Privacy–enhancing face biometrics: A comprehensive survey

B Meden, P Rot, P Terhörst, N Damer… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Speaker anonymization using x-vector and neural waveform models

F Fang, X Wang, J Yamagishi, I Echizen… - arXiv preprint arXiv …, 2019 - arxiv.org
The social media revolution has produced a plethora of web services to which users can
easily upload and share multimedia documents. Despite the popularity and convenience of …

Automatic versus human speaker verification: The case of voice mimicry

RG Hautamäki, T Kinnunen, V Hautamäki… - Speech …, 2015 - Elsevier
In this work, we compare the performance of three modern speaker verification systems and
non-expert human listeners in the presence of voice mimicry. Our goal is to gain insights on …

{AuthLoop}:{End-to-End} cryptographic authentication for telephony over voice channels

B Reaves, L Blue, P Traynor - 25th USENIX Security Symposium …, 2016 - usenix.org
Telephones remain a trusted platform for conducting some of our most sensitive exchanges.
From banking to taxes, wide swathes of industry and government rely on telephony as a …

{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls

B Reaves, L Blue, H Abdullah, L Vargas… - 26th USENIX Security …, 2017 - usenix.org
Phones are used to confirm some of our most sensitive transactions. From coordination
between energy providers in the power grid to corroboration of high-value transfers with a …

Biometric identity systems in law enforcement and the politics of (voice) recognition: The case of SiiP

F Jansen, J Sánchez-Monedero… - Big Data & …, 2021 - journals.sagepub.com
Biometric identity systems are now a prominent feature of contemporary law enforcement,
including in Europe. Often advanced on the premise of efficiency and accuracy, they have …

Research of neural network classifier in speaker recognition module for automated system of critical use

MM Bykov, VV Kovtun, A Smolarz… - … , Industry, and High …, 2017 - spiedigitallibrary.org
The article studies the dependence of the quality of speakers recognition by convolutional
neural network from the type of chosen informative features for use it in automated systems …

I know that voice: Identifying the voice actor behind the voice

L Uzan, L Wolf - 2015 International Conference on Biometrics …, 2015 - ieeexplore.ieee.org
Intentional voice modifications by electronic or nonelectronic means challenge automatic
speaker recognition systems. Previous work focused on detecting the act of disguise or …

Speaker anonymization using generative adversarial networks

A Jafari, A Al-Mousa, I Jafar - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The advent use of smart devices has enabled the emergence of many applications that
facilitate user interaction through speech. However, speech reveals private and sensitive …