286 research outputs found

    An Automatic Digital Audio Authentication/Forensics System

    Get PDF
    With the continuous rise in ingenious forgery, a wide range of digital audio authentication applications are emerging as a preventive and detective control in real-world circumstances, such as forged evidence, breach of copyright protection, and unauthorized data access. To investigate and verify, this paper presents a novel automatic authentication system that differentiates between the forged and original audio. The design philosophy of the proposed system is primarily based on three psychoacoustic principles of hearing, which are implemented to simulate the human sound perception system. Moreover, the proposed system is able to classify between the audio of different environments recorded with the same microphone. To authenticate the audio and environment classification, the computed features based on the psychoacoustic principles of hearing are dangled to the Gaussian mixture model to make automatic decisions. It is worth mentioning that the proposed system authenticates an unknown speaker irrespective of the audio content i.e., independent of narrator and text. To evaluate the performance of the proposed system, audios in multi-environments are forged in such a way that a human cannot recognize them. Subjective evaluation by three human evaluators is performed to verify the quality of the generated forged audio. The proposed system provides a classification accuracy of 99.2% ± 2.6. Furthermore, the obtained accuracy for the other scenarios, such as text-dependent and text-independent audio authentication, is 100% by using the proposed system

    A zero-watermarking algorithm for privacy protection in biomedical signals

    Get PDF
    Confidentiality of health information is indispensable to protect privacy of an individual. However, recent advances in electronic healthcare systems allow transmission of sensitive information through the Internet, which is prone to various vulnerabilities, attacks and may leads to unauthorized disclosure. Such situations may not only create adverse effects for individuals but may also cause severe consequences such as hefty regulatory fines, bad publicity, legal fees, and forensics. To avoid such predicaments, a privacy protected healthcare system is proposed in this study that protects the identity of an individual as well as detects vocal fold disorders. The privacy of the developed healthcare system is based on the proposed zero-watermarking algorithm, which embeds a watermark in a secret key instead of the signals to avoid the distortion in an audio sample. The identity is protected by the generation of its secret shares through visual cryptography. The generated shares are embedded by finding the patterns into the audio with the application of one-dimensional local binary pattern. The proposed zero-watermarking algorithm is evaluated by using audio samples taken from the Massachusetts Eye and Ear Infirmary voice disorder database. Experimental results demonstrate that the proposed algorithm achieves imperceptibility and is reliable in its extraction of identity. In addition, the proposed algorithm does not affect the results of disorder detection and it is robust against noise attacks of various signal-to-noise ratios

    An IoT-based smart healthcare system to detect dysphonia

    Get PDF
    Smart healthcare systems for the internet of things (IoT) platform are cost-efficient and facilitate continuous remote monitoring of patients to avoid unnecessary hospital visits and long waiting times to see practitioners. Presenting a smart healthcare system for the detection of dysphonia can reduce the suffering and pain of patients by providing an initial evaluation of voice. This preliminary feedback of voice could minimize the burden on ENT specialists by referring only genuine cases to them as well as giving an early alarm of potential voice complications to patients. Any possible delay in the treatment and/or inaccurate diagnosis using the subjective nature of tools may lead to severe circumstances for an individual because some types of dysphonia are life-threatening. Therefore, an accurate and reliable smart healthcare system for IoT platform to detect dysphonia is proposed and implemented in this study. Higher-order directional derivatives are used to analyze the time–frequency spectrum of signals in the proposed system. The computed derivatives provide essential and vital information by analyzing the spectrum along different directions to capture the changes that appeared due to malfunctioning the vocal folds. The proposed system provides 99.1% accuracy, while the sensitivity and specificity are 99.4 and 98.1%, respectively. The experimental results showed that the proposed system could provide better classification accuracy than the traditional non-directional first-order derivatives. Hence, the system can be used as a reliable tool for detecting dysphonia and implemented in edge devices to avoid latency issues and protect privacy, unlike cloud processing

    Chaos-based robust method of zero-watermarking for medical signals

    Get PDF
    The growing use of wireless health data transmission via Internet of Things is significantly beneficial to the healthcare industry for optimal usage of health-related facilities. However, at the same time, the use raises concern of privacy protection. Health-related data are private and should be suitably protected. Several pathologies, such as vocal fold disorders, indicate high risks of prevalence in individuals with voice-related occupations, such as teachers, singers, and lawyers. Approximately, one-third of the world population suffers from the voice-related problems during the life span and unauthorized access to their data can create unavoidable circumstances in their personal and professional lives. In this study, a zero-watermarking method is proposed and implemented to protect the identity of patients who suffer from vocal fold disorders. In the proposed method, an image for a patient's identity is generated and inserted into secret keys instead of a host medical signal. Consequently, imperceptibility is naturally achieved. The locations for the insertion of the watermark are determined by a computation of local binary patterns from the time–frequency spectrum. The spectrum is calculated for low frequencies such that it may not be affected by noise attacks. The experimental results suggest that the proposed method has good performance and robustness against noise, and it is reliable in the recovery of an individual's identity

