Privacy-preserving Query-by-Example Speech Search (original) (raw)
Related papers
Privacy preserving encrypted phonetic search of speech data
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Speaker Verification using Secure Binary Embeddings
Privacy-preserving speaker verification using secure binary embeddings
2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014
Secure Binary Embeddings of Front-end Factor Analysis for Privacy Preserving Speaker Verification
A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services
Privacy-preserving Speaker Authentication
Preserving Privacy in Speaker and Speech Characterisation
Computer Speech & Language
Secure binary embeddings for privacy preserving nearest neighbors
2011
Towards Privacy-Preserving Speech Data Publishing
Prϵϵch: A System for Privacy-Preserving Speech Transcription
2019
Privacy‐preserving speaker verification system based on binary I‐vectors
IET Biometrics, 2021
Efficient Similarity Search over Encrypted Data
Pr$\epsilon\epsilon$ch: A System for Privacy-Preserving Speech Transcription
2019
Bio-metric Encryption of Data Using Voice Recognition
Automation, Control and Intelligent Systems, 2021
Privacy-preserving speaker verification as password matching
2012
Privacy-Preserving Important Passage Retrieval
Privacy-Preserving Multi-keyword Top-k Ranked Similarity Search Over Encrypted Data
International Journal of Advance Research in Computer Science and Management Studies [IJARCSMS] ijarcsms.com, 2020
Speech biometric mapping for key binding cryptosystem
Sensing Technologies for Global Health, Military Medicine, Disaster Response, and Environmental Monitoring; and Biometric Technology for Human Identification VIII, 2011
Uncovering spoken phrases in encrypted voice over IP conversations
ACM Transactions on …, 2010
Speech biometric mapping for key binding cryptosystem
SPIE Proceedings, 2011
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation
Interspeech 2019
Attacking a privacy preserving music matching algorithm
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2012