Добірка наукової літератури з теми "Anonymisation de la voix"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Anonymisation de la voix".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Anonymisation de la voix":
Nunan, Daniel, and MariaLaura Di Domenico. "Exploring Reidentification Risk: Is Anonymisation a Promise we can Keep?" International Journal of Market Research 58, no. 1 (January 2016): 19–34. http://dx.doi.org/10.2501/ijmr-2016-004.
Rock, Frances. "Policy and Practice in the Anonymisation of Linguistic Data." International Journal of Corpus Linguistics 6, no. 1 (December 17, 2001): 1–26. http://dx.doi.org/10.1075/ijcl.6.1.01roc.
Dubois, Pierre. "Voix naturelle, voix dénaturée, voix maîtrisée." Sillages critiques, no. 7 (April 1, 2005): 27–48. http://dx.doi.org/10.4000/sillagescritiques.1030.
Porge, Erik. "Les voix, la voix." Essaim 26, no. 1 (2011): 7. http://dx.doi.org/10.3917/ess.026.0007.
Gillie, Claire. "« Voix crues, voix dévoyées »." Insistance 4, no. 1 (2010): 121. http://dx.doi.org/10.3917/insi.004.0121.
Jacquin, Danielle. "Les autobiographies gaéliques : voix personnelle, voix collective, voix mythique." Études irlandaises 23, no. 1 (1998): 13–25. http://dx.doi.org/10.3406/irlan.1998.1426.
de Haro-Olmo, Francisco José, Ángel Jesús Varela-Vaca, and José Antonio Álvarez-Bermejo. "Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review." Sensors 20, no. 24 (December 14, 2020): 7171. http://dx.doi.org/10.3390/s20247171.
Grau, Bernardo Cuenca, and Egor V. Kostylev. "Logical Foundations of Linked Data Anonymisation." Journal of Artificial Intelligence Research 64 (February 16, 2019): 253–314. http://dx.doi.org/10.1613/jair.1.11355.
MOUREY, Laurent. "Une voix pleine de voix." Le français aujourd'hui 150, no. 3 (2005): 71. http://dx.doi.org/10.3917/lfa.150.0071.
Bissoondath, Neil. "Voix." Études littéraires 39, no. 3 (2008): 103. http://dx.doi.org/10.7202/037615ar.
Дисертації з теми "Anonymisation de la voix":
Srivastava, Brij Mohan Lal. "Anonymisation du locuteur : représentation, évaluation et garanties formelles." Thesis, Université de Lille (2018-2021), 2021. https://pepite-depot.univ-lille.fr/LIBRE/EDMADIS/2021/2021LILUB029.pdf.
Large-scale centralized storage of speech data poses severe privacy threats to the speakers. Indeed, the emergence and widespread usage of voice interfaces starting from telephone to mobile applications, and now digital assistants have enabled easier communication between the customers and the service providers. Massive speech data collection allows its users, for instance researchers, to develop tools for human convenience, like voice passwords for banking, personalized smart speakers, etc. However, centralized storage is vulnerable to cybersecurity threats which, when combined with advanced speech technologies like voice cloning, speaker recognition, and spoofing, may endow a malicious entity with the capability to re-identify speakers and breach their privacy by gaining access to their sensitive biometric characteristics, emotional states, personality attributes, pathological conditions, etc.Individuals and the members of civil society worldwide, and especially in Europe, are getting aware of this threat. With firm backing by the GDPR, several initiatives are being launched, including the publication of white papers and guidelines, to spread mass awareness and to regulate voice data so that the citizens' privacy is protected.This thesis is a timely effort to bolster such initiatives and propose solutions to remove the biometric identity of speakers from speech signals, thereby rendering them useless for re-identifying the speakers who spoke them.Besides the goal of protecting the speaker's identity from malicious access, this thesis aims to explore the solutions which do so without degrading the usefulness of speech.We present several anonymization schemes based on voice conversion methods to achieve this two-fold objective. The output of such schemes is a high-quality speech signal that is usable for publication and a variety of downstream tasks.All the schemes are subjected to a rigorous evaluation protocol which is one of the major contributions of this thesis.This protocol led to the finding that the previous approaches do not effectively protect the privacy and thereby directly inspired the VoicePrivacy initiative which is an effort to gather individuals, industry, and the scientific community to participate in building a robust anonymization scheme.We introduce a range of anonymization schemes under the purview of the VoicePrivacy initiative and empirically prove their superiority in terms of privacy protection and utility.Finally, we endeavor to remove the residual speaker identity from the anonymized speech signal using the techniques inspired by differential privacy. Such techniques provide provable analytical guarantees to the proposed anonymization schemes and open up promising perspectives for future research.In practice, the tools developed in this thesis are an essential component to build trust in any software ecosystem where voice data is stored, transmitted, processed, or published. They aim to help the organizations to comply with the rules mandated by civil governments and give a choice to individuals who wish to exercise their right to privacy
Dongo, Escalante Irvin Franco Benito. "Anonymisation de documents RDF." Thesis, Pau, 2017. http://www.theses.fr/2017PAUU3045/document.
With the advance of the Semantic Web and the Open Linked Data initiatives, a huge quantity of RDF data is available on Internet. The goal is to make this data readable for humans and machines, adopting special formats and connecting them by using International Resource Identifiers (IRIs), which are abstractions of real resources of the world. As more data is published and shared, sensitive information is also provided. In consequence, the privacy of entities of interest (e.g., people, companies) is a real challenge, requiring special techniques to ensure privacy and adequate security over data available in an environment in which every user has access to the information without any restriction (Web). Then, three main aspects are considered to ensure entity protection: (i) Preserve privacy, by identifying and treating the data that can compromise the privacy of the entities (e.g., identifiers, quasi-identifiers); (ii) Identify utility of the public data for diverse applications (e.g., statistics, testing, research); and (iii) Model background knowledge that can be used for adversaries (e.g., number of relationships, a specific relationship, information of a node). Anonymization is one technique for privacy protection that has been successfully applied in practice for databases and graph structures. However, studies about anonymization in the context of RDF data, are really limited. These studies are initial works for protecting individuals on RDF data, since they show a practical anonymization approach for simple scenarios as the use of generalization and suppression operations based on hierarchies. However, for complex scenarios, where a diversity of data is presented, the existing anonymization approaches does not ensure an enough privacy. Thus, in this context, we propose an anonymization framework, which analyzes the neighbors according to the background knowledge, focused on the privacy of entities represented as nodes in the RDF data. Our anonymization approach is able to provide better privacy, since it takes into account the l-diversity condition as well as the neighbors (nodes and edges) of entities of interest. Also, an automatic anonymization process is provided by the use of anonymization operations associated to the datatypes
Cohen-Hadria, Alice. "Estimation de descriptions musicales et sonores par apprentissage profond." Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS607.
In Music Information Retrieval (MIR) and voice processing, the use of machine learning tools has become in the last few years more and more standard. Especially, many state-of-the-art systems now rely on the use of Neural Networks.In this thesis, we propose a wide overview of four different MIR and voice processing tasks, using systems built with neural networks. More precisely, we will use convolutional neural networks, an image designed class neural networks. The first task presented is music structure estimation. For this task, we will show how the choice of input representation can be critical, when using convolutional neural networks. The second task is singing voice detection. We will present how to use a voice detection system to automatically align lyrics and audio tracks.With this alignment mechanism, we have created the largest synchronized audio and speech data set, called DALI. Singing voice separation is the third task. For this task, we will present a data augmentation strategy, a way to significantly increase the size of a training set. Finally, we tackle voice anonymization. We will present an anonymization method that both obfuscate content and mask the speaker identity, while preserving the acoustic scene
Martínez, Lluís Sergio. "Ontology based semantic anonymisation of microdata." Doctoral thesis, Universitat Rovira i Virgili, 2013. http://hdl.handle.net/10803/108961.