    Automatic Gender Detection Based on Characteristics of Vocal Folds for Mobile Healthcare System

    Get PDF
    An automatic gender detection may be useful in some cases of a mobile healthcare system. For example, there are some pathologies, such as vocal fold cyst, which mainly occur in female patients. If there is an automatic method for gender detection embedded into the system, it is easy for a healthcare professional to assess and prescribe appropriate medication to the patient. In human voice production system, contribution of the vocal folds is very vital. The length of the vocal folds is gender dependent; a male speaker has longer vocal folds than a female speaker. Due to longer vocal folds, the voice of a male becomes heavy and, therefore, contains more voice intensity. Based on this idea, a new type of time domain acoustic feature for automatic gender detection system is proposed in this paper. The proposed feature measures the voice intensity by calculating the area under the modified voice contour to make the differentiation between males and females. Two different databases are used to show that the proposed feature is independent of text, spoken language, dialect region, recording system, and environment. The obtained results for clean and noisy speech are 98.27% and 96.55%, respectively

    Safe Haven or Hedge: Diversification Abilities of Asset Classes in Pakistan

    Get PDF
    This study compares the safe haven properties of asset classes of real estate (house, plot and residential), gold, dollar, and oil against equity returns in Pakistan for the period January 2011-December 2020. We employ the wavelet coherence to encapsulate the overall dependence and correlation of asset classes. Our results show the dependence is weaker (stronger) in short (long) term investment horizon. We also study the potential of diversification at the tail of returns distribution by applying wavelet value-at-risk (VaR) framework that reveals the degree of co-movement between gold and equity returns greatly affects the portfolio risk followed by residential property and oil. Our findings are beneficial for the individual investor, fund managers and financial advisors looking for the optimal portfolio combination that hedge the excessive negative movements in equity returns subject to the heterogeneity in the investment horizon

    Protection of Records and Data Authentication based on Secret Shares and Watermarking

    Get PDF
    The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor’s data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be accessible to only the relevant healthcare staff to avoid any unfortunate circumstances for the patient as well as for the healthcare providers. Therefore, a method to protect the identity of a patient and authentication of transmitted data is proposed in this study. The proposed method provides dual protection. First, it encrypts the identity using Shamir’s secret sharing scheme without the increase in dimension of the original identity. Second, the identity is watermarked using zero-watermarking to avoid any distortion into the host signal. The experimental results show that the proposed method encrypts, embeds and extracts identities reliably. Moreover, in case of malicious attack, the method distorts the embedded identity which provides a clear indication of fabrication. An automatic disorder detection system using Mel-frequency cepstral coefficients and Gaussian mixture model is also implemented which concludes that malicious attacks greatly impact on the accurate diagnosis of disorders

    Blind Detection of Copy-Move Forgery in Digital Audio Forensics

    Get PDF
    Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark or signature in an audio that is unknown in most of the real-life scenarios. Therefore, forgery localization becomes more challenging, especially when using blind methods. In this paper, we propose a novel method for blind detection and localization of copy-move forgery. One of the most crucial steps in the proposed method is a voice activity detection (VAD) module for investigating audio recordings to detect and localize the forgery. The VAD module is equally vital for the development of the copy-move forgery database, wherein audio samples are generated by using the recordings of various types of microphones. We employ a chaotic theory to copy and move the text in generated forged recordings to ensure forgery localization at any place in a recording. The VAD module is responsible for the extraction of words in a forged audio, and these words are analyzed by applying a 1-D local binary pattern operator. This operator provides the patterns of extracted words in the form of histograms. The forged parts (copy and move text) have similar histograms. An accuracy of 96.59% is achieved, and the proposed method is deemed robust against noise

    The Influence of Board Characteristics on Shareholders Assessment of Risk for Small and Large Firms: Evidence from Pakistan

