Hearing Without Listening: Voice Authentication with Privacy
Offered By: Center for Language & Speech Processing(CLSP), JHU via YouTube
Course Description
Overview
Explore the critical issue of privacy in speech processing systems through this insightful lecture by Bhiksha Raj from Carnegie Mellon University. Delve into the challenges of voice authentication systems, where voice prints can be vulnerable to theft or unauthorized use. Learn about innovative approaches to address these privacy concerns, including cryptographic methods and secure binary embeddings. Discover how these techniques aim to enable voice authentication without storing interpretable voice prints, potentially revolutionizing the field of speech processing. Gain valuable insights into the intersection of speech technology, privacy, and security from an expert in automatic speech recognition, audio processing, and machine learning.
Syllabus
Hearing Without Listening: Voice Authentication with Privacy - Bhiksha Raj (CMU) - 2014
Taught by
Center for Language & Speech Processing(CLSP), JHU
Related Courses
Access Controls(ISC)² via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Data Privacy Fundamentals
Northeastern University via Coursera The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy iOS Development: Security
LinkedIn Learning