Revisiting speech content privacy
Revisiting speech content privacy
In this paper, we discuss an important aspect of speech privacy: protecting spoken content. New capabilities from the field of machine learning provide a unique and timely opportunity to revisit speech content protection. There are many different applications of content privacy, even though this area has been under-explored in speech technology research. This paper presents several scenarios that indicate a need for speech content privacy even as the specific techniques to achieve content privacy may necessarily vary. Our discussion includes several different types of content privacy including recoverable and non-recoverable content. Finally, we introduce evaluation strategies as well as describe some of the difficulties that may be encountered.
eess.AS
Williams, Jennifer
3a1568b4-8a0b-41d2-8635-14fe69fbb360
Yamagishi, Junichi
be32bcf4-56b2-4664-a417-a837abb07d35
Noe, Paul-Gauthier
94afe056-3442-429e-a900-df9522be3237
Botinhao, Cassia Valentini
f5266f79-9c1b-4567-9b8f-1a700061d16d
Bonastre, Jean-Francois
e883efcf-93aa-4483-b1c4-55c7c2442240
13 October 2021
Williams, Jennifer
3a1568b4-8a0b-41d2-8635-14fe69fbb360
Yamagishi, Junichi
be32bcf4-56b2-4664-a417-a837abb07d35
Noe, Paul-Gauthier
94afe056-3442-429e-a900-df9522be3237
Botinhao, Cassia Valentini
f5266f79-9c1b-4567-9b8f-1a700061d16d
Bonastre, Jean-Francois
e883efcf-93aa-4483-b1c4-55c7c2442240
[Unknown type: UNSPECIFIED]
Abstract
In this paper, we discuss an important aspect of speech privacy: protecting spoken content. New capabilities from the field of machine learning provide a unique and timely opportunity to revisit speech content protection. There are many different applications of content privacy, even though this area has been under-explored in speech technology research. This paper presents several scenarios that indicate a need for speech content privacy even as the specific techniques to achieve content privacy may necessarily vary. Our discussion includes several different types of content privacy including recoverable and non-recoverable content. Finally, we introduce evaluation strategies as well as describe some of the difficulties that may be encountered.
Text
2110.06760v1
- Author's Original
More information
Published date: 13 October 2021
Additional Information:
Accepted to ISCA Security and Privacy in Speech Communication (1st SPSC Symposium)
Keywords:
eess.AS
Identifiers
Local EPrints ID: 469147
URI: http://eprints.soton.ac.uk/id/eprint/469147
PURE UUID: b6c1a213-404b-4e6b-b9b5-52531c893874
Catalogue record
Date deposited: 07 Sep 2022 17:40
Last modified: 17 Mar 2024 04:12
Export record
Altmetrics
Contributors
Author:
Jennifer Williams
Author:
Junichi Yamagishi
Author:
Paul-Gauthier Noe
Author:
Cassia Valentini Botinhao
Author:
Jean-Francois Bonastre
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics