Research Article
Open access
Published on 26 November 2024
Download pdf
Ma,L. (2024). AI-Powered Voice Encryption: Securing the Future of Privacy and Safety. Applied and Computational Engineering,96,42-47.
Export citation

AI-Powered Voice Encryption: Securing the Future of Privacy and Safety

Licheng Ma *,1,
  • 1 University of Liverpool, Brownlow Hill, Liverpool, L69 7ZX, UK

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/96/20241457

Abstract

In today's digital era, where waves of digitization sweep across the globe, voice, as one of the fundamental forms of human communication, is being captured, transmitted, and stored in unprecedented ways. From everyday phone conversations to remote conferences, from voice commands in smart homes to the digital distribution of musical compositions, voice data has become an indispensable part of the digital landscape. However, as these applications proliferate, concerns over the security and privacy of voice data have become increasingly prominent. This article delves into the innovative applications of ArtificialIntelligence (AI) in the realm of voice encryption, aiming to construct an efficient and secure shield for the transmission and storage of voice data.

Keywords

Voice Encryption, Privacy, Security, Artificial Intelligence.

[1]. Marengo, A. (2024). Navigating the Nexus of AI and IoT: A Comprehensive Review of Data Analytics and Privacy Paradigms. Internet of Things, 101318.

[2]. Williamson, S. M., & Prybutok, V. (2024). Balancing privacy and progress: a review of privacy challenges, systemic oversight, and patient perceptions in AI-driven healthcare. Applied Sciences, 14(2), 675.

[3]. Febriyani, W., Kusumasari, T. F., & Lubis, M. (2023, August). Data Security: A Systematic Literature Review and Critical Analysis. In 2023 International Conference on Advancement in Data Science, E-learning and Information System (ICADEIS) (pp. 1-6). IEEE.

[4]. Vardalachakis, M., Tampouratzis, M., Papadakis, N., & Vasilakis, M. (2024, May). The Future of Privacy: A Review on AI's Role in Shaping Data Security. In 2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE) (pp. 1-8). IEEE.

[5]. Peck Pinheiro, P., & Batista Battaglini, H. (2022). Artificial intelligence and data protection: a comparative analysis of AI regulation through the lens of data protection in the EU and Brazil. GRUR International, 71(10), 924-932.

[6]. Wang, T., Zhang, Y., Qi, S., Zhao, R., Xia, Z., & Weng, J. (2023). Security and privacy on generative data in aigc: A survey. arXiv preprint arXiv:2309.09435.

[7]. Das, B. C., Amini, M. H., & Wu, Y. (2024). Security and privacy challenges of large language models: A survey. arXiv preprint arXiv:2402.00888.

[8]. Xu, R., Baracaldo, N., & Joshi, J. (2021). Privacy-preserving machine learning: Methods, challenges and directions. arXiv preprint arXiv:2108.04417.

[9]. Goyal, R., Elawadhi, O., Sharma, A., Bhutani, M., & Jain, A. (2024). Cloud-connected central unit for traffic control: interfacing sensing units and centralized control for efficient traffic management. International Journal of Information Technology, 16(2), 841-851.

[10]. Jesus, C. A. C. D. (2023). Ethics of artificial intelligence: A bibliometric review analysis.

[11]. Smith, J. et al. (2020). "Adaptive Encryption for Secure Speech Communication." Journal of Information Security, 15(2), 123-135.

[12]. Chen, L. et al. (2021). "Deep Learning for Speech Encryption: Feature Extraction and Encryption Methods." IEEE Transactions on Information Forensics and Security, 16, 1852-1865.

[13]. Wang, X. et al. (2022). "Voiceprint-Based Personalized Speech Encryption for Secure Communication." International Journal of Speech Technology, 25(1), 78-90.

[14]. Zhang, Y. et al. (2023). "Reversible Watermarking for Encrypted Speech: Integrity Protection and Authentication." Journal of Network and Computer Applications, 218, 103521.

Cite this article

Ma,L. (2024). AI-Powered Voice Encryption: Securing the Future of Privacy and Safety. Applied and Computational Engineering,96,42-47.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 2nd International Conference on Machine Learning and Automation

Conference website: https://2024.confmla.org/
ISBN:978-1-83558-671-6(Print) / 978-1-83558-672-3(Online)
Conference date: 21 November 2024
Editor:Mustafa ISTANBULLU
Series: Applied and Computational Engineering
Volume number: Vol.96
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).