    Get PDF
    This unique study examines the alliance between board characteristics and shareholders assessment of risk as revealed in the volatility of stock returns for Pakistani listed companies. For this purpose, a sample of 30 manufacturing companies is used that are listed on Karachi Stock Exchange for the period of 2004 to 2013.  The study uses panel data analysis and reports that random effect model is the best results yielding method. Our hypothesis incorporates preceding evidence that the small and large firms have spectacularly diverse constitution of boards, shimmering the firms diverse monitoring and counseling needs. It is hypothesized and locate confirmation with the intention of entrenched the large firms are able to produce affirmative net benefits, in the appearance of lesser risk, form board independence, gender diversity and director ownership. On the other hand the finding of this study showed the board size is negatively associated with the shareholder assessment of risk for large firms and the positive associated with the assessment of risk for small firms. The CEO duality is positive associated with the assessment of risk for large and negative associated amid assessment of risk for small firms. The results have insinuation for regulatory authorities, shareholders and directors to take steps to improve the board competanices for better performance. Keywords: Board Characteristics, Shareholders Assessment of Risk, Panel Data Analysis, Karachi Stock Exchange JEL Classifications: G32, G34, G38

    Direct maternal morbidity and the risk of pregnancy-related deaths, stillbirths, and neonatal deaths in south Asia and sub-Saharan Africa: A population-based prospective cohort study in 8 countries

    Get PDF
    Background: Maternal morbidity occurs several times more frequently than mortality, yet data on morbidity burden and its effect on maternal, foetal, and newborn outcomes are limited in low- and middle-income countries. We aimed to generate prospective, reliable population-based data on the burden of major direct maternal morbidities in the antenatal, intrapartum, and postnatal periods and its association with maternal, foetal, and neonatal death in South Asia and sub-Saharan Africa.Methods and findings: This is a prospective cohort study, conducted in 9 research sites in 8 countries of South Asia and sub-Saharan Africa. We conducted population-based surveillance of women of reproductive age (15 to 49 years) to identify pregnancies. Pregnant women who gave consent were include in the study and followed up to birth and 42 days postpartum from 2012 to 2015. We used standard operating procedures, data collection tools, and training to harmonise study implementation across sites. Three home visits during pregnancy and 2 home visits after birth were conducted to collect maternal morbidity information and maternal, foetal, and newborn outcomes. We measured blood pressure and proteinuria to define hypertensive disorders of pregnancy and woman\u27s self-report to identify obstetric haemorrhage, pregnancy-related infection, and prolonged or obstructed labour. Enrolled women whose pregnancy lasted at least 28 weeks or those who died during pregnancy were included in the analysis. We used meta-analysis to combine site-specific estimates of burden, and regression analysis combining all data from all sites to examine associations between the maternal morbidities and adverse outcomes. Among approximately 735,000 women of reproductive age in the study population, and 133,238 pregnancies during the study period, only 1.6% refused consent. Of these, 114,927 pregnancies had morbidity data collected at least once in both antenatal and in postnatal period, and 114,050 of them were included in the analysis. Overall, 32.7% of included pregnancies had at least one major direct maternal morbidity; South Asia had almost double the burden compared to sub-Saharan Africa (43.9%, 95% CI 27.8% to 60.0% in South Asia; 23.7%, 95% CI 19.8% to 27.6% in sub-Saharan Africa). Antepartum haemorrhage was reported in 2.2% (95% CI 1.5% to 2.9%) pregnancies and severe postpartum in 1.7% (95% CI 1.2% to 2.2%) pregnancies. Preeclampsia or eclampsia was reported in 1.4% (95% CI 0.9% to 2.0%) pregnancies, and gestational hypertension alone was reported in 7.4% (95% CI 4.6% to 10.1%) pregnancies. Prolonged or obstructed labour was reported in about 11.1% (95% CI 5.4% to 16.8%) pregnancies. Clinical features of late third trimester antepartum infection were present in 9.1% (95% CI 5.6% to 12.6%) pregnancies and those of postpartum infection in 8.6% (95% CI 4.4% to 12.8%) pregnancies. There were 187 pregnancy-related deaths per 100,000 births, 27 stillbirths per 1,000 births, and 28 neonatal deaths per 1,000 live births with variation by country and region. Direct maternal morbidities were associated with each of these outcomes.Conclusions: Our findings imply that health programmes in sub-Saharan Africa and South Asia must intensify their efforts to identify and treat maternal morbidities, which affected about one-third of all pregnancies and to prevent associated maternal and neonatal deaths and stillbirths.Trial registration: The study is not a clinical trial
    • …
    corecore