Hearing Without Listening: Voice Authentication with Privacy
Offered By: Center for Language & Speech Processing(CLSP), JHU via YouTube
Course Description
Overview
Explore the critical issue of privacy in speech processing systems through this insightful lecture by Bhiksha Raj from Carnegie Mellon University. Delve into the challenges of voice authentication systems, where voice prints can be vulnerable to theft or unauthorized use. Learn about innovative approaches to address these privacy concerns, including cryptographic methods and secure binary embeddings. Discover how these techniques aim to enable voice authentication without storing interpretable voice prints, potentially revolutionizing the field of speech processing. Gain valuable insights into the intersection of speech technology, privacy, and security from an expert in automatic speech recognition, audio processing, and machine learning.
Syllabus
Hearing Without Listening: Voice Authentication with Privacy - Bhiksha Raj (CMU) - 2014
Taught by
Center for Language & Speech Processing(CLSP), JHU
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera