Towards Privacy-Preserving Speech Data Publishing

Privacy-preserving data publishing has been a heated research topic in the last decade. Numerous ingenious attacks on users' privacy and defensive measures have been proposed for the sharing of various data, varying from relational data, social network data, spatiotemporal data, to images and videos. Speech data publishing, however, is still untouched in the literature. To fill this gap, we study the privacy risk in speech data publishing and explore the possibilities of performing data sanitization to achieve privacy protection while preserving data utility simultaneously. We formulate this optimization problem in a general fashion and present thorough quantifications of privacy and utility. We analyze the sophisticated impacts of possible sanitization methods on privacy and utility, and also design a novel method - key term perturbation for speech content sanitization. A heuristic algorithm is proposed to personalize the sanitization for speakers to restrict their privacy leak (p-leak limit) while minimizing the utility loss. The simulations of linkage attacks and sanitization on real datasets validate the necessity and feasibility of this work.

[1]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Authentication , 2012, ISC.

[2]  Ramayya Krishnan,et al.  Privacy-preserving similarity-based text retrieval , 2010, TOIT.

[3]  Björn W. Schuller,et al.  The INTERSPEECH 2011 Speaker State Challenge , 2011, INTERSPEECH.

[4]  S. Johar Psychology of Voice , 2016 .

[5]  Yu Wang,et al.  VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices , 2017, ArXiv.

[6]  Xiang-Yang Li,et al.  Graph-based privacy-preserving data publication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[7]  H. Ney,et al.  VTLN-based voice conversion , 2003, Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (IEEE Cat. No.03EX795).

[8]  Huan Zhao,et al.  Automatic Chinese Personality Recognition Based on Prosodic Features , 2015, MMM.

[9]  Xiang-Yang Li,et al.  De-anonymizing social networks and inferring private attributes using knowledge graphs , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[10]  Thomas S. Huang,et al.  Emotion recognition from speech VIA boosted Gaussian mixture models , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[11]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[12]  Xiang-Yang Li,et al.  User-Demand-Oriented Privacy-Preservation in Video Delivering , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).

[13]  Erik McDermott,et al.  Deep neural networks for small footprint text-dependent speaker verification , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Haizhou Li,et al.  Voice conversion versus speaker verification: an overview , 2014 .

[15]  Sanjeev Khudanpur,et al.  Librispeech: An ASR corpus based on public domain audio books , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Todor Ganchev,et al.  Estimation of unknown speaker’s height from speech , 2009, Int. J. Speech Technol..

[17]  Shaojie Tang,et al.  Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified? , 2017 .

[18]  Dong Wang,et al.  Deep Speaker Feature Learning for Text-Independent Speaker Verification , 2017, INTERSPEECH.

[19]  Xiangyang Li,et al.  Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[20]  Xiang-Yang Li,et al.  Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.

[21]  Xiang-Yang Li,et al.  AccountTrade: Accountable protocols for big data trading against dishonest consumers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[22]  Xiao Liu,et al.  Deep Speaker: an End-to-End Neural Speaker Embedding System , 2017, ArXiv.

[23]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[24]  Paris Smaragdis,et al.  A Framework for Secure Speech Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[25]  Seyed Hamidreza Mohammadi,et al.  An overview of voice conversion systems , 2017, Speech Commun..

[26]  F. McGehee The Reliability of the Identification of the Human Voice , 1937 .

[27]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2017, IEEE Trans. Parallel Distributed Syst..

[28]  Yunhao Liu,et al.  Privacy-friendly photo capturing and sharing system , 2016, UbiComp.

[29]  Daniel Gillick,et al.  Can conversational word usage be used to predict speaker demographics? , 2010, INTERSPEECH.

[30]  Florin Curelaru,et al.  Front-End Factor Analysis For Speaker Verification , 2018, 2018 International Conference on Communications (COMM).

[31]  Xiang-Yang Li,et al.  CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats , 2018, IEEE Transactions on Information Forensics and Security.

[32]  Guillaume Lample,et al.  Neural Architectures for Named Entity Recognition , 2016, NAACL.

[33]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[34]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[35]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.

[36]  Wenchao Huang,et al.  AppDNA: App Behavior Profiling via Graph-based Deep Learning , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[37]  Linlin Chen,et al.  Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model , 2019, IEEE Transactions on Dependable and Secure Computing.