An engineering view on emotions and speech: From analysis and predictive models to responsible human-centered applications

CC Lee, T Chaspari, EM Provost… - Proceedings of the …, 2023 - ieeexplore.ieee.org
The substantial growth of Internet-of-Things technology and the ubiquity of smartphone
devices has increased the public and industry focus on speech emotion recognition (SER) …