The University of Southampton
University of Southampton Institutional Repository

Revisiting speech content privacy

Revisiting speech content privacy
Revisiting speech content privacy
In this paper, we discuss an important aspect of speech privacy: protecting spoken content. New capabilities from the field of machine learning provide a unique and timely opportunity to revisit speech content protection. There are many different applications of content privacy, even though this area has been under-explored in speech technology research. This paper presents several scenarios that indicate a need for speech content privacy even as the specific techniques to achieve content privacy may necessarily vary. Our discussion includes several different types of content privacy including recoverable and non-recoverable content. Finally, we introduce evaluation strategies as well as describe some of the difficulties that may be encountered.
eess.AS
Williams, Jennifer
3a1568b4-8a0b-41d2-8635-14fe69fbb360
Yamagishi, Junichi
be32bcf4-56b2-4664-a417-a837abb07d35
Noe, Paul-Gauthier
94afe056-3442-429e-a900-df9522be3237
Botinhao, Cassia Valentini
f5266f79-9c1b-4567-9b8f-1a700061d16d
Bonastre, Jean-Francois
e883efcf-93aa-4483-b1c4-55c7c2442240
Williams, Jennifer
3a1568b4-8a0b-41d2-8635-14fe69fbb360
Yamagishi, Junichi
be32bcf4-56b2-4664-a417-a837abb07d35
Noe, Paul-Gauthier
94afe056-3442-429e-a900-df9522be3237
Botinhao, Cassia Valentini
f5266f79-9c1b-4567-9b8f-1a700061d16d
Bonastre, Jean-Francois
e883efcf-93aa-4483-b1c4-55c7c2442240

[Unknown type: UNSPECIFIED]

Record type: UNSPECIFIED

Abstract

In this paper, we discuss an important aspect of speech privacy: protecting spoken content. New capabilities from the field of machine learning provide a unique and timely opportunity to revisit speech content protection. There are many different applications of content privacy, even though this area has been under-explored in speech technology research. This paper presents several scenarios that indicate a need for speech content privacy even as the specific techniques to achieve content privacy may necessarily vary. Our discussion includes several different types of content privacy including recoverable and non-recoverable content. Finally, we introduce evaluation strategies as well as describe some of the difficulties that may be encountered.

Text
2110.06760v1 - Author's Original
Download (878kB)

More information

Published date: 13 October 2021
Additional Information: Accepted to ISCA Security and Privacy in Speech Communication (1st SPSC Symposium)
Keywords: eess.AS

Identifiers

Local EPrints ID: 469147
URI: http://eprints.soton.ac.uk/id/eprint/469147
PURE UUID: b6c1a213-404b-4e6b-b9b5-52531c893874
ORCID for Jennifer Williams: ORCID iD orcid.org/0000-0003-1410-0427

Catalogue record

Date deposited: 07 Sep 2022 17:40
Last modified: 17 Mar 2024 04:12

Export record

Altmetrics

Contributors

Author: Jennifer Williams ORCID iD
Author: Junichi Yamagishi
Author: Paul-Gauthier Noe
Author: Cassia Valentini Botinhao
Author: Jean-Francois Bonastre

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×