International audienceThe recently proposed x-vector based anonymization scheme converts any input voice into that of a random pseudo-speaker. In this paper, we present a flexible pseudo-speaker selection technique as a baseline for the first VoicePrivacy Challenge. We explore several design choices for the distance metric between speakers, the region of x-vector space where the pseudo-speaker is picked, and gender selection. To assess the strength of anonymization achieved, we consider attackers using an x-vector based speaker verification system who may use original or anonymized speech for enrollment, depending on their knowledge of the anonymization scheme. The Equal Error Rate (EER) achieved by the attackers and the decoding Word Error...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
Speaker anonymization methods are a growing research area, due to the common use of voice interfaces...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Speech data on the Internet are proliferating exponentially because of the emergence of social media...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThe recently proposed x-vector based anonymization scheme converts any input v...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceWe study the scenario where individuals (speakers) contribute to the publicati...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceIn the scenario of the Voice Privacy challenge, anonymization is achieved by c...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
Speaker anonymization methods are a growing research area, due to the common use of voice interfaces...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Speech data on the Internet are proliferating exponentially because of the emergence of social media...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceSharing real-world speech utterances is key to the training and deployment of ...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...
International audienceThis paper presents the results and analyses stemming from the first VoicePriv...