ON THE GENERATION AND REMOVAL OF SPEAKER ADVERSARIAL PERTURBATION FOR VOICE-PRIVACY PROTECTION

被引:0
|
作者
Guo, Chenyang [1 ]
Chen, Liping [1 ]
Li, Zhuhai [1 ]
Lee, Kong Aik [2 ]
Ling, Zhen-Hua [1 ]
Guo, Wu [1 ]
机构
[1] Univ Sci & Technol China, Hefei, Peoples R China
[2] Hong Kong Polytech Univ, Hong Kong, Peoples R China
关键词
speaker recognition; voice-privacy protection; speaker adversarial perturbation; perturbation removal;
D O I
10.1109/SLT61566.2024.10832243
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Neural networks are commonly known to be vulnerable to adversarial attacks mounted through subtle perturbation on the input data. Recent development in voice-privacy protection has shown the positive use cases of the same technique to conceal speaker's voice attribute with additive perturbation signal generated by an adversarial network. This paper examines the reversibility property where an entity generating the adversarial perturbations is authorized to remove them and restore original speech (e.g., the speaker him/herself). A similar technique could also be used by an investigator to deanonymize a voice-protected speech to restore criminals' identities in security and forensic analysis. In this setting, the perturbation generative module is assumed to be known in the removal process. To this end, a joint training of perturbation generation and removal modules is proposed. Experimental results on the LibriSpeech dataset demonstrated that the subtle perturbations added to the original speech can be predicted from the anonymized speech while achieving the goal of privacy protection. By removing these perturbations from the anonymized sample, the original speech can be restored. Audio samples can be found in https://voiceprivacy.github.io/Perturbation-Generation-Removal/.
引用
收藏
页码:1179 / 1184
页数:6
相关论文
共 50 条
  • [21] Adversarial Disentanglement of Speaker Representation for Attribute-Driven Privacy Preservation
    Noe, Paul-Gauthier
    Mohammadamini, Mohammad
    Matrouf, Driss
    Parcollet, Titouan
    Nautsch, Andreas
    Bonastre, Jean-Francois
    INTERSPEECH 2021, 2021, : 1902 - 1906
  • [22] Adversarial Mask Generation for Preserving Visual Privacy
    Gupta, Aayush
    Jaiswal, Ayush
    Wu, Yue
    Yadav, Vivek
    Natarajan, Pradeep
    2021 16TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2021), 2021,
  • [23] Generation of speaker mixture voice using spectrum morphing
    Furuya, Kohei
    Moriyama, Tsuyoshi
    Ozawa, Shinji
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 344 - 347
  • [24] Multi-speaker voice cryptographic key generation
    Paola Garcia-Perera, L.
    Carlos Mex-Perera, J.
    Nolazco-Flores, Juan A.
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [25] OCDP: An enhanced perturbation approach for data privacy protection
    Devi, S. Sathiya
    Jayasri, K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90
  • [26] Improving the Speaker Identity of Non-Parallel Many-to-Many Voice Conversion with Adversarial Speaker Recognition
    Ding, Shaojin
    Zhao, Guanlong
    Gutierrez-Osuna, Ricardo
    INTERSPEECH 2020, 2020, : 776 - 780
  • [27] MicPro: Microphone-based Voice Privacy Protection
    Xiao, Shilin
    Ji, Xiaoyu
    Yan, Chen
    Zheng, Zhicong
    Xu, Wenyuan
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1302 - 1316
  • [28] Towards sustainable adversarial training with successive perturbation generation
    Lin, Wei
    Liao, Lichuan
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2024, 25 (04) : 527 - 539
  • [29] Sparse perturbation based adversarial example generation method
    Ji S.-H.
    Hu L.-M.
    Zhang P.-C.
    Qi R.-Z.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (09):
  • [30] Differential Privacy Images Protection Based on Generative Adversarial Network
    Yang, Ren
    Ma, Xuebin
    Bai, Xiangyu
    Su, Xiangdong
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1688 - 1695