[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Abstract

A ubiquitous networked society, in which all electronic equipment including “sensors” are connected to a network and are able to communicate with one another to share information, will shortly become a reality. Although sensor information is most important in such a network, it does include a large amount of privacy information and therefore it is preferable not to send raw information across the network. In this paper, we focus on privacy protection for speech, where privacy information in speech is defined as the “speaker’s characteristics” and “linguistic privacy information.” We set out to protect privacy information by using “voice conversion” and “deletion of privacy linguistic information from the results of speech recognition.” However, since speech recognition technology is not robust enough in real environments, “speech elimination” technique is also considered. In this paper, we focus mainly on the evaluation of speech elimination and voice conversion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Minoh, M., Kakusho, K., Babaguchi, N., Ajisaka, T.: Sensing Web Project - How to handle privacy information in sensor data. In: Proc. 12th International Conference on Information Processing and Management Uncertainty in Knowledge-Based Systems (IPMU 2008), pp. 863–869 (2008)

    Google Scholar 

  2. Kobayashi, D., Kajita, S., Takeda, K., Itakura, F.: Extracting speech features from human speech-like noise. In: Proc. ICSLP 1996, vol. 1, pp. 418–421 (1996)

    Google Scholar 

  3. Impedovo, D., Refice, M.: Multiple speaker models and their combination in access control tasks. Journal of Information Assurance and Security 4(4), 346–353 (2009)

    Google Scholar 

  4. Yamamoto, K., Nakagawa, S.: Privacy protection for speech information. Journal of Information Assurance and Security 5(1), 284–292 (2010)

    Google Scholar 

  5. Ito, K., et al.: JNAS: Japanese speech corpus for large vocabulary continuous speech recognition research. Journal of the Acoustical Society of Japan (E) 20(3), 199–206 (1999)

    Google Scholar 

  6. Hirsch, H., Pearce, D.: The AURORA experimental framework for the performance evaluation of speech recognition systems under noisy conditions. In: Proc. ISCA ITRW ASR 2000 on Automatic Speech Recognition: Challenges for the next Millennium (2000)

    Google Scholar 

  7. Childers, D.G., Yegnanarayana, B., Wu, K.: Voice conversion: factors responsible for quality. In: Proc. ICASSP 1985, pp. 748–751 (1985)

    Google Scholar 

  8. Arslan, L.M., Talkin, D.: Voice conversion by codebook mapping of line spectral frequencies and excitation spectrum. In: Proc. EUROSPEECH 1997, pp. 1347–1350 (1995)

    Google Scholar 

  9. Stylianou, Y., Cappe, O., Moulines, E.: Continuous probabilistic transform for voice conversion. IEEE Trans. on Speech and Audio Processing 6(2), 131–142 (1998)

    Article  Google Scholar 

  10. Toda, T., Black, A.W., Tokuda, K.: Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory. IEEE Trans. on Audio, Speech, and Language Processing 15(8), 2222–2235 (2007)

    Article  Google Scholar 

  11. Matsumoto, H., Moroto, M.: Evaluation of Mel-LPC cepstrum in a large vocabulary continuous speech recognition. In: Proc. ICASSP 2001, vol. 1, pp. 117–120 (2001)

    Google Scholar 

  12. Imai, S., Sumita, K., Furuichi, C.: Mel log spectrum approximation (MLSA) filter for speech synthesis. Electronics and Communications in Japan (Part I: Communications) 66(2), 10–18 (1983)

    Article  Google Scholar 

  13. Kawahara, H.: STRAIGHT, Exploration of the other aspect of VOCODER: Perceptually isomorphic decomposition of speech sounds. Acoustic Science and Technology 27(6), 349–353 (2006)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yamamoto, K., Nakagawa, S. (2010). Evaluation of Privacy Protection Techniques for Speech Signals. In: Hüllermeier, E., Kruse, R., Hoffmann, F. (eds) Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications. IPMU 2010. Communications in Computer and Information Science, vol 81. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14058-7_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14058-7_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14057-0

  • Online ISBN: 978-3-642-14058-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics