193 research outputs found

    Estimating toner usage with laser electrophotographic printers, and object map generation from raster input image

    Get PDF
    Accurate estimation of toner usage is an area of on-going importance for laser, electrophotographic (EP) printers. In Part 1, we propose a new two-stage approach in which we first predict on a pixel-by-pixel basis, the absorptance from printed and scanned pages. We then form a weighted sum of these pixel values to predict overall toner usage on the printed page. The weights are chosen by least-squares regression to toner usage measured with a set of printed test pages. Our two-stage predictor significantly outperforms existing methods that are based on a simple pixel counting strategy in terms of both accuracy and robustness of the predictions.^ In Part 2, we describe a raster-input-based object map generation algorithm (OMGA) for laser, electrophotographic (EP) printers. The object map is utilized in the object-oriented halftoning approach, where different halftone screens and color maps are applied to different types of objects on the page in order to improve the overall printing quality. The OMGA generates object map from the raster input directly. It solves problems such as the object map obtained from the page description language (PDL) is incorrect, and an initial object map is unavailable from the processing pipeline. A new imaging pipeline for the laser EP printer incorporating both the OMGA and the object-oriented halftoning approach is proposed. The OMGA is a segmentation-based classification approach. It first detects objects according to the edge information, and then classifies the objects by analyzing the feature values extracted from the contour and the interior of each object. The OMGA is designed to be hardware-friendly, and can be implemented within two passes through the input document

    IJDAR DOI 10.1007/s10032-011-0181-5 ORIGINAL PAPER Text-line examination for document forgery detection

    Get PDF
    Abstract In this paper, an approach for forgery detection using text-line information is presented. In questioned document examination, text-line rotation and alignment can be important clues for detecting tampered documents. Measuring and detecting such mis-rotations and mis-alignments are a cumbersome task. Therefore, an automated approach for verification of documents based on these two text-line features is proposed in this paper. An in-depth evaluation of the proposed methods shows its usefulness in the context of document security with an area under the ROC curve (AUC) score of AUC = 0.89. The automatic nature of the approach allows the presented methods to be used in high-volume environments

    UA77/1 Alumni

    Get PDF
    WKU alumni magazine. Features the following articles: Meredith, Thomas. Western Spirit Alive on the Hill - Budget Western to Offer Master of Professional Accountancy Degree Tandy Computer Donation To Support Teacher Education Journalism Program Re-accredited Health Care Administration Accredited Kodak Helps Western Establish Electronic Darkroom Gifts Boost Women’s Studies Programs Western Offering Canadian Studies Certificate Finalists Announced for 1992 University Awards Eugene Meyers Appointed to Military Advisory Committee Mike Morse Honored by Kodak Television Program Earns National recognition – WKYU-TV Judy Woodring Elected Vice President of Forensics Association Eula Monroe Honored by Math Teachers Paul Cook Retires After 32 Years Forensics Teams Post State Wins Joe Rains Elected Associated Student Government President Journalism Students Win in Hearst Competition Ann Clark Receives Phi Kappa Phi Scholarship Russian Student Wins Piano Competition – Karina Khalatova Florida Swimming Standout Signs with Western – Doug Evans Missy Jackson Signs with Lady Toppers Western Tied in Commissioners Cup Race Emberton, Tom. An Open Letter from Tom Emberton Stepping Back in Time – President’s Club Reception Budget Cuts Thanks, Mom! Commencement 1992 Raque, Sally. Beverly Hills Tops – Basketball Athletic Hall of Fame WKU Alumni Team Up to Write Book – Garry Lacefield, Don Ball We’re Missing Some Sheep – Class of 1942 Alumni Chapter Presidents Alumni Club Meetings Class Notes In Memoriam – List Only Oozebal

