YoVDO

Hearing Without Listening: Voice Authentication with Privacy

Offered By: Center for Language & Speech Processing(CLSP), JHU via YouTube

Tags

Privacy Courses Machine Learning Courses Cryptography Courses Audio Processing Courses Locality-Sensitive Hashing Courses Biometrics Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of privacy in speech processing systems through this insightful lecture by Bhiksha Raj from Carnegie Mellon University. Delve into the challenges of voice authentication systems, where voice prints can be vulnerable to theft or unauthorized use. Learn about innovative approaches to address these privacy concerns, including cryptographic methods and secure binary embeddings. Discover how these techniques aim to enable voice authentication without storing interpretable voice prints, potentially revolutionizing the field of speech processing. Gain valuable insights into the intersection of speech technology, privacy, and security from an expert in automatic speech recognition, audio processing, and machine learning.

Syllabus

Hearing Without Listening: Voice Authentication with Privacy - Bhiksha Raj (CMU) - 2014


Taught by

Center for Language & Speech Processing(CLSP), JHU

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera