YoVDO

Hearing Without Listening: Voice Authentication with Privacy

Offered By: Center for Language & Speech Processing(CLSP), JHU via YouTube

Tags

Privacy Courses Machine Learning Courses Cryptography Courses Audio Processing Courses Locality-Sensitive Hashing Courses Biometrics Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of privacy in speech processing systems through this insightful lecture by Bhiksha Raj from Carnegie Mellon University. Delve into the challenges of voice authentication systems, where voice prints can be vulnerable to theft or unauthorized use. Learn about innovative approaches to address these privacy concerns, including cryptographic methods and secure binary embeddings. Discover how these techniques aim to enable voice authentication without storing interpretable voice prints, potentially revolutionizing the field of speech processing. Gain valuable insights into the intersection of speech technology, privacy, and security from an expert in automatic speech recognition, audio processing, and machine learning.

Syllabus

Hearing Without Listening: Voice Authentication with Privacy - Bhiksha Raj (CMU) - 2014


Taught by

Center for Language & Speech Processing(CLSP), JHU

Related Courses

Access Controls
(ISC)² via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Data Privacy Fundamentals
Northeastern University via Coursera
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
iOS Development: Security
LinkedIn Learning