3,601 research outputs found

    Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

    Full text link
    With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy-clone, object splicing, and removal, which mislead the viewers. In contrast, the identification of these manipulations becomes a very challenging task as manipulated regions are not visually apparent. This paper proposes a high-confidence manipulation localization architecture which utilizes resampling features, Long-Short Term Memory (LSTM) cells, and encoder-decoder network to segment out manipulated regions from non-manipulated ones. Resampling features are used to capture artifacts like JPEG quality loss, upsampling, downsampling, rotation, and shearing. The proposed network exploits larger receptive fields (spatial maps) and frequency domain correlation to analyze the discriminative characteristics between manipulated and non-manipulated regions by incorporating encoder and LSTM network. Finally, decoder network learns the mapping from low-resolution feature maps to pixel-wise predictions for image tamper localization. With predicted mask provided by final layer (softmax) of the proposed architecture, end-to-end training is performed to learn the network parameters through back-propagation using ground-truth masks. Furthermore, a large image splicing dataset is introduced to guide the training process. The proposed method is capable of localizing image manipulations at pixel level with high precision, which is demonstrated through rigorous experimentation on three diverse datasets

    Storage Capacity of Two-dimensional Neural Networks

    Get PDF
    We investigate the maximum number of embedded patterns in the two-dimensional Hopfield model. The grand state energies of two specific network states, namely, the energies of the pure-ferromagnetic state and the state of specific one stored pattern are calculated exactly in terms of the correlation function of the ferromagnetic Ising model. We also investigate the energy landscape around them by computer simulations. Taking into account the qualitative features of the phase diagrams obtained by Nishimori, Whyte and Sherrington [Phys. Rev. E {\bf 51}, 3628 (1995)], we conclude that the network cannot retrieve more than three patterns.Comment: 13pages, 7figures, revtex

    A random fiber bundle with many discontinuities in the threshold distribution

    Full text link
    We study the breakdown of a random fiber bundle model (RFBM) with nn-discontinuities in the threshold distribution using the global load sharing scheme. In other words, n+1n+1 different classes of fibers identified on the basis of their threshold strengths are mixed such that the strengths of the fibers in the ithi-th class are uniformly distributed between the values σ2i2\sigma_{2i-2} and σ2i1\sigma_{2i-1} where 1in+11 \leq i \leq n+1. Moreover, there is a gap in the threshold distribution between ithi-th and i+1thi+1-th class. We show that although the critical stress depends on the parameter values of the system, the critical exponents are identical to that obtained in the recursive dynamics of a RFBM with a uniform distribution and global load sharing. The avalanche size distribution (ASD), on the other hand, shows a non-universal, non-power law behavior for smaller values of avalanche sizes which becomes prominent only when a critical distribution is approached. We establish that the behavior of the avalanche size distribution for an arbitrary nn is qualitatively similar to a RFBM with a single discontinuity in the threshold distribution (n=1n=1), especially when the density and the range of threshold values of fibers belonging to strongest (n+1n+1)-th class is kept identical in all the cases.Comment: 6 pages, 4 figures, Accepted in Phys. Rev.

    Effect of discontinuity in threshold distribution on the critical behaviour of a random fiber bundle

    Full text link
    The critical behaviour of a Random Fiber Bundle Model with mixed uniform distribution of threshold strengths and global load sharing rule is studied with a special emphasis on the nature of distribution of avalanches for different parameters of the distribution. The discontinuity in the threshold strength distribution of fibers non-trivially modifies the critical stress as well as puts a restriction on the allowed values of parameters for which the recursive dynamics approach holds good. The discontinuity leads to a non-universal behaviour in the avalanche size distribution for smaller values of avalanche size. We observe that apart from the mean field behaviour for larger avalanches, a new behaviour for smaller avalanche size is observed as a critical threshold distribution is approached. The phenomenological understanding of the above result is provided using the exact analytical result for the avalanche size distribution. Most interestingly,the prominence of non-universal behaviour in avalanche size distribution depends on the system parameters.Comment: 6 pages, 4 figures, text and figures modifie

