Interspeech 2020 2020
DOI: 10.21437/interspeech.2020-2692
|View full text |Cite
|
Sign up to set email alerts
|

Design Choices for X-Vector Based Speaker Anonymization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…The experiments done in [2,14] showed that black and grey-box attackers can easily be fooled when enrollment speech and trial speech are anonymized in a different manner, i.e. by selecting the x-vector in different regions, applying the F0 linear transformation and random gender selection.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The experiments done in [2,14] showed that black and grey-box attackers can easily be fooled when enrollment speech and trial speech are anonymized in a different manner, i.e. by selecting the x-vector in different regions, applying the F0 linear transformation and random gender selection.…”
Section: Discussionmentioning
confidence: 99%
“…To select the target pseudo-speaker identity, module B (from Figure 1) has many hyper-parameters that affect the selection mechanism. According to [2,13,14], the best anonymization results are achieved by picking the pseudo-speaker in a dense region of the x-vector space, randomly targeting male or female gender pseudo-speaker, and modifying the F0 values of the input speech so that it matches the F0 statistics of the real speakers used to generate the pseudoidentity.…”
Section: Design Choices For Anonymizationmentioning
confidence: 99%
“…speaker identity) while leaving linguistic content intact. Most of the proposed works focus on protecting/anonymizing speaker identity using voice conversion (VC) mechanisms [8,9,10]. These VC methods, however, aim to protect the speaker identity against different linkage attacks limited by the attacker's knowledge [11].…”
Section: Privacy-preserving Voice Analyticsmentioning
confidence: 99%
“…Finally, the original linguistic features, pitch, and anonymised x-vectors were used to synthesise anonymised speech by means of neural acoustic and waveform models. More details on B1 development are available in [2,3,11].…”
Section: Anonymisation Systemsmentioning
confidence: 99%