{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:01Z","timestamp":1742913001878,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031126994"},{"type":"electronic","value":"9783031127007"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-12700-7_8","type":"book-chapter","created":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T07:01:56Z","timestamp":1721718116000},"page":"72-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Voice Privacy Through Time-Scale and\u00a0Pitch Modification"],"prefix":"10.1007","author":[{"given":"Gauri P.","family":"Prajapati","sequence":"first","affiliation":[]},{"given":"Dipesh K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Hemant A.","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"8_CR1","unstructured":"Introducing voiceprivacy. https:\/\/www.voiceprivacychallenge.org\/. Accessed 15 June 2021"},{"key":"8_CR2","unstructured":"Sox, audio manipulation tool. http:\/\/sox.sourceforge.net\/. Accessed 15 June 2021"},{"issue":"6B","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1121\/1.1913303","volume":"52","author":"BS Atal","year":"1972","unstructured":"Atal, B.S.: Automatic speaker recognition based on pitch contours. J. Acoust. Soc. Am. (JASA) 52(6B), 1687\u20131697 (1972)","journal-title":"J. Acoust. Soc. Am. (JASA)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Fang, F., et al.: Speaker anonymization using x-vector and neural waveform models. In: Speech Synthesis Workshop (SSW), 20\u201322 September 2019, pp. 155\u2013160 (2019)","DOI":"10.21437\/SSW.2019-28"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Jin, Q., Toth, A.R., Schultz, T., Black, A.W.: Speaker de-identification via voice transformation. In: IEEE Workshop on Automatic Speech Recognition & Understanding (ASRU), Merano, Italy, 13\u201317 December 2009, pp. 529\u2013533 (2009)","DOI":"10.1109\/ASRU.2009.5373356"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Kanda, N., Takeda, R., Obuchi, Y.: Elastic spectral distortion for low resource speech recognition with deep neural networks. In: IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU), Olomouc, Czech Republic, 8\u201313 December 2013, pp. 309\u2013314 (2013)","DOI":"10.1109\/ASRU.2013.6707748"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Ko, T., Peddinti, V., Povey, D., Khudanpur, S.: Audio augmentation for speech recognition. In: INTERSPEECH, Dresden, Germany, 6\u201310 September 2015 (2015)","DOI":"10.21437\/Interspeech.2015-711"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Lin, Q., Jan, E.E., Che, C., Yuk, D.S., Flanagan, J.: Selective use of the speech spectrum and a vqgmm method for speaker identification. In: Proceeding of $$4^{th}$$ International Conference on Spoken Language Processing. ICSLP 1996, 3\u20136 October 1996, vol.\u00a04, pp. 2415\u20132418. IEEE, Philadelphia (1996)","DOI":"10.21437\/ICSLP.1996-606"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Mawalim, C.O., Galajit, K., Karnjana, J., Unoki, M.: X-vector singular value modification and statistical-based decomposition with ensemble regression modeling for speaker anonymization system. In: INTERSPEECH, pp. 1703\u20131707 (2020)","DOI":"10.21437\/Interspeech.2020-1887"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Nautsch, A., Jasserand, C., Kindt, E., Todisco, M., Trancoso, I., Evans, N.: The GDPR and speech data: Reflections of legal and technology communities, first steps towards a common understanding. In: INTERSPEECH, 15\u201319 September 2019, pp. 3695\u20133699 (2019)","DOI":"10.21437\/Interspeech.2019-2647"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.csl.2019.06.001","volume":"58","author":"A Nautsch","year":"2019","unstructured":"Nautsch, A., et al.: Preserving privacy in speaker and speech characterization. Comput. Speech Lang. 58, 441\u2013480 (2019)","journal-title":"Comput. Speech Lang."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"No\u00e9, P.G., Bonastre, J.F., Matrouf, D., Tomashenko, N., Nautsch, A., Evans, N.: Speech pseudonymisation assessment using voice similarity matrices. In: INTERSPEECH, 25\u201329 October 2020, pp. 1718\u20131722 (2020)","DOI":"10.21437\/Interspeech.2020-2720"},{"key":"8_CR13","unstructured":"Oppenheim, A.V.: Discrete-Time Signal Processing. Pearson Education India (1999)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Panayotov, V., Chen, G., Povey, D., Khudanpur, S.: Librispeech: an ASR corpus based on public domain audio books. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Queensland, Australia, 19\u201324 April 2015, pp. 5206\u20135210 (2015)","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Patino, J., Tomashenko, N., Todisco, M., Nautsch, A., Evans, N.: Speaker anonymisation using the mcadams coefficient. arXiv preprint arXiv:2011.01130 (2020). Accessed 15 May 2021","DOI":"10.21437\/Interspeech.2021-1070"},{"key":"8_CR16","unstructured":"Povey, D., et\u00a0al.: The kaldi speech recognition toolkit. In: IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU). No. CONF, Big Island, Hawaii, USA, 11\u201315 December 2011 (2011)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Qian, J., Du, H., Hou, J., Chen, L., Jung, T., Li, X.Y.: Hidebehind: enjoy voice input with voiceprint unclonability and anonymity. In: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, Shenzhen, China, November 2018, pp. 82\u201394 (2018)","DOI":"10.1145\/3274783.3274855"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Srivastava, B.M.L., Vauquier, N., Sahidullah, M., Bellet, A., Tommasi, M., Vincent, E.: Evaluating voice conversion-based privacy protection against informed attackers. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2802\u20132806 (2020)","DOI":"10.1109\/ICASSP40776.2020.9053868"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Stylianou, Y.: Voice transformation: a survey. In: International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Taipei, Taiwan, 19\u201324 April 2009, pp. 3585\u20133588 (2009)","DOI":"10.1109\/ICASSP.2009.4960401"},{"key":"8_CR20","unstructured":"Tomashenko, N., et\u00a0al.: The VoicePrivacy 2020 challenge evaluation plan. https:\/\/www.voiceprivacychallenge.org\/docs\/VoicePrivacy_2020_Eval_Plan_v1_3.pdf. Accessed 15 May 2021"},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/0167-6393(95)00044-5","volume":"18","author":"R Veldhuis","year":"1996","unstructured":"Veldhuis, R., He, H.: Time-scale and pitch modifications of speech signals and resynthesis from the discrete short-time Fourier transform. Speech Commun. 18(3), 257\u2013282 (1996)","journal-title":"Speech Commun."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Verhelst, W., Roelands, M.: An overlap-add technique based on waveform similarity (WSOLA) for high quality time-scale modification of speech. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Minneapolis, Minnesota, USA, 27\u201330 April 1993, vol.\u00a02, pp. 554\u2013557 (1993)","DOI":"10.1109\/ICASSP.1993.319366"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Wang, X., Yamagishi, J.: Neural harmonic-plus-noise waveform model with trainable maximum voice frequency for text-to-speech synthesis. In: Speech Synthesis Workshop (SSW), 20\u201322 September 2019, pp.\u00a01\u20136 (2019)","DOI":"10.21437\/SSW.2019-1"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, S.X., Gong, Y., Yu, D.: Encrypted speech recognition using deep polynomial networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 12\u201317 May 2019, pp. 5691\u20135695 (2019)","DOI":"10.1109\/ICASSP.2019.8683721"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-12700-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T16:25:38Z","timestamp":1732465538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-12700-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031126994","9783031127007"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-12700-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"24 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PReMI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition and Machine Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"premi2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isical.ac.in\/~premi21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}