L’explotació de microdades compilades pels Instituts d’Estadística és de gran interès per la comunitat de mineria de dades. No obstant, aquest tipus de dades sovint inclouen informació sensible que pot ser, directa o indirectament, relacionada amb els individus. Per tant, es necessita fer un procés d’anonimització apropiat per minimitzar el risc de revelació de les identitats i/o les dades confidencials. En el passat, molts mètodes d’anonimització han estat desenvolupats per tractar dades numèriques, però els enfocaments que aborden l’anonimització de dades no numèriques (per exemple dades categòriques) són escassos i superficials. Com que la utilitat d’aquest tipus de dades està properament relacionada amb la preservació del seu significat, en aquest treball, s’utilitza la noció de similitud semàntica per aconseguir una interpretació semàntica coherent. Les ontologies són el pilar basic per proposar un entorn de treball semàntic que permeti el manegament i transformació d’atributs categòrics, definint diversos operadors que tenen en compte la semàntica subjacent dels valors de les dades. La aplicació dels operadors definits en aquest entorn de treball semàntic per tasques d’anonimització, permet el desenvolupament de tres mètodes dissenyats especialment per atributs categòrics: Recodificació semàntica, Microagregació adaptativa i Remostreig semàntic. A més, es proposa un nou mètode d’enllaçaments de registres, el qual considera la semàntica de les dades amb la finalitat d’avaluar d’una forma més precisa el risc de revelació de les dades no numèriques anonimitzades. Els mètodes proposats han sigut avaluats extensament amb conjunts de dades reals amb resultats encoratjadors. Els resultats experimentals mostren que el tractament basat en la semàntica d’atributs categòrics millora significativament la interpretabilitat semàntica i la utilitat de les dades anonimitzades.
La explotación de microdatos compilados por los Institutos de Estadística es de gran interés para la comunidad de minería de datos. No obstante, este tipo de datos frecuentemente incluyen información sensible que puede ser, directa o indirectamente, relacionada con los individuos. Por tanto, se necesita realizar un proceso de anonimización apropiado para minimizar el riesgo de revelación de las identidades y/o los datos confidenciales. En el pasado, muchos métodos de anonimización han sido desarrollados para tratar datos numéricos, pero los enfoques que abordan la anonimización de datos no numéricos (por ejemplo datos categóricos) son escasos y superficiales. Como que la utilidad de este tipo de datos está cercanamente relacionada con la preservación de su significado, en este trabajo se utiliza la noción de similitud semántica para conseguir una interpretación semántica coherente. Las ontologías son el pilar básico para proponer un entorno de trabajo semántico que permita el manejo y transformación de atributos categóricos, definiendo diversos operadores que tienen en cuenta la semántica subyacente de los valores de los datos. La aplicación de los operadores definidos en este entorno de trabajo semántico para tareas de anonimización, permite el desarrollo de tres métodos diseñados especialmente para atributos categóricos: Recodificación semántica, Microagregación adaptativa y Remuestreo semántico. Además, se propone un nuevo método de enlazamiento de registros, el cual considera la semántica de los datos con la finalidad de evaluar de una forma más precisa el riesgo de revelación de loa datos no numéricos anonimizados. Los métodos propuestos han sido evaluados extensamente con conjuntos de datos reales con resultados alentadores. Los resultados experimentales muestran que el tratamiento basado en la semántica de atributos categóricos mejora significativamente la interpretabilidad semántica y la utilidad de los datos anonimizados.
APRUZZESE, HELENE. "Analyse acoustique objective de la voix apres laryngectomie totale : voix oesophagienne et voix d'implant phonatoire." Lyon 1, 1993. http://www.theses.fr/1993LYO1M178.
Perreve, Clotilde. "La voix de l'indicible. Etude metapsychologique de la "voix autistique"." Paris 7, 1999. http://www.theses.fr/1999PA070015.
To study the voice in the silence of its expression reveals a new origin of language. Such a study replaces an examination of the sign as defined by philosophers and musicians during the classical period, and implies a modification of the language of the unconscious, considered until now as a sign by freud and as a signifier by lacan. The combined historical and psychoanalytical points of view identify the gesture in this construction, and put in question the psychoanalytical status of representation. The clinical study of the voice in autistic muteness leads us to reconsider the content of metapsychology. Through the bipolarity of the sound gesture and the soundless gesture, subnitted to the rhythm of encounter, and of primitive, submitted to the rhythm of encounter, and of primitive violence, a duo of passion is organized, wich in its paroxysm, extends to scream. This new language of the unconscious does not refer to representation but to voice. Thus voice finds itself located begoud the image, within the space of the vocal. Through this space, we are able to construct a vocal mirror, in wich the voice becomes an echo of desire, as a primitive, vocal writing of the psyche, and thus modifies the basis of the unconscious
Chetty, Nirvashnee. "Privacy preserving data anonymisation: an experimental examination of customer data for POPI compliance in South Africa." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32448.
Ly, Antoine. "Algorithmes de machine learning en assurance : solvabilité, textmining, anonymisation et transparence." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC2030/document.
