2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2014
DOI: 10.1109/mipro.2014.6859761
|View full text |Cite
|
Sign up to set email alerts
|

Online speaker de-identification using voice transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…For speech, several classic approaches for speaker anonymization are explored in [31]- [34], while a neural-network-based encoder-decoder approach has been proposed in [35].…”
Section: Cyber Worldmentioning
confidence: 99%
“…For speech, several classic approaches for speaker anonymization are explored in [31]- [34], while a neural-network-based encoder-decoder approach has been proposed in [35].…”
Section: Cyber Worldmentioning
confidence: 99%
“…Both layers are able to identify the speaker and therefore to be anonymized. Advanced voice-based speaker anonymization aims to suppress the speaker identity and is mostly based on voice transformation techniques, changing source, or filter characteristics of the speech (Pobar & Ipšić, 2014). Recent research suggested to use x-vector speaker representations to suppress the timbre of a speaker, and thus hindering the speaker identification (Fang et al, 2019).…”
Section: Anonymization and De-anonymization Techniquesmentioning
confidence: 99%
“…A novel scheme for voice de-identification, where a set of precalculated voice transformations based on GMM mapping is used to de-identify the speech of a new speaker, is presented in [155]. The scheme enables the online de-identification of speakers whose speech has not been used in the training phase to build a voice transformation.…”
Section: Voice De-identificationmentioning
confidence: 99%