I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy

by   Henry Turner, et al.

In this paper, we present AltVoice – a system designed to help user's protect their privacy when using remotely accessed voice services. The system allows a user to conceal their true voice identity information with no cooperation from the remote voice service: AltVoice re-synthesizes user's spoken audio to sound as if it has been spoken by a different, private identity. The system converts audio to its textual representation at its midpoint, and thus removes any linkage between the user's voice and the generated private voices. We implement AltVoice and we propose six different methods to generate private voice identities, each is based on a user-known secret. We identify the system's trade-offs, and we investigate them for each of the proposed identity generation methods. Specifically, we investigate generated voices' diversity, word error rate, perceived speech quality and the success of attackers under privacy compromise and authentication compromise attack scenarios. Our results show that AltVoice-generated voices are not easily linked to original users, enabling users to protect themselves from voice data leakages and allowing for the revocability of (generated) voice data; akin to using passwords. However the results also show further work is needed on ensuring that the produced audio is natural, and that identities of private voices are distinct from one another. We discuss the future steps into improving AltVoice and the new implications that its existence has for the creations of remotely accessed voice services.


VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices

Voice input has been tremendously improving the user experience of mobil...

Towards End-to-End Private Automatic Speaker Recognition

The development of privacy-preserving automatic speaker verification sys...

WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice

People are not always receptive to their voice data being collected and ...

Exchanging Keys with Authentication and Identity Protection for Secure Voice Communication without Side-channel

Motivated by an increasing need for privacy-preserving voice communicati...

Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant

Voice assistants are now ubiquitous and listen in on our everyday lives....

NUANCE: Near Ultrasound Attack On Networked Communication Environments

This study investigates a primary inaudible attack vector on Amazon Alex...

A Study of Feasibility and Diversity of Web Audio Fingerprints

Prior measurement studies on browser fingerprinting have unfortunately l...

Please sign up or login with your details

Forgot password? Click here to reset