Publications associées (48)

Evaluating the Robustness of Privacy-Sensitive Audio Features for Speech Detection in Personal Audio Log Scenarios

Hervé Bourlard, Daniel Gatica-Perez, Sree Hari Krishnan Parthasarathi

Personal audio logs are often recorded in multiple environments. This poses challenges for robust front-end processing, including speech/nonspeech detection (SND). Motivated by this, we investigate the robustness of four different privacy-sensitive feature ...
Idiap2010

Evaluating the Robustness of Privacy-Sensitive Audio Features for Speech Detection in Personal Audio Log Scenarios

Hervé Bourlard, Daniel Gatica-Perez, Sree Hari Krishnan Parthasarathi

Personal audio logs are often recorded in multiple environments. This poses challenges for robust front-end processing, including speech/nonspeech detection (SND). Motivated by this, we investigate the robustness of four different privacy-sensitive feature ...
2010

Efficient Deniable Authentication for Signatures, Application to Machine-Readable Travel Document

Serge Vaudenay, Jean Monnerat, Sylvain Pasini

Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicious verifier to transfer the proof to anyone else. It is for instance the cas ...
Springer Berlin / Heidelberg2009

Investigating Privacy-Sensitive Features for Speech Detection in Multiparty Conversations

Hervé Bourlard, Daniel Gatica-Perez, Sree Hari Krishnan Parthasarathi

We investigate four different privacy-sensitive features, namely energy, zero crossing rate, spectral flatness, and kurtosis, for speech detection in multiparty conversations. We liken this scenario to a meeting room and define our datasets and annotations ...
2009

Investigating Privacy-Sensitive Features for Speech Detection in Multiparty Conversations

Hervé Bourlard, Daniel Gatica-Perez, Sree Hari Krishnan Parthasarathi

We investigate four different privacy-sensitive features, namely energy, zero crossing rate, spectral flatness, and kurtosis, for speech detection in multiparty conversations. We liken this scenario to a meeting room and define our datasets and annotations ...
Idiap2009

Traceable Privacy of Recent Provably-Secure RFID Protocols

Khaled Ouafi

One of the main challenges in RFIDs is the design of privacy-preserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring th ...
Springer2008

On Privacy Models for RFID

Serge Vaudenay

We provide a formal model for identification schemes. Under this model, we give strong definitions for security and privacy. Our model captures the notion of a powerful adversary who can monitor all communications, trace tags within a limited period of tim ...
Springer-Verlag2007

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.