Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Hidebehind: Enjoy voice input with voiceprint unclonability and anonymity
We are speeding toward a not-too-distant future when we can perform human-computer
interaction using solely our voice. Speech recognition is the key technology that powers …
interaction using solely our voice. Speech recognition is the key technology that powers …
Adversarial disentanglement of speaker representation for attribute-driven privacy preservation
PG Noé, M Mohammadamini, D Matrouf… - ar** on the small screen. Speech recognition is the key technology …
Towards privacy-preserving speech data publishing
Privacy-preserving data publishing has been a heated research topic in the last decade.
Numerous ingenious attacks on users' privacy and defensive measures have been …
Numerous ingenious attacks on users' privacy and defensive measures have been …
Speech sanitizer: Speech content desensitization and voice anonymization
Voice input users' speech recordings are being collected by service providers and shared
with third parties, who may abuse users' voiceprints, identify them by voice, and learn their …
with third parties, who may abuse users' voiceprints, identify them by voice, and learn their …
Privacy-preserving PLDA speaker verification using outsourced secure computation
The usage of biometric recognition has become prevalent in various verification processes,
ranging from unlocking mobile devices to verifying bank transactions. Automatic speaker …
ranging from unlocking mobile devices to verifying bank transactions. Automatic speaker …
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications
in pattern recognition. In some of these applications, such as speaker recognition, the …
in pattern recognition. In some of these applications, such as speaker recognition, the …
Over-the-air tv detection using mobile devices
We introduce a mobile sensing technique to detect a nearby active television, the channel it
is tuned to, and whether it is receiving this channel over the air or not. This technique can …
is tuned to, and whether it is receiving this channel over the air or not. This technique can …
Oblivious maximum bipartite matching size algorithm with applications to secure fingerprint identification
M Blanton, S Saraph - … --ESORICS 2015: 20th European Symposium on …, 2015 - Springer
The increasing availability and use of biometric data leads to situations when sensitive
biometric data is to be handled by entities who may not be fully trusted or otherwise are not …
biometric data is to be handled by entities who may not be fully trusted or otherwise are not …