303 research outputs found

    Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts

    Get PDF
    Existence of mobile devices with high performance cameras and powerful image processing applications eases the alteration of digital images for malicious purposes. This work presents a new approach to detect digital image tamper detection technique based on CFA artifacts arising from the differences in the distribution of acquired and interpolated pixels. The experimental evidence supports the capabilities of the proposed method for detecting a broad range of manipulations, e.g., copy-move, resizing, rotation, filtering and colorization. This technique exhibits tampered areas by computing the probability of each pixel of being interpolated and then applying the DCT on small blocks of the probability map. The value of the coefficient for the highest frequency on each block is used to decide whether the analyzed region has been tampered or not. The results shown here were obtained from tests made on a publicly available dataset of tampered images for forensic analysis. Affected zones are clearly highlighted if the method detects CFA inconsistencies. The analysis can be considered successful if the modified zone, or an important part of it, is accurately detected. By analizing a publicly available dataset with images modified with different methods we reach an 86% of accuracy, which provides a good result for a method that does not require previous training

    Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns

    Get PDF
    In the last few years, the world has witnessed a ground-breaking growth in the use of digital images and their applications in the modern society. In addition, image editing applications have downplayed the modification of digital photos and this compromises the authenticity and veracity of a digital image. These applications allow for tampering the content of the image without leaving visible traces. In addition to this, the easiness of distributing information through the Internet has caused society to accept everything it sees as true without questioning its integrity. This paper proposes a digital image authentication technique that combines the analysis of local texture patterns with the discrete wavelet transform and the discrete cosine transform to extract features from each of the blocks of an image. Subsequently, it uses a vector support machine to create a model that allows verification of the authenticity of the image. Experiments were performed with falsified images from public databases widely used in the literature that demonstrate the efficiency of the proposed method

    Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections

    Get PDF
    One of the most relevant applications of digital image forensics is to accurately identify the device used for taking a given set of images, a problem called source identification. This paper studies recent developments in the field and proposes the mixture of two techniques (Sensor Imperfections and Wavelet Transforms) to get better source identification of images generated with mobile devices. Our results show that Sensor Imperfections and Wavelet Transforms can jointly serve as good forensic features to help trace the source camera of images produced by mobile phones. Furthermore, the model proposed here can also determine with high precision both the brand and model of the device

    Identification of a novel synthetic lethal vulnerability in non-small cell lung cancer by co-targeting TMPRSS4 and DDR1

    Get PDF
    Finding novel targets in non-small cell lung cancer (NSCLC) is highly needed and identification of synthetic lethality between two genes is a new approach to target NSCLC. We previously found that TMPRSS4 promotes NSCLC growth and constitutes a prognostic biomarker. Here, through large-scale analyses across 5 public databases we identified consistent co-expression between TMPRSS4 and DDR1. Similar to TMPRSS4, DDR1 promoter was hypomethylated in NSCLC in 3 independent cohorts and hypomethylation was an independent prognostic factor of disease-free survival. Treatment with 5-azacitidine increased DDR1 levels in cell lines, suggesting an epigenetic regulation. Cells lacking TMPRSS4 were highly sensitive to the cytotoxic effect of the DDR1 inhibitor dasatinib. TMPRSS4/DDR1 double knock-down (KD) cells, but not single KD cells suffered a G0/G1 cell cycle arrest with loss of E2F1 and cyclins A and B, increased p21 levels and a larger number of cells in apoptosis. Moreover, double KD cells were highly sensitized to cisplatin, which caused massive apoptosis (~40%). In vivo studies demonstrated tumor regression in double KD-injected mice. In conclusion, we have identified a novel vulnerability in NSCLC resulting from a synthetic lethal interaction between DDR1 and TMPRSS4

    Identification of novel synthetic lethal vulnerability in non small cell lung cancer by co targeting TMPRSS4 and DDR1

    Get PDF
    Finding novel targets in non-small cell lung cancer (NSCLC) is highly needed and identification of synthetic lethality between two genes is a new approach to target NSCLC. We previously found that TMPRSS4 promotes NSCLC growth and constitutes a prognostic biomarker. Here, through large-scale analyses across 5 public databases we identified consistent co-expression between TMPRSS4 and DDR1. Similar to TMPRSS4, DDR1 promoter was hypomethylated in NSCLC in 3 independent cohorts and hypomethylation was an independent prognostic factor of disease-free survival. Treatment with 5-azacitidine increased DDR1 levels in cell lines, suggesting an epigenetic regulation. Cells lacking TMPRSS4 were highly sensitive to the cytotoxic effect of the DDR1 inhibitor dasatinib. TMPRSS4/DDR1 double knock-down (KD) cells, but not single KD cells suffered a G0/G1 cell cycle arrest with loss of E2F1 and cyclins A and B, increased p21 levels and a larger number of cells in apoptosis. Moreover, double KD cells were highly sensitized to cisplatin, which caused massive apoptosis (~40%). In vivo studies demonstrated tumor regression in double KD-injected mice. In conclusion, we have identified a novel vulnerability in NSCLC resulting from a synthetic lethal interaction between DDR1 and TMPRSS4

    Search for narrow resonances in dilepton mass spectra in proton-proton collisions at root s=13 TeV and combination with 8 TeV data

    Get PDF
    Peer reviewe

    Search for R-parity violating supersymmetry with displaced vertices in proton-proton collisions at root s=8 TeV

    Get PDF
    Peer reviewe

    Search for heavy gauge W ' bosons in events with an energetic lepton and large missing transverse momentum at root s=13TeV

    Get PDF
    Peer reviewe

    Search for supersymmetry in events with photons and missing transverse energy in pp collisions at 13 TeV

    Get PDF
    Peer reviewe
    corecore