Skip to main content

Evaluating X-Vector-Based Speaker Anonymization Under White-Box Assessment

  • Conference paper
  • First Online:
Speech and Computer (SPECOM 2021)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12997))

Included in the following conference series:

Abstract

In the scenario of the Voice Privacy challenge, anonymization is achieved by converting all utterances from a source speaker to match the same target identity; this identity being randomly selected. In this context, an attacker with maximum knowledge about the anonymization system can not infer the target identity. This article proposed to constrain the target selection to a specific identity, i.e., removing the random selection of identity, to evaluate the extreme threat under a white-box assessment (the attacker has complete knowledge about the system). Targeting a unique identity also allows us to investigate whether some target’s identities are better than others to anonymize a given speaker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/Voice-Privacy-Challenge.

References

  1. Bahmaninezhad, F., Zhang, C., Hansen, J.H.L.: Convolutional neural network based speaker de-identification. In: Odyssey (2018)

    Google Scholar 

  2. Champion, P., Jouvet, D., Larcher, A.: A study of F0 modification for X-vector based speech pseudonymization across gender. In: PPAI 2021 - The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (2021)

    Google Scholar 

  3. Fang, F., et al.: Speaker anonymization using X-vector and neural waveform models. In: 10th ISCA Speech Synthesis Workshop (2019)

    Google Scholar 

  4. Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406–1420 (2018)

    Article  Google Scholar 

  5. Magariños, C., Lopez-Otero, P., Docio-Fernandez, L., Rodriguez-Banga, E., Erro, D., Garcia-Mateo, C.: Reversible speaker de-identification using pre-trained transformation functions. Comput. Speech Lang. 46, 36–52 (2017)

    Article  Google Scholar 

  6. Maouche, M., Srivastava, B.M.L., Vauquier, N., Bellet, A., Tommasi, M., Vincent, E.: A comparative study of speech anonymization metrics. In: Interspeech (2020)

    Google Scholar 

  7. McAdams, S.: Spectral fusion, spectral parsing and the formation of the auditory image. Ph.D. thesis, Stanford (1984)

    Google Scholar 

  8. Nautsch, A., Jasserand, C., Kindt, E., Todisco, M., Trancoso, I., Evans, N.: The GDPR & speech data: reflections of legal and technology communities, first steps towards a common understanding. In: Interspeech (2019)

    Google Scholar 

  9. Noé, P.G., Bonastre, J.F., Matrouf, D., Tomashenko, N., Nautsch, A., Evans, N.: Speech pseudonymisation assessment using voice similarity matrices. In: Interspeech (2020)

    Google Scholar 

  10. European Parliament and of the Council: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. General Data Protection Regulation (2016)

    Google Scholar 

  11. Povey, D., et al.: The kaldi speech recognition toolkit. In: IEEE Workshop on Automatic Speech Recognition and Understanding (2011)

    Google Scholar 

  12. Srivastava, B.M.L., Bellet, A., Tommasi, M., Vincent, E.: Privacy-preserving adversarial representation learning in ASR: reality or illusion? In: Interspeech (2019)

    Google Scholar 

  13. Srivastava, B.M.L., et al.: Privacy and utility of x-vector based speaker anonymization. Trans. Audio Speech Lang. Process. (2021)

    Google Scholar 

  14. Srivastava, B.M.L., et al.: Design choices for x-vector based speaker anonymization. In: Interspeech (2020)

    Google Scholar 

  15. Srivastava, B.M.L., Vauquier, N., Sahidullah, M., Bellet, A., Tommasi, M., Vincent, E.: Evaluating voice conversion-based privacy protection against informed attackers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2020)

    Google Scholar 

  16. Sun, L., Li, K., Wang, H., Kang, S., Meng, H.: Phonetic posteriorgrams for many-to-one voice conversion without parallel data training. In: IEEE International Conference on Multimedia and Expo (2016)

    Google Scholar 

  17. Tomashenko, N., et al.: Introducing the VoicePrivacy initiative. In: Interspeech (2020)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the French National Research Agency under project DEEP-PRIVACY (ANR-18-CE23-0018) and Région Grand Est. Experiments were carried out using the Grid’5000 testbed, supported by a scientific interest group hosted by Inria and including CNRS, RENATER and several Universities as well as other organizations.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Pierre Champion , Denis Jouvet or Anthony Larcher .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Champion, P., Jouvet, D., Larcher, A. (2021). Evaluating X-Vector-Based Speaker Anonymization Under White-Box Assessment. In: Karpov, A., Potapova, R. (eds) Speech and Computer. SPECOM 2021. Lecture Notes in Computer Science(), vol 12997. Springer, Cham. https://doi.org/10.1007/978-3-030-87802-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87802-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87801-6

  • Online ISBN: 978-3-030-87802-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics