21 research outputs found

    A genetic link between risk for Alzheimer's disease and severe COVID-19 outcomes via the OAS1 gene

    Get PDF
    Recently, we reported oligoadenylate synthetase 1 (OAS1) contributed to the risk of Alzheimer’s disease, by its enrichment in transcriptional networks expressed by microglia. However, the function of OAS1 within microglia was not known. Using genotyping from 1313 individuals with sporadic Alzheimer’s disease and 1234 control individuals, we confirm the OAS1 variant, rs1131454, is associated with increased risk for Alzheimer’s disease. The same OAS1 locus has been recently associated with severe coronavirus disease 2019 (COVID-19) outcomes, linking risk for both diseases. The single nucleotide polymorphisms rs1131454(A) and rs4766676(T) are associated with Alzheimer’s disease, and rs10735079(A) and rs6489867(T) are associated with severe COVID-19, where the risk alleles are linked with decreased OAS1 expression. Analysing single-cell RNA-sequencing data of myeloid cells from Alzheimer’s disease and COVID-19 patients, we identify co-expression networks containing interferon (IFN)-responsive genes, including OAS1, which are significantly upregulated with age and both diseases. In human induced pluripotent stem cell-derived microglia with lowered OAS1 expression, we show exaggerated production of TNF-α with IFN-γ stimulation, indicating OAS1 is required to limit the pro-inflammatory response of myeloid cells. Collectively, our data support a link between genetic risk for Alzheimer’s disease and susceptibility to critical illness with COVID-19 centred on OAS1, a finding with potential implications for future treatments of Alzheimer’s disease and COVID-19, and development of biomarkers to track disease progression

    Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing

    No full text
    The photo response non-uniformity noise associated with an imaging sensor has been shown to be a unique and persistent identifier that can be treated as the sensor's digital fingerprint. The method for attributing an image to a particular camera, however, is not suitable for source identification due to efficiency considerations, which is a one-to-many matching of a single fingerprint against a database of fingerprints. To address this problem, we propose a group-testing approach based on the notion of composite fingerprints (CFs), generated by combining many actual fingerprints together into a single fingerprint. Our technique organizes a database of fingerprints into an unordered binary search tree, wherein each internal node is represented by a fingerprint composited from all the fingerprints at the leaf nodes in the subtree beneath that node. Different search strategies are considered, and the performance is analyzed analytically and verified using numerical simulations as well as experimental results. Our results are presented in comparison with the linear search-based approach that utilizes fingerprint digests for more effective computation. Results obtained under the best achievable accuracy showed that the proposed method yields a lower overall computational cost. It is also shown that by complementary use of the fingerprint dimension reduction and CF-based search tree approaches, it is possible to further improve the search efficiency

    An efficient and robust method for detecting copy-move forgery

    No full text
    Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approach for detecting copy-move forgery in digital images, which is considerably more robust to lossy compression, scaling and rotation type of manipulations. Also, to improve the computational complexity in detecting the duplicated image regions, we propose to use the notion of counting bloom filters as an alternative to lexicographic sorting, which is a common component of most of the proposed copy-move forgery detection schemes. Our experimental results show that the proposed features can detect duplicated region in the images very accurately, even when the copied region was undergone severe image manipulations. In addition, it is observed that use of counting bloom filters offers a considerable improvement in time efficiency at the expense of a slight reduction in the robustness

    Video copy detection based on source device characteristics: A complementary approach to contentbased methods

    No full text
    We introduce a new video copy detection scheme to complement existing content-based techniques. The idea of our scheme is based on the fact that visual media possess unique characteristics that can be used to link a media to its source. Proposed scheme attempts to detect duplicate and modified copies of a video primarily based on peculiarities of imaging sensors rather than content characteristics only. We demonstrate the viability of our scheme by both analyzing its robustness against common video processing operations and evaluating its performance on real world data. Results show that proposed scheme is very effective and suitable for video copy detection application

    Fast camera fingerprint matching in very large databases

    No full text
    24th IEEE International Conference on Image Processing (2017 : Beijing; China)Given a query image or video, or a known camera fingerprint, there is a lack of capabilities for fast identification of media, from a large repository of images and videos, that match the query fingerprint. This work introduces a new approach that improves the computation efficiency of pairwise camera fingerprint matching and incorporates group testing to make the search more effective. More specifically, we jointly leverage the individual strengths of composite fingerprints and fingerprint digests in a novel manner and design two methods that are superior to existing approaches. The results show that under very high-performance requirements, where the probability of correct identification is close to one with a false-positive rate of zero, the proposed search methods are 2-8 times faster than the state-of-art search methods.The Institute of Electrical and Electronics Engineers Signal Processing Societ

    Fake News Detection by Image Montage Recognition

    No full text
    Fake news have been a problem for multiple years now and in addition to this "fake images" that accompany them are becoming increasingly a problem too. The aim of such fake images is to back up the fake message itself and make it appear authentic. For this purpose, more and more images such as photo-montages are used, which have been spliced from several images. This can be used to defame people by putting them in unfavorable situations or the other way around as propaganda by making them appear more important. In addition, montages may have been altered with noise and other manipulations to make an automatic recognition more difficult. In order to take action against such montages and still detect them automated, a concept based on feature detection is developed. Furthermore, an indexing of the features is carried out by means of a nearest neighbor algorithm in order to be able to quickly compare a high number of images. Afterwards, images suspected to be a montage are reviewed by a verifier. This concept is implemented and evaluated with two feature detectors. Even montages that have been manipulated with different methods are identified as such in an average of 100 milliseconds with a probability of mostly over 90%

    A classifier design for detecting image manipulations

    No full text
    In this paper we present a framework for digital image forensics. Based on the assumptions that some processing operations must be done on the image before it is doctored, and an expected measurable distortion after processing an image, we design classifiers that discriminates between original and processed images. We propose a novel way of measuring the distortion between two images, one being the original and the other processed. The measurements are used as features in classifier design. Using these classifiers we test whether a suspicious part of a given image has been processed with a particular method or not. Experimental results show that with a high accuracy we are able to tell if some part of an image has undergone a particular or a combination of processing methods. 1
    corecore