论文标题
我听到(不同的)声音:保护用户隐私的匿名声音
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy
论文作者
论文摘要
在本文中,我们介绍了AltVoice,该系统旨在在使用远程访问的语音服务时帮助用户保护其隐私。该系统允许用户在不远程语音服务中没有合作的情况下隐藏其真实的语音身份信息:AltVoice重新合成用户的口语音频听起来好像是由其他私人身份说的。该系统将音频转换为其中点的文本表示形式,从而删除用户的语音与生成的私人声音之间的任何联系。我们实现了AltVoice,并提出了六种不同的方法来生成私人语音身份,每种方法都是基于一个用户知名的秘密。我们确定了系统的权衡,并针对每种提出的身份生成方法进行了调查。具体而言,我们研究了生成的声音的多样性,单词错误率,感知的语音质量以及在隐私妥协和身份验证折衷攻击方案下的攻击者的成功。我们的结果表明,AltVoice生成的声音不容易链接到原始用户,使用户能够保护自己免受语音数据泄漏的影响并允许(生成的)语音数据的可竞争性;类似于使用密码。但是,结果还表明,确保产生的音频是自然需要的进一步工作,并且私人声音的身份彼此不同。我们讨论了改善AltVoice的未来步骤,以及其存在对创建远程访问的语音服务的新含义。
In this paper, we present AltVoice -- a system designed to help user's protect their privacy when using remotely accessed voice services. The system allows a user to conceal their true voice identity information with no cooperation from the remote voice service: AltVoice re-synthesizes user's spoken audio to sound as if it has been spoken by a different, private identity. The system converts audio to its textual representation at its midpoint, and thus removes any linkage between the user's voice and the generated private voices. We implement AltVoice and we propose six different methods to generate private voice identities, each is based on a user-known secret. We identify the system's trade-offs, and we investigate them for each of the proposed identity generation methods. Specifically, we investigate generated voices' diversity, word error rate, perceived speech quality and the success of attackers under privacy compromise and authentication compromise attack scenarios. Our results show that AltVoice-generated voices are not easily linked to original users, enabling users to protect themselves from voice data leakages and allowing for the revocability of (generated) voice data; akin to using passwords. However the results also show further work is needed on ensuring that the produced audio is natural, and that identities of private voices are distinct from one another. We discuss the future steps into improving AltVoice and the new implications that its existence has for the creations of remotely accessed voice services.