• Title/Summary/Keyword: Speech privacy

Search Result 27, Processing Time 0.024 seconds

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Enhancing Speech Recognition with Whisper-tiny Model: A Scalable Keyword Spotting Approach (Whisper-tiny 모델을 활용한 음성 분류 개선: 확장 가능한 키워드 스팟팅 접근법)

  • Shivani Sanjay Kolekar;Hyeonseok Jin;Kyungbaek Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.774-776
    • /
    • 2024
  • The effective implementation of advanced speech recognition (ASR) systems necessitates the deployment of sophisticated keyword spotting models that are both responsive and resource-efficient. The initial local detection of user interactions is crucial as it allows for the selective transmission of audio data to cloud services, thereby reducing operational costs and mitigating privacy risks associated with continuous data streaming. In this paper, we address these needs and propose utilizing the Whisper-Tiny model with fine-tuning process to specifically recognize keywords from google speech dataset which includes 65000 audio clips of keyword commands. By adapting the model's encoder and appending a lightweight classification head, we ensure that it operates within the limited resource constraints of local devices. The proposed model achieves the notable test accuracy of 92.94%. This architecture demonstrates the efficiency as on-device model with stringent resources leading to enhanced accessibility in everyday speech recognition applications.

A Thought on the Right to Be Forgotten Articulated in the European Commission's Proposal for General Data Protection Regulation (유럽연합(EU) 정보보호법(General Data Protection Regulation)개정안상의 잊혀질 권리와 현행 우리 법의 규율 체계 및 앞으로의 입법방향에 관한 소고)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.87-92
    • /
    • 2012
  • In the early 2012, European Union proposed new legal framework, including the right to be forgotten, for the protection of personal data. The new Proposal articulates kind of sweeping new privacy right and there has been debates on its potential threat to free speech in the digital age. While the situation is similar in Korea, I want to introduce the right to be forgotten in the Proposal. Then, I will analyze current legal system in Korea regarding the new privacy right and suggest some guidelines in searching direction for the coming legislation with respect to the right to be forgotten. The right to be forgotten should not have been promulgated without considering fully its effect on the free speech, especially in the society where the voice toward direct democracy or movement toward participation of the citizen, mainly through cyber space or Social Network Services, has risen much higher in Korea. Especially, the new right seems not to cover the control of data subject on a third party where the third party expressing his opinion by posting himself other's personal data on his blog or others.

Experimental study of reverberation time in ship's public area (선박의 공용구역 잔향시간의 실험적 연구)

  • Kim, Taemoo;Choi, Choongyoung;Park, Nojun;Park, JeanHyung;Kwun, Hyuk
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.242-242
    • /
    • 2013
  • Recently, importance of working environment is increased in commercial vessel and offshore structure. Marine facility design and ambient environment condition are influenced to enhancing human performance and reducing human errors. Consequently, the quality of accommodation where offshore facility crews sleep, eat and relax will influence their job performance and overall sense of comport and well-being. Therefore, adequate acoustic isolation between adjacent spaces is normally required to achieve satisfactory internal noise levels, acoustic privacy and speech intelligibility. In this study, the reverberation time is investigated in the public areas where there are not provided the information of material's noise reduction coefficient (NRC). The experiment of reverberation time is rarely performed for the various type public areas in a marine structure. Therefore, the reverberation time in a vessel is investigate in order to evaluate the room's noise reduction coefficient (NRC) in a public area.

  • PDF

An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS

  • Liu, Yuling;Wu, Jiao;Chen, Xianyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1553-1567
    • /
    • 2021
  • Steganography is a current hot research topic in the area of information security and privacy protection. However, most previous steganography methods are not effective against steganalysis and attacks because they are usually carried out by modifying covers. In this paper, we propose an improved coverless text steganography algorithm based on pretreatment and Part of Speech (POS), in which, Chinese character components are used as the locating marks, then the POS is used to hide the number of keywords, the retrieval of stego-texts is optimized by pretreatment finally. The experiment is verified that our algorithm performs well in terms of embedding capacity, the embedding success rate, and extracting accuracy, with appropriate lengths of locating marks and the large scale of the text database.