    Strongly anisotropic roughness in surfaces driven by an oblique particle flux

    Full text link
    Using field theoretic renormalization, an MBE-type growth process with an obliquely incident influx of atoms is examined. The projection of the beam on the substrate plane selects a "parallel" direction, with rotational invariance restricted to the transverse directions. Depending on the behavior of an effective anisotropic surface tension, a line of second order transitions is identified, as well as a line of potentially first order transitions, joined by a multicritical point. Near the second order transitions and the multicritical point, the surface roughness is strongly anisotropic. Four different roughness exponents are introduced and computed, describing the surface in different directions, in real or momentum space. The results presented challenge an earlier study of the multicritical point.Comment: 11 pages, 2 figures, REVTeX

    Phase transitions in periodically driven macroscopic systems

    Full text link
    We study the large-time behavior of a class of periodically driven macroscopic systems. We find, for a certain range of the parameters of either the system or the driving fields, the time-averaged asymptotic behavior effectively is that of certain other equilibrium systems. We then illustrate with a few examples how the conventional knowledge of the equilibrium systems can be made use in choosing the driving fields to engineer new phases and to induce new phase transitions.Comment: LaTex, 8 page

    Decoherence Dynamics of Measurement-Induced Nonlocality and comparison with Geometric Discord for two qubit systems

    Full text link
    We check the decoherence dynamics of Measurement-induced Nonlocality(in short, MIN) and compare it with geometric discord for two qubit systems. There are quantum states, on which the action of dephasing channel cannot destroy MIN in finite or infinite time. We check the additive dynamics of MIN on a qubit state under two independent noise. Geometric discord also follows such additive dynamics like quantum discord. We have further compared non-Markovian evolution of MIN and geometric discord under dephasing and amplitude damping noise for pure state and it shows distinct differences between their dynamics.Comment: 11 pages, 10 figures, Revte

    Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

    Full text link
    Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in detecting cloning and region removal. In this paper, we combine these complementary approaches in a way that boosts the overall accuracy of image manipulation detection. We use the copy-move detection method as a pre-filtering step and pass those images that are classified as untampered to a deep learning based resampling detection framework. Experimental results on various datasets including the 2017 NIST Nimble Challenge Evaluation dataset comprising nearly 10,000 pristine and tampered images shows that there is a consistent increase of 8%-10% in detection rates, when copy-move algorithm is combined with different resampling detection algorithms

    Generalized Rate-Code Model for Neuron Ensembles with Finite Populations

    Full text link
    We have proposed a generalized Langevin-type rate-code model subjected to multiplicative noise, in order to study stationary and dynamical properties of an ensemble containing {\it finite} NN neurons. Calculations using the Fokker-Planck equation (FPE) have shown that owing to the multiplicative noise, our rate model yields various kinds of stationary non-Gaussian distributions such as gamma, inverse-Gaussian-like and log-normal-like distributions, which have been experimentally observed. Dynamical properties of the rate model have been studied with the use of the augmented moment method (AMM), which was previously proposed by the author with a macroscopic point of view for finite-unit stochastic systems. In the AMM, original NN-dimensional stochastic differential equations (DEs) are transformed into three-dimensional deterministic DEs for means and fluctuations of local and global variables. Dynamical responses of the neuron ensemble to pulse and sinusoidal inputs calculated by the AMM are in good agreement with those obtained by direct simulation. The synchronization in the neuronal ensemble is discussed. Variabilities of the firing rate and of the interspike interval (ISI) are shown to increase with increasing the magnitude of multiplicative noise, which may be a conceivable origin of the observed large variability in cortical neurons.Comment: 19 pages, 9 figures, accepted in Phys. Rev. E after minor modification

    Tree Buffers

    Get PDF
    In runtime verification, the central problem is to decide if a given program execution violates a given property. In online runtime verification, a monitor observes a program’s execution as it happens. If the program being observed has hard real-time constraints, then the monitor inherits them. In the presence of hard real-time constraints it becomes a challenge to maintain enough information to produce error traces, should a property violation be observed. In this paper we introduce a data structure, called tree buffer, that solves this problem in the context of automata-based monitors: If the monitor itself respects hard real-time constraints, then enriching it by tree buffers makes it possible to provide error traces, which are essential for diagnosing defects. We show that tree buffers are also useful in other application domains. For example, they can be used to implement functionality of capturing groups in regular expressions. We prove optimal asymptotic bounds for our data structure, and validate them using empirical data from two sources: regular expression searching through Wikipedia, and runtime verification of execution traces obtained from the DaCapo test suite
    corecore