2,318 research outputs found

    Federated Learning for Predictive Healthcare Analytics: From theory to real world applications

    Get PDF
    In the contemporary landscape, machine learning has a pervasive impact across virtually all industries. However, the success of these systems hinges on the accessibility of training data. In today's world, every device generates data, which can serve as the building blocks for future technologies. Conventional machine learning methods rely on centralized data for training, but the availability of sufficient and valid data is often hindered by privacy concerns. Data privacy is the main concern while developing a healthcare system. One of the technique which allow decentralized learning is Federated Learning. Researchers have been actively applying this approach in various domains and have received a positive response. This paper underscores the significance of employing Federated Learning in the healthcare sector, emphasizing the wealth of data present in hospitals and electronic health records that could be used to train medical systems

    EKILA: Synthetic Media Provenance and Attribution for Generative Art

    Full text link
    We present EKILA; a decentralized framework that enables creatives to receive recognition and reward for their contributions to generative AI (GenAI). EKILA proposes a robust visual attribution technique and combines this with an emerging content provenance standard (C2PA) to address the problem of synthetic image provenance -- determining the generative model and training data responsible for an AI-generated image. Furthermore, EKILA extends the non-fungible token (NFT) ecosystem to introduce a tokenized representation for rights, enabling a triangular relationship between the asset's Ownership, Rights, and Attribution (ORA). Leveraging the ORA relationship enables creators to express agency over training consent and, through our attribution model, to receive apportioned credit, including royalty payments for the use of their assets in GenAI.Comment: Proc. CVPR Workshop on Media Forensics 202

    COVID-19 Diagnosis Using Spectral and Statistical Analysis of Cough Recordings Based on the Combination of SVD and DWT

    Get PDF
    تستخدم الإشارات الصوتية التي يولدها جسم الإنسان بشكل روتيني من قبل التخصصين في البحوث والتطبيقات الصحية  للمساعدة في تشخيص بعض  الامراض أو تقييم تقدم المرض. وبالنظر إلى التقنيات الجديدة ، من الممكن في الوقت الحاضر جمع الأصوات التي يولدها الإنسان ، مثل السعال. ويمكن بعد ذلك اعتماد تقنيات التعلم الآلي المستندة إلى الصوت من أجل التحليل التلقائي للبيانات التي تم جمعها مما يوفر معلومات قيمة غنية من إشارة السعال واستخراج الميزات الفعالة من فترة زمنية محدودة الطول تتغير كدالة للوقت. في هذا البحث يتم اقتراح وتقديم خوارزمية  للكشف عن COVID-19 وتشخيصه من خلال معالجة السعال الذي يتم جمعه من المرضى الذين يعانون من الأعراض الأكثر شيوعًا لهذا الوباء. تعتمد الطريقة المقترحة على اعتماد مزيج من تحليل القيمة المفردة (SVD) وتحويل المويجات المنفصل (DWT).  وقد أدى الجمع بين هاتين التقنيتين لمعالجة الإشارات إلى اتباع نهج جيد للتعرف على السعال ، حيث يولد ويستخدم الحد الأدنى من الميزات الفعالة. وفي هذه الخوارزمية المقترحة يتم تطبيق الترددات المتوسطة (mean and median)، والمعروفة بأنها أكثر الميزات المفيدة في مجال التردد ، لإنشاء مقياس إحصائي فعال لمقارنة النتائج. بالإضافة إلى الحصول على معدل كشف وتمييز عاليين ، تتميز الخوارزمية المقترحة بكفاءتها حيث يتم تحقيق تخفيض 200 مرة، من حيث عدد العمليات. على الرغم من حقيقة أن أعراض الأشخاص المصابين وغير المصابين في الدراسة بها الكثير من أوجه التشابه ، فإن نتائج التشخيص التي تم الحصول عليها من تطبيق نهجنا تُظهر معدل تشخيص مرتفعًا، والذي تم إثباته من خلال مطابقتها مع اختبارات PCR ذات الصلة. نعتقد أنه يمكن تحقيق أداء أفضل من خلال توسيع مجموعة البيانات ، مع تضمين الأشخاص الأصحاء.Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopting a combination of Singular Value Decomposition (SVD), and Discrete Wavelet Transform (DWT). The combination of these two signal processing techniques is gaining lots of interest in the field of speaker and speech recognition. As a cough recognition approach, we found it well-performing, as it generates and utilizes an efficient minimum number of features. Mean and median frequencies, which are known to be the most useful features in the frequency domain, are applied to generate an effective statistical measure to compare the results. The hybrid structure of DWT and SVD, adopted in this approach adds to its efficiency, where a 200 times reduction, in terms of the number of operations, is achieved. Despite the fact that symptoms of the infected and non-infected people used in the study are having lots of similarities, diagnosis results obtained from the application of the proposed approach show high diagnosis rate, which is proved through the matching with relevant PCR tests.  The proposed approach is open for more improvements with its performance further assured by enlarging the dataset, while including healthy people

