ON THE GENERATION AND REMOVAL OF SPEAKER ADVERSARIAL PERTURBATION FOR VOICE-PRIVACY PROTECTION

被引:0
|
作者
Guo, Chenyang [1 ]
Chen, Liping [1 ]
Li, Zhuhai [1 ]
Lee, Kong Aik [2 ]
Ling, Zhen-Hua [1 ]
Guo, Wu [1 ]
机构
[1] Univ Sci & Technol China, Hefei, Peoples R China
[2] Hong Kong Polytech Univ, Hong Kong, Peoples R China
关键词
speaker recognition; voice-privacy protection; speaker adversarial perturbation; perturbation removal;
D O I
10.1109/SLT61566.2024.10832243
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Neural networks are commonly known to be vulnerable to adversarial attacks mounted through subtle perturbation on the input data. Recent development in voice-privacy protection has shown the positive use cases of the same technique to conceal speaker's voice attribute with additive perturbation signal generated by an adversarial network. This paper examines the reversibility property where an entity generating the adversarial perturbations is authorized to remove them and restore original speech (e.g., the speaker him/herself). A similar technique could also be used by an investigator to deanonymize a voice-protected speech to restore criminals' identities in security and forensic analysis. In this setting, the perturbation generative module is assumed to be known in the removal process. To this end, a joint training of perturbation generation and removal modules is proposed. Experimental results on the LibriSpeech dataset demonstrated that the subtle perturbations added to the original speech can be predicted from the anonymized speech while achieving the goal of privacy protection. By removing these perturbations from the anonymized sample, the original speech can be restored. Audio samples can be found in https://voiceprivacy.github.io/Perturbation-Generation-Removal/.
引用
收藏
页码:1179 / 1184
页数:6
相关论文
共 50 条
  • [31] Generative Adversarial Network Based Image Privacy Protection Algorithm
    He, Yuwen
    Zhang, Chunhong
    Zhu, Xinning
    Ji, Yang
    TENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2018), 2019, 11069
  • [32] Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants
    Zhang, Shaohu
    Sabir, Aafaq
    Das, Anupam
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 597 - 610
  • [33] Speaker Anonymization for Personal Information Protection Using Voice Conversion Techniques
    Yoo, In-Chul
    Lee, Keonnyeong
    Leem, Seonggyun
    Oh, Hyunwoo
    Ko, Bonggu
    Yook, Dongsuk
    IEEE ACCESS, 2020, 8 (08): : 198637 - 198645
  • [34] Wavelet Transform Based Data Perturbation Method for Privacy Protection
    Patel, Vinod
    Jain, Yogendra Kumar
    2009 SECOND INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2009), 2009, : 82 - 85
  • [35] Random projection data perturbation based privacy protection in WSNs
    Ming, Zhao
    Zheng-Jiang, Wu
    Liu, Hui
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 493 - 498
  • [36] Privacy protection in data mining: A perturbation approach for categorical data
    Li, Xiao-Bai
    Sarkar, Sumit
    INFORMATION SYSTEMS RESEARCH, 2006, 17 (03) : 254 - 270
  • [37] An Innovative Algorithm for Privacy Protection in a Voice Disorder Detection System
    Ali, Zulfiqar
    Imran, Muhammad
    Abdul, Wadood
    Shoaib, Muhammad
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 228 - 233
  • [38] Reinforced Perturbation Generation for Adversarial Text-based CAPTCHA
    Cheng, Zhijun
    Wu, Zhuoting
    Yang, Zhuopan
    Yang, Zhenguo
    Li, Xiaoping
    Liu, Wenyin
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2746 - 2751
  • [39] Voice Adversarial Sample Generation Method for Ultrasonicization of Motion Noise
    Wang, Jun
    Liu, Juan
    IEEE ACCESS, 2024, 12 : 177996 - 178009
  • [40] Global Privacy Protection. The First Generation
    Zurawski, Nils
    Rule, James B.
    SURVEILLANCE & SOCIETY, 2009, 6 (04) : 429 - +