3,601 research outputs found
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
With advanced image journaling tools, one can easily alter the semantic
meaning of an image by exploiting certain manipulation techniques such as
copy-clone, object splicing, and removal, which mislead the viewers. In
contrast, the identification of these manipulations becomes a very challenging
task as manipulated regions are not visually apparent. This paper proposes a
high-confidence manipulation localization architecture which utilizes
resampling features, Long-Short Term Memory (LSTM) cells, and encoder-decoder
network to segment out manipulated regions from non-manipulated ones.
Resampling features are used to capture artifacts like JPEG quality loss,
upsampling, downsampling, rotation, and shearing. The proposed network exploits
larger receptive fields (spatial maps) and frequency domain correlation to
analyze the discriminative characteristics between manipulated and
non-manipulated regions by incorporating encoder and LSTM network. Finally,
decoder network learns the mapping from low-resolution feature maps to
pixel-wise predictions for image tamper localization. With predicted mask
provided by final layer (softmax) of the proposed architecture, end-to-end
training is performed to learn the network parameters through back-propagation
using ground-truth masks. Furthermore, a large image splicing dataset is
introduced to guide the training process. The proposed method is capable of
localizing image manipulations at pixel level with high precision, which is
demonstrated through rigorous experimentation on three diverse datasets
Storage Capacity of Two-dimensional Neural Networks
We investigate the maximum number of embedded patterns in the two-dimensional
Hopfield model. The grand state energies of two specific network states,
namely, the energies of the pure-ferromagnetic state and the state of specific
one stored pattern are calculated exactly in terms of the correlation function
of the ferromagnetic Ising model. We also investigate the energy landscape
around them by computer simulations. Taking into account the qualitative
features of the phase diagrams obtained by Nishimori, Whyte and Sherrington
[Phys. Rev. E {\bf 51}, 3628 (1995)], we conclude that the network cannot
retrieve more than three patterns.Comment: 13pages, 7figures, revtex
A random fiber bundle with many discontinuities in the threshold distribution
We study the breakdown of a random fiber bundle model (RFBM) with
-discontinuities in the threshold distribution using the global load sharing
scheme. In other words, different classes of fibers identified on the
basis of their threshold strengths are mixed such that the strengths of the
fibers in the class are uniformly distributed between the values
and where . Moreover, there
is a gap in the threshold distribution between and class. We
show that although the critical stress depends on the parameter values of the
system, the critical exponents are identical to that obtained in the recursive
dynamics of a RFBM with a uniform distribution and global load sharing. The
avalanche size distribution (ASD), on the other hand, shows a non-universal,
non-power law behavior for smaller values of avalanche sizes which becomes
prominent only when a critical distribution is approached. We establish that
the behavior of the avalanche size distribution for an arbitrary is
qualitatively similar to a RFBM with a single discontinuity in the threshold
distribution (), especially when the density and the range of threshold
values of fibers belonging to strongest ()-th class is kept identical in
all the cases.Comment: 6 pages, 4 figures, Accepted in Phys. Rev.
Effect of discontinuity in threshold distribution on the critical behaviour of a random fiber bundle
The critical behaviour of a Random Fiber Bundle Model with mixed uniform
distribution of threshold strengths and global load sharing rule is studied
with a special emphasis on the nature of distribution of avalanches for
different parameters of the distribution. The discontinuity in the threshold
strength distribution of fibers non-trivially modifies the critical stress as
well as puts a restriction on the allowed values of parameters for which the
recursive dynamics approach holds good. The discontinuity leads to a
non-universal behaviour in the avalanche size distribution for smaller values
of avalanche size. We observe that apart from the mean field behaviour for
larger avalanches, a new behaviour for smaller avalanche size is observed as a
critical threshold distribution is approached. The phenomenological
understanding of the above result is provided using the exact analytical result
for the avalanche size distribution. Most interestingly,the prominence of
non-universal behaviour in avalanche size distribution depends on the system
parameters.Comment: 6 pages, 4 figures, text and figures modifie
Strongly anisotropic roughness in surfaces driven by an oblique particle flux
Using field theoretic renormalization, an MBE-type growth process with an
obliquely incident influx of atoms is examined. The projection of the beam on
the substrate plane selects a "parallel" direction, with rotational invariance
restricted to the transverse directions. Depending on the behavior of an
effective anisotropic surface tension, a line of second order transitions is
