Addressing challenges in speaker anonymization to maintain utility while ensuring privacy of pathological speech

S Tayebi Arasteh, T Arias-Vergara… - Communications …, 2024 - nature.com
Background Integration of speech into healthcare has intensified privacy concerns due to its
potential as a non-invasive biomarker containing individual biometric information. In …

Vocoder drift in x-vector-based speaker anonymization

M Panariello, M Todisco, N Evans - arxiv preprint arxiv:2306.02892, 2023 - arxiv.org
State-of-the-art approaches to speaker anonymization typically employ some form of
perturbation function to conceal speaker information contained within an x-vector …

The First VoicePrivacy Attacker Challenge Evaluation Plan

N Tomashenko, X Miao, E Vincent… - arxiv preprint arxiv …, 2024 - arxiv.org
The First VoicePrivacy Attacker Challenge is a new kind of challenge organized as part of
the VoicePrivacy initiative and supported by ICASSP 2025 as the SP Grand Challenge It …

Anonymizing speech: Evaluating and designing speaker anonymization techniques

P Champion - arxiv preprint arxiv:2308.04455, 2023 - arxiv.org
The growing use of voice user interfaces has led to a surge in the collection and storage of
speech data. While data collection allows for the development of efficient tools powering …

Speaker Anonymization: Disentangling Speaker Features from Pre-Trained Speech Embeddings for Voice Conversion

M Matassoni, S Fong, A Brutti - Applied Sciences, 2024 - mdpi.com
Speech is a crucial source of personal information, and the risk of attackers using such
information increases day by day. Speaker privacy protection is crucial, and various …

The Impact of Speech Anonymization on Pathology and Its Limits

ST Arasteh, T Arias-Vergara, PA Pérez-Toro… - arxiv preprint arxiv …, 2024 - arxiv.org
Integration of speech into healthcare has intensified privacy concerns due to its potential as
a non-invasive biomarker containing individual biometric information. In response, speaker …

[PDF][PDF] Robustness of Signal Processing-Based Pseudonymization Method Against Decryption Attack.

H Kai, S Takamichi, S Shiota, H Kiya - Odyssey, 2022 - isca-archive.org
In this paper, we propose a framework for evaluating the robustness of speech
pseudonymization methods. Among privacy-protecting methods, signal processing-based …

Privacy-preserving speaker verification system using Ranking-of-Element hashing

HH Nguyen-Le, L Tran, DSA Nguyen, NA Le-Khac… - Pattern Recognition, 2025 - Elsevier
The advancements in automatic speaker recognition have led to the exploration of voice
data for verification systems. This raises concerns about the security of storing voice …

Attaques par reconstruction de données biométriques comportementales à l'aide d'alignements d'embeddings

T Thebaud - 2022 - theses.hal.science
La protection des données personnelles est un devoir éthique et légal en Europe. Les
systèmes d'authentification biométriques sont naturellement concernés: ils utilisent des …

パラメータ最適化を用いた信号処理による仮名化手法の復号攻撃に対するロバスト性評価

甲斐優人, 高道慎之介, 塩田さやか… - 研究報告音声言語情報 …, 2022 - ipsj.ixsq.nii.ac.jp
論文抄録 本研究では, 音声データのプライバシー保護法の一つである信号処理を用いた音声仮名
化の復号攻撃に対するロバスト性評価について報告する. 音声仮名化とは, 音声データから本来の …