    Exploring Strategies for Measuring Team Innovation in Small Financial Business

    Get PDF
    Small financial business leaders cannot maintain a competitive advantage without effectively measuring work team innovation. The purpose of this qualitative exploratory multiple case study was to explore the strategies that small financial business leaders use to measure work team innovation to maintain a competitive advantage. The conceptual framework undergirding this study was Schumpeter’s innovation management theory. The research question asked what strategies small financial business leaders use to effectively measure work team innovation to maintain a competitive advantage. Interview data were collected from 15 small financial business leaders who employ less than 100 employees in Madison, Chester, Gibson, Henderson, and Crockett counties in west Tennessee and are members of a local Chamber of Commerce. Data analysis used descriptive coding method. The findings showed that small financial business leaders understand the importance of using innovation appropriately in their organization to maximize organizational performance on the work team level. Small financial business leaders acknowledged the effect COVID-19 had on the work environment and that the focus of their organization should be on the customers’ needs over the needs of their organization. This study’s positive social change implications could be that small financial businesses that use innovation appropriately in their organization might increase customer satisfaction and increase organizational success

    Secure Face and Liveness Detection with Criminal Identification for Security Systems

    Get PDF
    The advancement of computer vision, machine learning, and image processing techniques has opened new avenues for enhancing security systems. In this research work focuses on developing a robust and secure framework for face and liveness detection with criminal identification, specifically designed for security systems. Machine learning algorithms and image processing techniques are employed for accurate face detection and liveness verification. Advanced facial recognition methods are utilized for criminal identification. The framework incorporates ML technology to ensure data integrity and identification techniques for security system. Experimental evaluations demonstrate the system's effectiveness in detecting faces, verifying liveness, and identifying potential criminals. The proposed framework has the potential to enhance security systems, providing reliable and secure face and liveness detection for improved safety and security. The accuracy of the algorithm is 94.30 percent. The accuracy of the model is satisfactory even after the results are acquired by combining our rules inwritten by humans with conventional machine learning classification algorithms. Still, there is scope for improving and accurately classifying the attack precisely

    Enhancing Security in Internet of Healthcare Application using Secure Convolutional Neural Network

    Get PDF
    The ubiquity of Internet of Things (IoT) devices has completely changed the healthcare industry by presenting previously unheard-of potential for remote patient monitoring and individualized care. In this regard, we suggest a unique method that makes use of Secure Convolutional Neural Networks (SCNNs) to improve security in Internet-of-Healthcare (IoH) applications. IoT-enabled healthcare has advanced as a result of the integration of IoT technologies, giving it impressive data processing powers and large data storage capacity. This synergy has led to the development of an intelligent healthcare system that is intended to remotely monitor a patient's medical well-being via a wearable device as a result of the ongoing advancement of the Industrial Internet of Things (IIoT). This paper focuses on safeguarding user privacy and easing data analysis. Sensitive data is carefully separated from user-generated data before being gathered. Convolutional neural network (CNN) technology is used to analyse health-related data thoroughly in the cloud while scrupulously protecting the privacy of the consumers.The paper provide a secure access control module that functions using user attributes within the IoT-Healthcare system to strengthen security. This module strengthens the system's overall security and privacy by ensuring that only authorised personnel may access and interact with the sensitive health data. The IoT-enabled healthcare system gets the capacity to offer seamless remote monitoring while ensuring the confidentiality and integrity of user information thanks to this integrated architecture

