1
|
Kane J, Johnstone MN, Szewczyk P. Voice Synthesis Improvement by Machine Learning of Natural Prosody. SENSORS (BASEL, SWITZERLAND) 2024; 24:1624. [PMID: 38475158 DOI: 10.3390/s24051624] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/03/2024] [Revised: 02/25/2024] [Accepted: 02/28/2024] [Indexed: 03/14/2024]
Abstract
Since the advent of modern computing, researchers have striven to make the human-computer interface (HCI) as seamless as possible. Progress has been made on various fronts, e.g., the desktop metaphor (interface design) and natural language processing (input). One area receiving attention recently is voice activation and its corollary, computer-generated speech. Despite decades of research and development, most computer-generated voices remain easily identifiable as non-human. Prosody in speech has two primary components-intonation and rhythm-both often lacking in computer-generated voices. This research aims to enhance computer-generated text-to-speech algorithms by incorporating melodic and prosodic elements of human speech. This study explores a novel approach to add prosody by using machine learning, specifically an LSTM neural network, to add paralinguistic elements to a recorded or generated voice. The aim is to increase the realism of computer-generated text-to-speech algorithms, to enhance electronic reading applications, and improved artificial voices for those in need of artificial assistance to speak. A computer that is able to also convey meaning with a spoken audible announcement will also improve human-to-computer interactions. Applications for the use of such an algorithm may include improving high-definition audio codecs for telephony, renewing old recordings, and lowering barriers to the utilization of computing. This research deployed a prototype modular platform for digital speech improvement by analyzing and generalizing algorithms into a modular system through laboratory experiments to optimize combinations and performance in edge cases. The results were encouraging, with the LSTM-based encoder able to produce realistic speech. Further work will involve optimizing the algorithm and comparing its performance against other approaches.
Collapse
Affiliation(s)
- Joseph Kane
- Cyber Security Cooperative Research Centre, Edith Cowan University, 270 Joondalup Drive, Joondalup, WA 6027, Australia
- Security Research Institute, Edith Cowan University, Joondalup, WA 6027, Australia
| | - Michael N Johnstone
- Cyber Security Cooperative Research Centre, Edith Cowan University, 270 Joondalup Drive, Joondalup, WA 6027, Australia
- Security Research Institute, Edith Cowan University, Joondalup, WA 6027, Australia
| | - Patryk Szewczyk
- Cyber Security Cooperative Research Centre, Edith Cowan University, 270 Joondalup Drive, Joondalup, WA 6027, Australia
- Security Research Institute, Edith Cowan University, Joondalup, WA 6027, Australia
| |
Collapse
|
2
|
Naeem EA, Saied A, EL-Fishawy AS, Rihan M, El-Samie FEA, El-Banby GM. Utilization of adaptive filtering for biometric template masking. OPTICAL AND QUANTUM ELECTRONICS 2023; 55:573. [DOI: 10.1007/s11082-022-04456-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/31/2022] [Accepted: 12/03/2022] [Indexed: 09/02/2023]
|
3
|
Yang W, Wang S, Cui H, Tang Z, Li Y. A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. SENSORS (BASEL, SWITZERLAND) 2023; 23:3566. [PMID: 37050626 PMCID: PMC10098691 DOI: 10.3390/s23073566] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/19/2023] [Revised: 03/20/2023] [Accepted: 03/27/2023] [Indexed: 06/19/2023]
Abstract
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced by biometrics. This survey provides a comprehensive review of state-of-the-art HE research in the context of biometrics. Detailed analyses and discussions are conducted on various HE approaches to biometric security according to the categories of different biometric traits. Moreover, this review presents the perspective of integrating HE with other emerging technologies (e.g., machine/deep learning and blockchain) for biometric security. Finally, based on the latest development of HE in biometrics, challenges and future research directions are put forward.
Collapse
Affiliation(s)
- Wencheng Yang
- School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, QLD 4350, Australia
| | - Song Wang
- School of Computing, Engineering and Mathematical Sciences, La Trobe University, Bundoora, VIC 3086, Australia
| | - Hui Cui
- Faculty of IT, Claytyon Campus, Monash University, Clayton, VIC 3800, Australia
| | - Zhaohui Tang
- School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, QLD 4350, Australia
| | - Yan Li
- School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, QLD 4350, Australia
| |
Collapse
|
4
|
A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection. Artif Intell Rev 2022. [DOI: 10.1007/s10462-022-10334-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
5
|
Abstract
Biometric technology has received a lot of attention in recent years. One of the most prevalent biometric traits is the finger-knuckle print (FKP). Because the dorsal region of the finger is not exposed to surfaces, FKP would be a dependable and trustworthy biometric. We provide an FKP framework that uses the VGG-19 deep learning model to extract deep features from FKP images in this paper. The deep features are collected from the VGG-19 model’s fully connected layer 6 (F6) and fully connected layer 7 (F7). After applying multiple preprocessing steps, such as combining features from different layers and performing dimensionality reduction using principal component analysis (PCA), the extracted deep features are put to the test. The proposed system’s performance is assessed using experiments on the Delhi Finger Knuckle Dataset employing a variety of common classifiers. The best identification result was obtained when the Artificial neural network (ANN) classifier was applied to the principal components of the averaged feature vector of F6 and F7 deep features, with 95% of the data variance preserved. The findings also demonstrate the feasibility of employing these deep features in an FKP recognition system.
Collapse
|
6
|
Wearable Sensors and Systems in the IoT. SENSORS 2021; 21:s21237880. [PMID: 34883879 PMCID: PMC8659719 DOI: 10.3390/s21237880] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/19/2021] [Accepted: 11/23/2021] [Indexed: 02/03/2023]
Abstract
Wearable smart devices are widely used to determine various physico-mechanical parameters at chosen intervals. The proliferation of such devices has been driven by the acceptance of enhanced technology in society [...].
Collapse
|
7
|
Yang W, Wang S, Sahri NM, Karie NM, Ahmed M, Valli C. Biometrics for Internet-of-Things Security: A Review. SENSORS (BASEL, SWITZERLAND) 2021; 21:6163. [PMID: 34577370 PMCID: PMC8472874 DOI: 10.3390/s21186163] [Citation(s) in RCA: 17] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/13/2021] [Revised: 09/10/2021] [Accepted: 09/11/2021] [Indexed: 11/16/2022]
Abstract
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
Collapse
Affiliation(s)
- Wencheng Yang
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Song Wang
- School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, VIC 3086, Australia;
| | - Nor Masri Sahri
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Nickson M. Karie
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Mohiuddin Ahmed
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Craig Valli
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| |
Collapse
|