Abstract
A ubiquitous networked society, in which all electronic equipment including “sensors” are connected to a network and are able to communicate with one another to share information, will shortly become a reality. Although sensor information is most important in such a network, it does include a large amount of privacy information and therefore it is preferable not to send raw information across the network. In this paper, we focus on privacy protection for speech, where privacy information in speech is defined as the “speaker’s characteristics” and “linguistic privacy information.” We set out to protect privacy information by using “voice conversion” and “deletion of privacy linguistic information from the results of speech recognition.” However, since speech recognition technology is not robust enough in real environments, “speech elimination” technique is also considered. In this paper, we focus mainly on the evaluation of speech elimination and voice conversion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Minoh, M., Kakusho, K., Babaguchi, N., Ajisaka, T.: Sensing Web Project - How to handle privacy information in sensor data. In: Proc. 12th International Conference on Information Processing and Management Uncertainty in Knowledge-Based Systems (IPMU 2008), pp. 863–869 (2008)
Kobayashi, D., Kajita, S., Takeda, K., Itakura, F.: Extracting speech features from human speech-like noise. In: Proc. ICSLP 1996, vol. 1, pp. 418–421 (1996)
Impedovo, D., Refice, M.: Multiple speaker models and their combination in access control tasks. Journal of Information Assurance and Security 4(4), 346–353 (2009)
Yamamoto, K., Nakagawa, S.: Privacy protection for speech information. Journal of Information Assurance and Security 5(1), 284–292 (2010)
Ito, K., et al.: JNAS: Japanese speech corpus for large vocabulary continuous speech recognition research. Journal of the Acoustical Society of Japan (E) 20(3), 199–206 (1999)
Hirsch, H., Pearce, D.: The AURORA experimental framework for the performance evaluation of speech recognition systems under noisy conditions. In: Proc. ISCA ITRW ASR 2000 on Automatic Speech Recognition: Challenges for the next Millennium (2000)
Childers, D.G., Yegnanarayana, B., Wu, K.: Voice conversion: factors responsible for quality. In: Proc. ICASSP 1985, pp. 748–751 (1985)
Arslan, L.M., Talkin, D.: Voice conversion by codebook mapping of line spectral frequencies and excitation spectrum. In: Proc. EUROSPEECH 1997, pp. 1347–1350 (1995)
Stylianou, Y., Cappe, O., Moulines, E.: Continuous probabilistic transform for voice conversion. IEEE Trans. on Speech and Audio Processing 6(2), 131–142 (1998)
Toda, T., Black, A.W., Tokuda, K.: Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory. IEEE Trans. on Audio, Speech, and Language Processing 15(8), 2222–2235 (2007)
Matsumoto, H., Moroto, M.: Evaluation of Mel-LPC cepstrum in a large vocabulary continuous speech recognition. In: Proc. ICASSP 2001, vol. 1, pp. 117–120 (2001)
Imai, S., Sumita, K., Furuichi, C.: Mel log spectrum approximation (MLSA) filter for speech synthesis. Electronics and Communications in Japan (Part I: Communications) 66(2), 10–18 (1983)
Kawahara, H.: STRAIGHT, Exploration of the other aspect of VOCODER: Perceptually isomorphic decomposition of speech sounds. Acoustic Science and Technology 27(6), 349–353 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yamamoto, K., Nakagawa, S. (2010). Evaluation of Privacy Protection Techniques for Speech Signals. In: Hüllermeier, E., Kruse, R., Hoffmann, F. (eds) Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications. IPMU 2010. Communications in Computer and Information Science, vol 81. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14058-7_67
Download citation
DOI: https://doi.org/10.1007/978-3-642-14058-7_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14057-0
Online ISBN: 978-3-642-14058-7
eBook Packages: Computer ScienceComputer Science (R0)