    Robust Watermarking Using FFT and Cordic QR Techniques

    Get PDF
    Digital media sharing and access in today’s world of the internet is very frequent for every user. The management of digital rights may come into threat easily as the accessibility of data through the internet become wide. Sharing digital information under security procedures can be easily compromised due to the various vulnerabilities floating over the internet. Existing research has been tied to protecting internet channels to ensure the safety of digital data. Researchers have investigated various encryption techniques to prevent digital rights management but certain challenges including external potential attacks cannot be avoided that may give unauthorized access to digital media. The proposed model endorsed the concept of watermarking in digital data to uplift media security and ensure digital rights management. The system provides an efficient procedure to conduct over-watermarking in digital audio signals and confirm the avoidance of ownership of the host data. The proposed technique uses a watermark picture as a signature that has been initially encrypted with Arnold's cat map and cyclic encoding before being embedded. The upper triangular R-matrix component of the energy band was then created by using the Fast Fourier transform and Cordic QR procedures to the host audio stream. Using PN random sequences, the encrypted watermarking image has been embedded in the host audio component of the R-matrix. The same procedure has been applied to extract the watermark image from the watermarked audio. The proposed model evaluates the quality of the watermarked audio and extracted watermark image. The average PSNR of the watermarked audio is found to be 37.01 dB. It has also been seen that the average PSNR, Normal cross-correlation, BER, SSMI (structure similarity index matric) value for the extracted watermark image is found to be 96.30 dB, 0.9042 units, 0.1033 units, and 0.9836 units respectively. Further, the model has been tested using various attacks to check its robustness. After applying attacks such as noising, filtering, cropping, and resampling on the watermarked audio, the watermark image has been extricated and its quality has been checked under the standard parameters. It has been found that the quality of the recovered watermark image satisfying enough to justify the digital ownership of the host audio. Hence, the proposed watermarking model attains a perfect balance between imperceptibility, payload, and robustness

    Covert Communication in Autoencoder Wireless Systems

    Get PDF
    The broadcast nature of wireless communications presents security and privacy challenges. Covert communication is a wireless security practice that focuses on intentionally hiding transmitted information. Recently, wireless systems have experienced significant growth, including the emergence of autoencoder-based models. These models, like other DNN architectures, are vulnerable to adversarial attacks, highlighting the need to study their susceptibility to covert communication. While there is ample research on covert communication in traditional wireless systems, the investigation of autoencoder wireless systems remains scarce. Furthermore, many existing covert methods are either detectable analytically or difficult to adapt to diverse wireless systems. The first part of this thesis provides a comprehensive examination of autoencoder-based communication systems in various scenarios and channel conditions. It begins with an introduction to autoencoder communication systems, followed by a detailed discussion of our own implementation and evaluation results. This serves as a solid foundation for the subsequent part of the thesis, where we propose a GAN-based covert communication model. By treating the covert sender, covert receiver, and observer as generator, decoder, and discriminator neural networks, respectively, we conduct joint training in an adversarial setting to develop a covert communication scheme that can be integrated into any normal autoencoder. Our proposal minimizes the impact on ongoing normal communication, addressing previous works shortcomings. We also introduce a training algorithm that allows for the desired tradeoff between covertness and reliability. Numerical results demonstrate the establishment of a reliable and undetectable channel between covert users, regardless of the cover signal or channel condition, with minimal disruption to the normal system operation

    Adversarial Deep Learning and Security with a Hardware Perspective

    Get PDF
    Adversarial deep learning is the field of study which analyzes deep learning in the presence of adversarial entities. This entails understanding the capabilities, objectives, and attack scenarios available to the adversary to develop defensive mechanisms and avenues of robustness available to the benign parties. Understanding this facet of deep learning helps us improve the safety of the deep learning systems against external threats from adversaries. However, of equal importance, this perspective also helps the industry understand and respond to critical failures in the technology. The expectation of future success has driven significant interest in developing this technology broadly. Adversarial deep learning stands as a balancing force to ensure these developments remain grounded in the real-world and proceed along a responsible trajectory. Recently, the growth of deep learning has begun intersecting with the computer hardware domain to improve performance and efficiency for resource constrained application domains. The works investigated in this dissertation constitute our pioneering efforts in migrating adversarial deep learning into the hardware domain alongside its parent field of research

    A Watermarking Scheme for Digital Images Developed Using Discrete Cosine Transform (DCT)

    Get PDF
    In this research, a grayscale image watermarking approach is introduced, utilizing a discrete cosine transform (DCT) to embed an imperceptible binary watermark image. Diverging from traditional methods that partition the image into non-overlapping 8x8 blocks, the DCT is employed across the entire host image. Following this, specific coefficients from the low-frequency DCT range are selected for the embedding of the watermark. In order to attain a harmonious equilibrium between the resilience of the watermark and its inconspicuousness, the intensity of watermarking is controlled through a robustness factor. The precise value of this robustness factor is flexible and can be fine-tuned by the user in accordance with their preferred level of resilience and the attributes of the host image. Assessing the quality of watermarked images involves the computation of peak signal-to-noise ratio (PSNR) and normalized correlation (NC). The conducted simulations and resultant findings highlight the resilience of the proposed methodology, showcasing its efficacy even under a variety of attacks, encompassing JPEG compression, low-pass filtering, and noise distortions
    corecore