Image authenticity implementing Principal Component Analysis (PCA)

  • Schmeelk J.
  • Schmeelk S.

The paper addresses the application of finding key features within an image utilizing the process termed the Principal Components Analysis (PCA). Understanding this technique is critical for researchers within biometric fields and the larger cyber security field. Research, found in ASEE 2011 Conference Proceedings, titled “Edge Detectors in Engineering and Medical Applications,” develops the identification of edges within an image. That paper and this paper give the user two alternate approaches for comparing images. The PCA method was selected for analysis because it requires the use of many mathematical and statistical processes, such as means, standard deviation, variance, covariance, and eigenvalues, leading to a feature vector to compare images. The plan is to identify images, which will be termed authentic images and imposter images. Then the authentic and imposter images will be measured by th Euclidean norm to determine their authenticity. Developing software engineers and/or applied mathematicians using eigenvalues of a matrix can identify the authenticity of an image via that of an imposter image. This paper develops the key mathematical requirements to obtain a feature vector for a particular image.

View Original Article

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...