In summer 2013, the term "Big Data" appeared and attracted a lot of interest from companies. This thesis examines the contribution of these methods to actuarial science. It addresses both theoretical and practical issues on high-potential themes such as textit{Optical Character Recognition} (OCR), text analysis, data anonymization and model interpretability. Starting with the application of machine learning methods in the calculation of economic capital, we then try to better illustrate the boundary that may exist between automatic learning and statistics. Highlighting certain advantages and different techniques, we then study the application of deep neural networks in the optical analysis of documents and text, once extracted. The use of complex methods and the implementation of the General Data Protection Regulation (GDPR) in 2018 led us to study its potential impacts on pricing models. By applying anonymization methods to pure premium calculation models in non-life insurance, we explored different generalization approaches based on unsupervised learning. Finally, as regulations also impose criteria in terms of model explanation, we conclude with a general study of methods that now allow a better understanding of complex methods such as neural networks
Folest, Estelle. "Shakespeare et la voix." Phd thesis, Université de la Sorbonne nouvelle - Paris III, 2009. http://tel.archives-ouvertes.fr/tel-00485954.
Fraj, Samia. "Synthèse des voix pathologiques." Doctoral thesis, Universite Libre de Bruxelles, 2010. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210158.
Les troubles simulés sont la gigue vocale, le tremblement vocal, la biphonation, la diplophonie et les vibrations aléatoires. Le shimmy vocal résulte de la distorsion de modulation dans le conduit vocal qui transforme la gigue en shimmy vocal. Le souffle est synthétisé par la modulation d’un bruit Brownien.
Des expériences préliminaires ont montré la capacité du synthétiseur à produire différentes catégories de voyelles. Pour la validation, nous avons utilisé des modèles de troubles simulés. Les résultats des expériences d’évaluations perceptives, portant sur des corpus de stimuli synthétiques ou humains, modales ou dysphoniques, sont encourageants et montrent la capacité du synthétiseur à produire des voix aussi bien modales que troublées avec des timbres indiscernables des humains. Enfin, les résultats d’une expérience d’exploitation concernant la classification des stimuli synthétiques selon les échelles ordinales GRB suggèrent que troubles simulés et évaluations perceptives concordent. Aussi, les scores perceptifs prédits à partir des paramètres de contrôle du synthétiseur et les scores attribués par des experts sont fortement corrélés.
Doctorat en Sciences de l'ingénieur
info:eu-repo/semantics/nonPublished
Книги з теми "Anonymisation de la voix":
Métellus, Jean. Voix nègres, voix rebelles. Pantin: Temps des cerises, 2000.
Fassié, Pierre. Voix d'exécution. La Chaux-de-Fonds: Editions VWA, 1985.
Métellus, Jean. Voix nègres. Solignac: Le Bruit des autres, 1992.
Chedid, Andrée. Voix multiple. Marseille: Sud, 1990.
Huche, François Le. La voix. 3rd ed. Paris: Masson, 2001.
Makanin, Vladimir. Les voix. Aix-en-Provence: Alinéa, 1988.
Tremblay, Marguerite. La voix. Sainte-Antoine de Tilly, Québec: Virage, 1992.
Voynet, Dominique. Voix off. Paris: Stock, 2003.
Beausoleil, Claude. L'autre voix. Trois-Rivières, Québec: Écrits des Forges, 2011.
Podalydès, Denis. Voix off. [Paris]: Mercure de France, 2008.
Частини книг з теми "Anonymisation de la voix":
Zhang, Ge, and Simone Fischer-Hübner. "Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks." In Communications and Multimedia Security, 130–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13241-4_13.
Nurmi, Juha, and Mikko S. Niemelä. "Tor De-anonymisation Techniques." In Network and System Security, 657–71. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_52.
Biville, Frédérique. "Voix des dieux, voix des hommes, voix des animaux." In Instrumenta Patristica et Mediaevalia, 745–61. Turnhout: Brepols Publishers, 2017. http://dx.doi.org/10.1484/m.ipm-eb.5.114550.
Loukides, Grigorios, Achilles Tziatzios, and Jianhua Shao. "Towards Preference-Constrained k-Anonymisation." In Database Systems for Advanced Applications, 231–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04205-8_20.
