73 research outputs found

    An evaluation of entropy measures for microphone identification

    Get PDF
    Research findings have shown that microphones can be uniquely identified by audio recordings since physical features of the microphone components leave repeatable and distinguishable traces on the audio stream. This property can be exploited in security applications to perform the identification of a mobile phone through the built-in microphone. The problem is to determine an accurate but also efficient representation of the physical characteristics, which is not known a priori. Usually there is a trade-off between the identification accuracy and the time requested to perform the classification. Various approaches have been used in literature to deal with it, ranging from the application of handcrafted statistical features to the recent application of deep learning techniques. This paper evaluates the application of different entropy measures (Shannon Entropy, Permutation Entropy, Dispersion Entropy, Approximate Entropy, Sample Entropy, and Fuzzy Entropy) and their suitability for microphone classification. The analysis is validated against an experimental dataset of built-in microphones of 34 mobile phones, stimulated by three different audio signals. The findings show that selected entropy measures can provide a very high identification accuracy in comparison to other statistical features and that they can be robust against the presence of noise. This paper performs an extensive analysis based on filter features selection methods to identify the most discriminating entropy measures and the related hyper-parameters (e.g., embedding dimension). Results on the trade-off between accuracy and classification time are also presented

    Media forensics on social media platforms: a survey

    Get PDF
    The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the multimedia forensics research community pursued the ambition to scale the forensic analysis to real-world web-based open systems. This survey aims at describing the work done so far on the analysis of shared data, covering three main aspects: forensics techniques performing source identification and integrity verification on media uploaded on social networks, platform provenance analysis allowing to identify sharing platforms, and multimedia verification algorithms assessing the credibility of media objects in relation to its associated textual information. The achieved results are highlighted together with current open issues and research challenges to be addressed in order to advance the field in the next future

    Documenti e Studi sulla Tradizione Filosofica Medievale

    Get PDF

    Hygiene inspections on passenger ships in Europe - an overview

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Hygiene inspections on passenger ships are important for the prevention of communicable diseases. The European Union (EU) countries conduct hygiene inspections on passenger ships in order to ensure that appropriate measures have been taken to eliminate potential sources of contamination which could lead to the spread of communicable diseases. This study was implemented within the framework of the EU SHIPSAN project and it investigates the legislation applied and practices of hygiene inspections of passenger ships in the EU Member States (MS) and European Free Trade Association countries.</p> <p>Methods</p> <p>Two questionnaires were composed and disseminated to 28 countries. A total of 92 questionnaires were completed by competent authorities responsible for hygiene inspections (n = 48) and the creation of legislation (n = 44); response rates were 96%, and 75.9%, respectively.</p> <p>Results</p> <p>Out of the 48 responding authorities responsible for hygiene inspections, a routine programme was used by 19 (39.6%) of these to conduct inspections of ships on national voyages and by 26 (54.2%) for ships on international voyages. Standardised inspection forms are used by 59.1% of the authorities. A scoring inspection system is applied by five (11.6%) of the 43 responding authorities. Environmental sampling is conducted by 84.1% of the authorities (37 out of 44). The inspection results are collected and analysed by 54.5% (24 out of 44) of the authorities, while 9 authorities (20.5%) declared that they publish the results. Inspections are conducted during outbreak investigations by 75% and 70.8% of the authorities, on ships on national and international voyages, respectively. A total of 31 (64.6%) and 39 (81.3%) authorities conducted inspections during complaint investigations on ships on international and on national voyages, respectively. Port-to-port communication between the national port authorities was reported by 35.4% (17 out of 48) of the responding authorities and 20.8% (10 out of 48) of the port authorities of other countries.</p> <p>Conclusion</p> <p>This study revealed a diversity of approaches and practices in the conduct of inspections, differences in the qualifications/knowledge/experience of inspectors, the legislation applied during inspections, and the lack of communication and training among many EU countries. An integrated European inspection programme involving competent expert inspectors in each EU Member States and special training for ship hygiene delivered to crew members and inspectors would help to minimize the risk of communicable diseases. Common inspection tools at a European level for hygiene inspection practices and port-to-port communication are needed.</p

    Red blood cell alloimmunisation in transfusion-dependent thalassaemia: a systematic review.

    Get PDF
    BACKGROUND: Chronic red blood cell transfusion is the first-line treatment for severe forms of thalassaemia. This therapy is, however, hampered by a number of adverse effects, including red blood cell alloimmunisation. The aim of this systematic review was to collect the current literature data on erythrocyte alloimmunisation. MATERIALS AND METHODS: We performed a systematic search of the literature which identified 41 cohort studies involving 9,256 patients. RESULTS: The prevalence of erythrocyte alloimmunisation was 11.4% (95% CI: 9.3-13.9%) with a higher rate of alloimmunisation against antigens of the Rh (52.4%) and Kell (25.6%) systems. Overall, alloantibodies against antigens belonging to the Rh and Kell systems accounted for 78% of the cases. A higher prevalence of red blood cell alloimmunisation was found in patients with thalassaemia intermedia compared to that among patients with thalassaemia major (15.5 vs 12.8%). DISCUSSION: Matching transfusion-dependent thalassaemia patients and red blood cell units for Rh and Kell antigens should be able to reduce the risk of red blood cell alloimmunisation by about 80%

    Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension

    No full text
    Distributed Denial of Service (DDOS) attacks are important threats to network services and applications. Studies in literature have proposed various approaches including Intrusion Detection Systems (IDS) based on the application of machine learning and deep learning, but their computational cost can be significant. For this reason, other studies have proposed efficient IDS algorithms based on the online real-time analysis of the network traffic with a sliding window and entropy or other statistical measures. This paper proposes an online algorithm based on a sliding window with the novel application of the Morphological Fractal Dimension (MFD) to this problem. The results presented in this study show that the application of MFD to the recent CICIDS2017 public data set can obtain a significant improvement in the detection of the DDoS attack in comparison to entropy based approaches. In addition, this paper proposes a novel algorithm for the automatic definition of the sliding window size. This paper reports the impact of the different hyper-parameters, including the parameters present in the definition of MFD and the evaluation of the distance measures, where the Chebyschev distance provides the optimal detection accuracy. The results show a detection accuracy of 99.30%, which performs better than similar approaches on the same data set

    John Buridan's Commentary on the Metaphysics

    No full text
    corecore