Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy

被引:0
|
作者
Zhang, Zhaoyang [1 ]
Wang, Shen [1 ]
Zhu, Guopu [1 ]
Zhan, Dechen [2 ]
Huang, Jiwu [3 ]
机构
[1] Harbin Inst Technol, Sch Cyberspace Sci, Harbin 150001, Peoples R China
[2] Harbin Inst Technol, Sch Software, Harbin 150001, Peoples R China
[3] Shenzhen MSU BIT Univ, Fac Engn, Guangdong Lab Machine Percept & Intelligent Comp, Shenzhen 518116, Peoples R China
基金
中国国家自然科学基金;
关键词
Perturbation methods; Speech recognition; Real-time systems; Speaker recognition; Feature extraction; Delays; Acoustics; adversarial machine learning; real-time attack;
D O I
10.1109/TIFS.2024.3463538
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The widespread collection and analysis of private speech signals have become increasingly prevalent, raising significant privacy concerns. To protect speech signals from unauthorized analysis, adversarial attack methods for deceiving speaker recognition models have been proposed. While a few of these methods are specifically designed for real-time protection of speech signals, they introduce significant delays that can severely impact speech communication when applied to streaming speech data. In this paper, we present a novel approach that aims to offer real-time protection for speech signals without delays. By utilizing observed data only, we generate initial adversarial seed perturbations and refine them to obtain the necessary adversarial perturbations predicted for adjacent unobserved signals. This refinement process is conducted via a proposed model called PAPG. On the basis of perturbation prediction, we develop a streaming audio processing framework that generates perturbations in synchronization with the playback of the original signal, effectively eliminating delays. The experimental results demonstrate that under the proposed attack, the average Top-1 accuracy of various advanced speaker recognition methods is reduced by 89%, and the average equal error rate (EER) increases to 36%. Remarkably, these results are achieved without delays while maintaining superior perceptual quality.
引用
收藏
页码:8701 / 8716
页数:16
相关论文
共 50 条
  • [1] Real-Time Remote Attestation with Privacy Protection
    Yu, Aimin
    Feng, Dengguo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 81 - 92
  • [2] Privacy against Real-Time Speech Emotion Detection via Acoustic Adversarial Evasion of Machine Learning
    Testa, Brian
    Xiao, Yi
    Sharma, Harshit
    Gump, Avery
    Salekin, Asif
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2023, 7 (03):
  • [3] Privacy-protection in Real-time Video Communication
    Shen, Jie
    2009 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, : 217 - 220
  • [4] Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective
    Oh, Seong Joon
    Fritz, Mario
    Schiele, Bernt
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, : 1491 - 1500
  • [5] Optimizing and Accelerating Privacy Protection Algorithm for Real-Time Location
    Dong, Kai
    Wang, Lifu
    Ling, Zhen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (09): : 2156 - 2169
  • [6] A novel real-time trajectory compression method for privacy protection
    Tao, Jiachun
    Chen, Liang
    Fang, Junhua
    2022 IEEE 9TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA), 2022, : 1013 - 1022
  • [7] REAL-TIME LINEAR PREDICTION OF SPEECH WAVEFORMS - NOTE
    MORGAN, DR
    IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1975, 23 (04): : 386 - 387
  • [8] An Image Privacy Protection Algorithm Based on Adversarial Perturbation Generative Networks
    Tong, Chao
    Zhang, Mengze
    Lang, Chao
    Zheng, Zhigao
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [9] Real-Time Adversarial Attacks
    Gong, Yuan
    Li, Boyang
    Poellabauer, Christian
    Shi, Yiyu
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4672 - 4680
  • [10] Minor Privacy Protection Through Real-time Video Processing at the Edge
    Yuan, Meng
    Nikouei, Seyed Yahya
    Fitwi, Alem
    Chen, Yu
    Dong, Yunxi
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,