A survey on noise generation and conversation interruption in cafes (카페 공간의 소음과 대화 방해에 대한 설문조사)

  • Jeong, Jeong-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.6
    • /
    • pp.660-670
    • /
    • 2021
  • As various people use the cafe for various purposes, it is difficult to hear conversations with the accompanying people due to the noise and background music of people around the respondents. In addition, there is a need for improvement related to the noise and sound inside the cafe, such as making it easier to hear the conversations of nearby users. 212 adult men and women participated in the questionnaire on the survey on cafe acoustics and noise conditions. As a result of the survey, about two-thirds of the respondents said that they did not prefer noisy cafes, and that the noise of cafes had a negative effect. The major source of noise in cafes is the sound of people around users, and more than 40 % of the respondents said that they could not hear well the sound of conversations with their accompanying people due to the sounds of those around them, or that they were concerned about their own conversations being transmitted to those around them. As a result of the survey on cafe sound and noise, it was found that improvements were needed to secure the voice privacy of cafe users as well as the voice intelligibility.

Comparison of Korean Speech De-identification Performance of Speech De-identification Model and Broadcast Voice Modulation (음성 비식별화 모델과 방송 음성 변조의 한국어 음성 비식별화 성능 비교)

  • Seung Min Kim;Dae Eol Park;Dae Seon Choi
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.56-65
    • /
    • 2023
  • In broadcasts such as news and coverage programs, voice is modulated to protect the identity of the informant. Adjusting the pitch is commonly used voice modulation method, which allows easy voice restoration to the original voice by adjusting the pitch. Therefore, since broadcast voice modulation methods cannot properly protect the identity of the speaker and are vulnerable to security, a new voice modulation method is needed to replace them. In this paper, using the Lightweight speech de-identification model as the evaluation target model, we compare speech de-identification performance with broadcast voice modulation method using pitch modulation. Among the six modulation methods in the Lightweight speech de-identification model, we experimented on the de-identification performance of Korean speech as a human test and EER(Equal Error Rate) test compared with broadcast voice modulation using three modulation methods: McAdams, Resampling, and Vocal Tract Length Normalization(VTLN). Experimental results show VTLN modulation methods performed higher de-identification performance in both human tests and EER tests. As a result, the modulation methods of the Lightweight model for Korean speech has sufficient de-identification performance and will be able to replace the security-weak broadcast voice modulation.

The Effects of Multi-identity on One's Psychological State and the Quality of Contribution in Virtual Communities: A Socio-Psychological Perspective

  • Suh, A-Young;Shin, Kyung-Shik;Lee, Ju-Min
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.57-79
    • /
    • 2010
  • In a virtual community, one can possess multiple identities and pretend to be different by creating self-identity in contrast with his or her actual self. Does false identity undermine the qualitative growth of a virtual community by reducing members' accountability? Or does it stimulate their contributive behaviors by ensuring freedom of speech? It is imperative to understand the effects of multi-identity considering the distinct properties of a virtual community in which people easily change their identities at little or no cost. To answer these questions, we adopted the concept of self-discrepancy from the social psychology theory rooted in the concept of the self and developed a theoretical model to predict quality of contribution of the individual member in virtual communities. Based on the self-discrepancy theory, we first identified two different domains of the self: (1) an "actual self" that consists of attributes that the person believes he or she currently possesses in real life and (2) a "cyber self" that consists of attributes the person believes he or she possesses in a virtual community. Next, we derived an index for two different types of self-discrepancy by using the differences between the actual and the cyber identities: Personal Self-discrepancy and Social Self-discrepancy. Personal Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's intelligence, education, and expertise. Social Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's morality, sociability, and accordance with social norms. Finally, we linked them with sense of virtual community, perceived privacy rights, and quality of contribution to examine how having a multi-identity influences an individual's psychological state and contributive behaviors in a virtual community. The results of the analysis based on 266 respondents showed that Social Self-discrepancy negatively influenced both the Sense of Virtual Community and Perceived Privacy Rights, while Personal Self-discrepancy negatively influenced only Perceived Privacy Rights, thereby resulting in reduced quality of contribution in virtual communities. Based on the results of this analysis, we can explain the dysfunctions of multi-identity in virtual communities. First, people who pretend to be different by engaging in socially undesirable behaviors under their alternative identities are more likely to suffer lower levels of psychological wellbeing and thus experience lower levels of sense of virtual community than others. Second, people do not perceive a high level of privacy rights reflecting catharsis, recovery, or autonomy, even though they create different selves and engage in socially undesirable behaviors in a virtual community. Third, people who pretend to be different persons in terms of their intelligence, education, or expertise also indirectly debase the quality of contribution by decreasing perceived privacy rights. The results suggest that virtual community managers should pay more attention to the negative influences exercised by multi-identity on the quality of contribution, thereby controlling the need to create alternative identities in virtual communities. We hope that more research will be conducted on this underexplored area of multi-identity and that our theoretical framework will serve as a useful conceptual tool for all endeavors.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.