identified, as well as a line of potentially first order transitions, joined by
a multicritical point. Near the second order transitions and the multicritical
point, the surface roughness is strongly anisotropic. Four different roughness
exponents are introduced and computed, describing the surface in different
directions, in real or momentum space. The results presented challenge an
earlier study of the multicritical point.Comment: 11 pages, 2 figures, REVTeX
Phase transitions in periodically driven macroscopic systems
We study the large-time behavior of a class of periodically driven
macroscopic systems. We find, for a certain range of the parameters of either
the system or the driving fields, the time-averaged asymptotic behavior
effectively is that of certain other equilibrium systems. We then illustrate
with a few examples how the conventional knowledge of the equilibrium systems
can be made use in choosing the driving fields to engineer new phases and to
induce new phase transitions.Comment: LaTex, 8 page
Decoherence Dynamics of Measurement-Induced Nonlocality and comparison with Geometric Discord for two qubit systems
We check the decoherence dynamics of Measurement-induced Nonlocality(in
short, MIN) and compare it with geometric discord for two qubit systems. There
are quantum states, on which the action of dephasing channel cannot destroy MIN
in finite or infinite time. We check the additive dynamics of MIN on a qubit
state under two independent noise. Geometric discord also follows such additive
dynamics like quantum discord. We have further compared non-Markovian evolution
of MIN and geometric discord under dephasing and amplitude damping noise for
pure state and it shows distinct differences between their dynamics.Comment: 11 pages, 10 figures, Revte
Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
Realistic image forgeries involve a combination of splicing, resampling,
cloning, region removal and other methods. While resampling detection
algorithms are effective in detecting splicing and resampling, copy-move
detection algorithms excel in detecting cloning and region removal. In this
paper, we combine these complementary approaches in a way that boosts the
overall accuracy of image manipulation detection. We use the copy-move
detection method as a pre-filtering step and pass those images that are
classified as untampered to a deep learning based resampling detection
framework. Experimental results on various datasets including the 2017 NIST
Nimble Challenge Evaluation dataset comprising nearly 10,000 pristine and
tampered images shows that there is a consistent increase of 8%-10% in
detection rates, when copy-move algorithm is combined with different resampling
detection algorithms
Generalized Rate-Code Model for Neuron Ensembles with Finite Populations
We have proposed a generalized Langevin-type rate-code model subjected to
multiplicative noise, in order to study stationary and dynamical properties of
an ensemble containing {\it finite} neurons. Calculations using the
Fokker-Planck equation (FPE) have shown that owing to the multiplicative noise,
our rate model yields various kinds of stationary non-Gaussian distributions
such as gamma, inverse-Gaussian-like and log-normal-like distributions, which
have been experimentally observed. Dynamical properties of the rate model have
been studied with the use of the augmented moment method (AMM), which was
previously proposed by the author with a macroscopic point of view for
finite-unit stochastic systems. In the AMM, original -dimensional stochastic
differential equations (DEs) are transformed into three-dimensional
deterministic DEs for means and fluctuations of local and global variables.
Dynamical responses of the neuron ensemble to pulse and sinusoidal inputs
calculated by the AMM are in good agreement with those obtained by direct
simulation. The synchronization in the neuronal ensemble is discussed.
Variabilities of the firing rate and of the interspike interval (ISI) are shown
to increase with increasing the magnitude of multiplicative noise, which may be
a conceivable origin of the observed large variability in cortical neurons.Comment: 19 pages, 9 figures, accepted in Phys. Rev. E after minor
modification
Tree Buffers
In runtime verification, the central problem is to decide if a given program execution violates a given property. In online runtime verification, a monitor observes a program’s execution as it happens. If the program being observed has hard real-time constraints, then the monitor inherits them. In the presence of hard real-time constraints it becomes a challenge to maintain enough information to produce error traces, should a property violation be observed. In this paper we introduce a data structure, called tree buffer, that solves this problem in the context of automata-based monitors: If the monitor itself respects hard real-time constraints, then enriching it by tree buffers makes it possible to provide error traces, which are essential for diagnosing defects. We show that tree buffers are also useful in other application domains. For example, they can be used to implement functionality of capturing groups in regular expressions. We prove optimal asymptotic bounds for our data structure, and validate them using empirical data from two sources: regular expression searching through Wikipedia, and runtime verification of execution traces obtained from the DaCapo test suite
- …