Martínez, Sergio, Aida Valls, and David Sánchez. "Semantic Anonymisation of Categorical Datasets." In Studies in Computational Intelligence, 111–28. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09885-2_7.
Stockinger, Thomas. "Voix perdues?" In Kultur und Praxis der Wahlen, 293–314. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-16098-2_13.
Bassi, Eleonora, David Leoni, Stefano Leucci, Juan Pane, and Lorenzino Vaccari. "Opening Public Deliberations: Transparency, Privacy, Anonymisation." In Lecture Notes in Computer Science, 41–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45960-7_4.
B.K., Tripathy, Kumaran K., and Panda G.K. "An Improved l-Diversity Anonymisation Algorithm." In Communications in Computer and Information Science, 81–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_10.
Ortega-Fernandez, Ines, Sara El Kortbi Martinez, and Lilian Adkinson Orellana. "Large Scale Data Anonymisation for GDPR Compliance." In Big Data and Artificial Intelligence in Digital Finance, 325–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-94590-9_19.
Patel, Namrata, Pierre Accorsi, Diana Inkpen, Cédric Lopez, and Mathieu Roche. "Approaches of Anonymisation of an SMS Corpus." In Computational Linguistics and Intelligent Text Processing, 77–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37247-6_7.
Тези доповідей конференцій з теми "Anonymisation de la voix":
Choujaa, Driss, and Naranker Dulay. "Towards context-aware face anonymisation." In the 7th International Conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1543137.1543166.
Vaijayanthi, S., G. Vinochandrika, and R. Maheswari. "Aide-d-voix (vision through speech)." In HEALTHCOM 2006 8th International Conference on e-Health Networking, Applications and Services. IEEE, 2006. http://dx.doi.org/10.1109/health.2006.246466.
Suire, Alexandre, Michel Raymond, and Melissa Barkat-Defradas. "Voix et sélection sexuelle : une approche interdisciplinaire." In XXXIIe Journées d’Études sur la Parole. ISCA: ISCA, 2018. http://dx.doi.org/10.21437/jep.2018-48.
Radulovic, Filip, Raúl García-Castro, and Asunción Gómez-Pérez. "Towards the Anonymisation of RDF Data." In The 27th International Conference on Software Engineering and Knowledge Engineering. KSI Research Inc. and Knowledge Systems Institute Graduate School, 2015. http://dx.doi.org/10.18293/seke2015-167.
Okuno, Tomotaka, Masatsugu Ichino, Tetsuji Kuboyama, and Hiroshi Yoshiura. "Content-Based De-anonymisation of Tweets." In 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2011. http://dx.doi.org/10.1109/iihmsp.2011.57.
"Semantic Anonymisation of Set-valued Data." In International Conference on Agents and Artificial Intelligence. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0004811901020112.
Patino, Jose, Natalia Tomashenko, Massimiliano Todisco, Andreas Nautsch, and Nicholas Evans. "Speaker Anonymisation Using the McAdams Coefficient." In Interspeech 2021. ISCA: ISCA, 2021. http://dx.doi.org/10.21437/interspeech.2021-1070.
Sun, Xiaoxun, Hua Wang, and Jiuyong Li. "Injecting purpose and trust into data anonymisation." In Proceeding of the 18th ACM conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1645953.1646166.
Richter, Timo, Stephan Escher, Dagmar Schönfeld, and Thorsten Strufe. "Forensic Analysis and Anonymisation of Printed Documents." In IH&MMSec '18: 6th ACM Workshop on Information Hiding and Multimedia Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3206004.3206019.
Tripathy, B. K., A. Maity, B. Ranajit, and D. Chowdhuri. "A fast p-sensitive l-diversity Anonymisation algorithm." In 2011 IEEE Recent Advances in Intelligent Computational Systems (RAICS). IEEE, 2011. http://dx.doi.org/10.1109/raics.2011.6069408.
Звіти організацій з теми "Anonymisation de la voix":
Zhang, Wei, Hagar ElDidi, Kimberly A. Swallow, Ruth Suseela Meinzen-Dick, Claudia Ringler, Yuta Masuda, and Allison Aldous. La gestion communautaire des ressources en eau douce: Un guide du practicien pour appliquer la théorie TNC de la Voix, du Choix et de l’Action. Washington, DC: International Food Policy Research Institute, 2020. http://dx.doi.org/10.2499/p15738coll2.133689.