International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With a small amount of found data, such attributes can be inferred and exploited for malicious purposes: voice cloning, spoofing, etc. Anonymization aims to make the data unlinkable, i.e., ensure that no utterance can be linked to its original speaker. In this paper, we investigate anonymization methods based on voice conversion. In contrast to prior work, we argue that various linkage attacks can be designed depending on the attackers' knowledge about the anonymization scheme. We compare two frequency warping-based conversion methods and a deep learning based method in three attack scenarios. The utility of converted speech is measured via the w...
International audienceThis paper explores various attack scenarios on a voice anonymization system u...
As voice interfaces become more widely available they increasingly implement speaker recognition, to...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
Sharing real-world speech utterances is key to the training and deployment of voice-based services. ...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...
International audienceSpeech data carries a range of personal information, such as the speaker's ide...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
Voice conversion – the methodology of automatically convert-ing one’s utterances to sound as if spok...
International audienceThis paper explores various attack scenarios on a voice anonymization system u...
As voice interfaces become more widely available they increasingly implement speaker recognition, to...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
Sharing real-world speech utterances is key to the training and deployment of voice-based services. ...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...
International audienceSpeech data carries a range of personal information, such as the speaker's ide...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
Voice conversion – the methodology of automatically convert-ing one’s utterances to sound as if spok...
International audienceThis paper explores various attack scenarios on a voice anonymization system u...
As voice interfaces become more widely available they increasingly implement speaker recognition, to...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...