Gauri P. Prajapati's research while affiliated with Dhirubhai Ambani Institute of Information and Communication Technology and other places

Publications (6)

Chapter
Attempts to spoof an ASV (voice biometric system) have been successful in the past due to the advent of technologies. However, despite the development of various countermeasures for each spoofing attack, there is an urgent need for a versatile countermeasure. Hence, designing a voice privacy system has become crucial. Moreover, the energy losses in...
Article
Extensive use of Intelligent Personal Assistants (IPA) and biometrics in our day-to-day life asks for privacy preservation while dealing with personal data. To that effect, efforts have been made to preserve the personally identifiable characteristics from human voice using different speaker anonymization techniques. In this paper, we propose Cycle...
Conference Paper
Full-text available
Speaker's identity is the most crucial information exploited (implicitly) by an Automatic Speaker Verification (ASV) system. Numerous attacks can be obliterated simultaneously if privacy preservation is exercised for a speaker's identity. The baseline of the Voice Privacy Challenge 2020 by INTER-SPEECH uses the Linear Prediction (LP) model of speec...

Citations

... Specifically, they altered the pole angles of the linear prediction (LP) spectral envelope via the McAdams coefficient [51]. Gupta et al. [29] improved this work by modifying both the pole angles and the pole radii of the LP spectral envelope. Although these parameter manipulations are perceptually reasonable, speaker information can be easily recovered by machine learning-based attacks, such as training an ASI or ASV system on transformed speech [71]. ...
... Trust in voice assistant technology and service providers, is fundamental, especially for non-users [2,3,4]. Recently, many studies on voice anonymization have been initiated (e.g., Prajapati et al. [5]). Especially regarding increasing user acceptance and trust, anonymization represents a promising approach. ...
... Several speaker anonymization systems use adversarial autoencoders or GANs to improve voice privacy. However, they use them to either disentangle multiple private attributes like sex and accent in addition to identity in order to increase control in anonymization [18,28] -and even to change an attribute like sex but keeping the original identity [26] -, or to disentangle the speaker information from the speech without using explicit speaker embeddings [24]. Although GANs have been applied to speaker embeddings for data augmentation [29], to our knowledge, no work has yet attempted to use this for speaker anonymization by mimicking the properties of the original speaker vector space in order to sample artificial yet natural-like embeddings. ...
... To detect the first-and second-order replay attacks, Malik et al. developed an antispoofing framework combining the acoustic ternary patterns Gammatone cepstral coefficient features and multiclass SVM classifier [32]. Prajapati et al. designed a replay voice detection system for voice assistants using the energy separation method and the Gaussian mixture model (GMM) classifier [33]. Furthermore,in this application the combination of Teager energy cepstrum coefficients (TECC) feature and classifier (GMM or light CNN) was considered [34]. ...