    Image and Video Forensics

    Get PDF
    Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity

    Verification of Authenticity of Stamps in Documents

    Get PDF
    Klasická inkoustová razítka, která se používají k autorizaci dokumentů, se dnes díky rozšíření moderních technologií dají relativně snadno padělat metodou oskenování a vytištění. V rámci diplomové práce je vyvíjen automatický nástroj pro ověření pravosti razítek, který najde využití zejména v prostředích, kde je nutné zpracovávat velké množství dokumentů. Procesu ověření pravosti razítka musí přirozeně předcházet jeho detekce v dokumentu - úloha zpracování obrazu, která zatím nemá přesvědčivé řešení. V této diplomové práci je navržena zcela nová metoda detekce a ověření pravosti razítka v barevných obrazech dokumentů. Tato metoda zahrnuje plnou segmentaci stránky za účelem určení kandidátních řešení, dále extrakci příznaků a následnou klasifikaci kandidátů za pomoci algoritmu podpůrných vektorů (SVM). Evaluace ukázala, že algoritmus umožňuje rozlišovat razítka od jiných barevných objektů v dokumentu jako jsou například loga a barevné nápisy. Kromě toho algoritmus dokáže rozlišit pravá razítka od kopií.Classical ink stamps and seals used for authentication of a document content have become relatively easy to forge by the scan & print technique since the technology is available to general public. For environments where a huge volume of documents is processed, an automatic system for verification of authenticity of stamps is being developed in the scope of this master's thesis. The process of stamp authenticity verification naturally must be preceded by the phase of stamp detection and segmentation - a difficult task of Document Image Analysis (DIA). In this master's thesis, a novel method for detection and verification of stamps in color document images is proposed. It involves a full segmentation of the page to identify candidate solutions, extraction of features, and further classification of the candidates by means of support vector machines. The evaluation has shown that the algorithm is capable of differentiating stamps from other color objects in the document such as logos or text and also genuine stamps from copied ones.

    Small Groups, Big Weapons: The Nexus of Emerging Technologies and Weapons of Mass Destruction Terrorism

    Get PDF
    Historically, only nation-states have had the capacity and resources to develop weapons of mass destruction (WMD). This was due to the significant capital, infrastructure, and intellectual capacity required to develop and maintain a WMD program. This paradigm, however, is shifting. To be clear, non-state actors have been interested in WMD for decades. In fact, over a 26-year period, there were 525 incidents by non-state actors involving nuclear, biological, and chemical agents. But the scale of these incidents was relatively low level when compared to the impact of terrorist attacks using conventional weapons. However, this reality must be reexamined given the commercialization of emerging technologies that is reducing the financial, intellectual, and material barriers required for WMD development and employment. This report serves as a primer that surveys the key challenges facing non-state actors pursuing WMD capabilities, and the potential for certain emerging technologies to help overcome them. While there are numerous examples of such technologies, this report focuses on synthetic biology, additive manufacturing (AM) (commonly known as 3D printing), and unmanned aerial systems (UAS). There is a wide range of expert opinions regarding the dual-use nature of the technologies discussed in this report, the ease of their possible misuse, and the potential threats they pose. The varied opinions of scientists and government officials highlight the challenges these technologies pose to developing a cohesive strategy to prevent their proliferation for nefarious use by non-state actors. Much of the risk and threat associated with these dual-use technologies resides in the intent of the user

    THE DEPARTMENT OF DEFENSE’S NEW OPERATIONAL ENVIRONMENT: OT

    Get PDF
    The purpose of this thesis is to outline how the Department of Defense (DoD), through Cyber Command, can holistically incorporate the cybersecurity of both DoD and non-DoD critical infrastructure into its cyber operations framework. The United States and the DoD rely on critical infrastructure for basic life support to both civilians and the Armed Forces members tasked with the defense of this nation. Critical infrastructure is made up of industrial controls systems that fall under the taxonomy of operational technology (OT). In the 2018 Cyber Strategy, the DoD has been charged with defending both DoD and non-DoD critical infrastructure in a more aggressive posture to “defend forward.” To do this, the DoD needs to incorporate cybersecurity of critical infrastructure into the DoD’s holistic cybersecurity plan. However, the DoD has yet to address who will assume this mission, and how it will be accomplished. This research seeks to answer these questions and the reasons leading up to the DoD’s sudden change in policy

    Sixth Annual Users' Conference

    Get PDF
    Conference papers and presentation outlines which address the use of the Transportable Applications Executive (TAE) and its various applications programs are compiled. Emphasis is given to the design of the user interface and image processing workstation in general. Alternate ports of TAE and TAE subsystems are also covered
    corecore