Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Evaluating Voice Conversion-based Privacy Protection against Informed Attackers (1911.03934v2)

Published 10 Nov 2019 in cs.CL, cs.SD, and eess.AS

Abstract: Speech data conveys sensitive speaker attributes like identity or accent. With a small amount of found data, such attributes can be inferred and exploited for malicious purposes: voice cloning, spoofing, etc. Anonymization aims to make the data unlinkable, i.e., ensure that no utterance can be linked to its original speaker. In this paper, we investigate anonymization methods based on voice conversion. In contrast to prior work, we argue that various linkage attacks can be designed depending on the attackers' knowledge about the anonymization scheme. We compare two frequency warping-based conversion methods and a deep learning based method in three attack scenarios. The utility of converted speech is measured via the word error rate achieved by automatic speech recognition, while privacy protection is assessed by the increase in equal error rate achieved by state-of-the-art i-vector or x-vector based speaker verification. Our results show that voice conversion schemes are unable to effectively protect against an attacker that has extensive knowledge of the type of conversion and how it has been applied, but may provide some protection against less knowledgeable attackers.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Brij Mohan Lal Srivastava (13 papers)
  2. Nathalie Vauquier (3 papers)
  3. Md Sahidullah (78 papers)
  4. Aurélien Bellet (67 papers)
  5. Marc Tommasi (25 papers)
  6. Emmanuel Vincent (44 papers)
Citations (80)

Summary

We haven't generated a summary for this paper yet.