论文标题

私人语音分类和安全的多方计算

Private Speech Classification with Secure Multiparty Computation

论文作者

Bittner, Kyle, De Cock, Martine, Dowsley, Rafael

论文摘要

音频信号处理中的深度学习,例如人音音频信号分类,是机器学习的丰富应用领域。合法的用例包括语音身份验证,枪声检测和情绪识别。尽管人类语音分类具有明显的优势,但应用程序开发人员可以通过无保护的音频信号处理获得自称范围之外的知识。在本文中,我们提出了第一个用于基于深度学习的音频分类的隐私解决方案,该解决方案被证明是安全的。我们的方法基于安全的多方计算,允许将一个党派(爱丽丝)的语音信号与另一方的深度神经网络(鲍勃)分类,而鲍勃曾经以未经加密的方式看到爱丽丝的语音信号。作为威胁模型,我们同时考虑了被动安全性,即遵循加密协议指示的半honest政党以及主动安全性,即与偏离协议的恶意政党。我们在用卷积神经网络中从语音中检测到隐私性情绪检测的用例中,我们评估了拟议解决方案的效率 - 安全 - 准确性权衡。在半冬季的情况下,我们可以在不到0.3秒的时间内对语音信号进行分类;在恶意情况下,需要$ \ sim $ 1.6秒。在这两种情况下,都没有信息泄漏,我们实现了与在未加密数据上进行计算时相同的分类精度。

Deep learning in audio signal processing, such as human voice audio signal classification, is a rich application area of machine learning. Legitimate use cases include voice authentication, gunfire detection, and emotion recognition. While there are clear advantages to automated human speech classification, application developers can gain knowledge beyond the professed scope from unprotected audio signal processing. In this paper we propose the first privacy-preserving solution for deep learning-based audio classification that is provably secure. Our approach, which is based on Secure Multiparty Computation, allows to classify a speech signal of one party (Alice) with a deep neural network of another party (Bob) without Bob ever seeing Alice's speech signal in an unencrypted manner. As threat models, we consider both passive security, i.e. with semi-honest parties who follow the instructions of the cryptographic protocols, as well as active security, i.e. with malicious parties who deviate from the protocols. We evaluate the efficiency-security-accuracy trade-off of the proposed solution in a use case for privacy-preserving emotion detection from speech with a convolutional neural network. In the semi-honest case we can classify a speech signal in under 0.3 sec; in the malicious case it takes $\sim$1.6 sec. In both cases there is no leakage of information, and we achieve classification accuracies that are the same as when computations are done on unencrypted data.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源