International audienceWe study the scenario where individuals (speakers) contribute to the publication of an anonymized speech corpus. Data users then leverage this public corpus to perform downstream tasks (such as training automatic speech recognition systems), while attackers may try to de-anonymize itbased on auxiliary knowledge they collect. Motivated by this scenario, speaker anonymization aims to conceal the speaker identity while preserving the quality and usefulness of speech data. In this paper, we study x-vector based speaker anonymization, the leading approach in the recent Voice Privacy Challenge, which converts an input utterance into that of a random pseudo-speaker. We show that the strength of the anonymization varies signif...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Privacy and security are major concerns when communicating speech signals to cloud services such as ...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
Sharing real-world speech utterances is key to the training and deployment of voice-based services. ...
Speech data on the Internet are proliferating exponentially because of the emergence of social media...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceSpeech data carries a range of personal information, such as the speaker's ide...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Privacy and security are major concerns when communicating speech signals to cloud services such as ...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
Sharing real-world speech utterances is key to the training and deployment of voice-based services. ...
Speech data on the Internet are proliferating exponentially because of the emergence of social media...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceSpeech data carries a range of personal information, such as the speaker's ide...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Privacy and security are major concerns when communicating speech signals to cloud services such as ...
International audiencePrivacy preservation calls for speech anonymization methods which hide the spe...