Evaluating X-vector-based Speaker Anonymization under White-box Assessment

09/24/2021
by   Pierre Champion, et al.
0

In the scenario of the Voice Privacy challenge, anonymization is achieved by converting all utterances from a source speaker to match the same target identity; this identity being randomly selected. In this context, an attacker with maximum knowledge about the anonymization system can not infer the target identity. This article proposed to constrain the target selection to a specific identity, i.e., removing the random selection of identity, to evaluate the extreme threat under a whitebox assessment (the attacker has complete knowledge about the system). Targeting a unique identity also allows us to investigate whether some target's identities are better than others to anonymize a given speaker.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/25/2021

Controllable and Interpretable Singing Voice Decomposition via Assem-VC

We propose a singing decomposition system that encodes time-aligned ling...
research
05/20/2021

Speaker disentanglement in video-to-speech conversion

The task of video-to-speech aims to translate silent video of lip moveme...
research
01/21/2021

A Study of F0 Modification for X-Vector Based Speech Pseudonymization Across Gender

Speech pseudonymization aims at altering a speech signal to map the iden...
research
05/30/2019

Speaker Anonymization Using X-vector and Neural Waveform Models

The social media revolution has produced a plethora of web services to w...
research
08/30/2020

Speech Pseudonymisation Assessment Using Voice Similarity Matrices

The proliferation of speech technologies and rising privacy legislation ...
research
11/09/2018

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

We consider technology-assisted mimicry attacks in the context of automa...
research
06/09/2021

Fundamental Privacy Limits in Bipartite Networks under Active Attacks

This work considers active deanonymization of bipartite networks. The sc...

Please sign up or login with your details

Forgot password? Click here to reset