Speaker anonymization using x-vector and neural waveform models

F Fang, X Wang, J Yamagishi, I Echizen… - arXiv preprint arXiv …, 2019 - arxiv.org
The social media revolution has produced a plethora of web services to which users can
easily upload and share multimedia documents. Despite the popularity and convenience of …

Privacy and utility of x-vector based speaker anonymization

BML Srivastava, M Maouche… - … on Audio, Speech …, 2022 - ieeexplore.ieee.org
We study the scenario where individuals (speakers) contribute to the publication of an
anonymized speech corpus. Data users leverage this public corpus for downstream tasks …

[HTML][HTML] X-vector anonymization using autoencoders and adversarial training for preserving speech privacy

JM Perero-Codosero, FM Espinoza-Cuadros… - Computer speech & …, 2022 - Elsevier
The rapid increase in web services and mobile apps, which collect personal data from users,
has also increased the risk that their privacy may be severely compromised. In particular, the …

Design choices for x-vector based speaker anonymization

BML Srivastava, N Tomashenko, X Wang… - arXiv preprint arXiv …, 2020 - arxiv.org
The recently proposed x-vector based anonymization scheme converts any input voice into
that of a random pseudo-speaker. In this paper, we present a flexible pseudo-speaker …

Speaker anonymisation using the McAdams coefficient

J Patino, N Tomashenko, M Todisco, A Nautsch… - arXiv preprint arXiv …, 2020 - arxiv.org
Anonymisation has the goal of manipulating speech signals in order to degrade the
reliability of automatic approaches to speaker recognition, while preserving other aspects of …

Differentially private speaker anonymization

AS Shamsabadi, BML Srivastava, A Bellet… - arXiv preprint arXiv …, 2022 - arxiv.org
Sharing real-world speech utterances is key to the training and deployment of voice-based
services. However, it also raises privacy risks as speech contains a wealth of personal data …

Evaluating voice conversion-based privacy protection against informed attackers

BML Srivastava, N Vauquier… - ICASSP 2020-2020 …, 2020 - ieeexplore.ieee.org
Speech data conveys sensitive speaker attributes like identity or accent. With a small
amount of found data, such attributes can be inferred and exploited for malicious purposes …

Privacy-preserving adversarial representation learning in ASR: Reality or illusion?

BML Srivastava, A Bellet, M Tommasi… - arXiv preprint arXiv …, 2019 - arxiv.org
Automatic speech recognition (ASR) is a key technology in many services and applications.
This typically requires user devices to send their speech data to the cloud for ASR decoding …

Speaker de-identification via voice transformation

Q Jin, AR Toth, T Schultz… - 2009 IEEE Workshop on …, 2009 - ieeexplore.ieee.org
It is a common feature of modern automated voice-driven applications and services to record
and transmit a user's spoken request. At the same time, several domains and applications …

Privacy implications of voice and speech analysis–information disclosure by inference

JL Kröger, OHM Lutz, P Raschke - … Management. Data for Better Living: AI …, 2020 - Springer
Internet-connected devices, such as smartphones, smartwatches, and laptops, have become
ubiquitous in modern life, reaching ever deeper into our private spheres. Among the sensors …