Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems 2018
DOI: 10.1145/3274783.3274855
|View full text |Cite
|
Sign up to set email alerts
|

Hidebehind

Abstract: We are speeding toward a not-too-distant future when we can perform human-computer interaction using solely our voice. Speech recognition is the key technology that powers voice input, and it is usually outsourced to the cloud for the best performance. However, user privacy is at risk because voiceprints are directly exposed to the cloud, which gives rise to security issues such as spoof attacks on speaker authentication systems. Additionally, it may cause privacy issues as well, for instance, the speech conte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(9 citation statements)
references
References 43 publications
0
9
0
Order By: Relevance
“…We proposed that oral communication should increase perceived identifiability, consequently decreasing verbal disclosure propensity. We suggest that marketers interested in counteracting this deterrent of verbal disclosure may want to consider implementing techniques devised to "sanitize" consumers' voice input of its identifying characteristics in real time (e.g., Qian et al 2018). Such techniques entail altering consumers' voice locally (i.e., on the device), such that their voice print is no longer recognizable, while maintaining Smith 2018).…”
Section: Verbal Disclosure Implicationsmentioning
confidence: 99%
“…We proposed that oral communication should increase perceived identifiability, consequently decreasing verbal disclosure propensity. We suggest that marketers interested in counteracting this deterrent of verbal disclosure may want to consider implementing techniques devised to "sanitize" consumers' voice input of its identifying characteristics in real time (e.g., Qian et al 2018). Such techniques entail altering consumers' voice locally (i.e., on the device), such that their voice print is no longer recognizable, while maintaining Smith 2018).…”
Section: Verbal Disclosure Implicationsmentioning
confidence: 99%
“…speaker identity) while leaving linguistic content intact. Most of the proposed works focus on protecting/anonymizing speaker identity using voice conversion (VC) mechanisms [8,9,10]. These VC methods, however, aim to protect the speaker identity against different linkage attacks limited by the attacker's knowledge [11].…”
Section: Privacy-preserving Voice Analyticsmentioning
confidence: 99%
“…In [61] Nautsch et al investigate the importance of the development of privacy-preserving technologies to protect speech signals and highlight the importance of applying these technologies to protect speakers and speech characterization in recordings. Some recent works have sought to protect speaker identity [67], gender identity [33] and emotion [2]. VoiceMask, for example, was proposed to mitigate the security and privacy risks of voice input on mobile devices by concealing voiceprints [67].…”
Section: Related Workmentioning
confidence: 99%
“…Some recent works have sought to protect speaker identity [67], gender identity [33] and emotion [2]. VoiceMask, for example, was proposed to mitigate the security and privacy risks of voice input on mobile devices by concealing voiceprints [67]. It aims to strengthen users' identity privacy by sanitizing the voice signal received from the microphone and then sending the perturbed speech to the voice input apps or the cloud.…”
Section: Related Workmentioning
confidence: 99%