Open Access. Powered by Scholars. Published by Universities.®

Signal Processing Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Signal Processing

Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen Apr 2022

Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen

Engineering Faculty Articles and Research

Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …


Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison Mar 2022

Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison

Engineering Faculty Articles and Research

Vast improvements in communications technology are possible if the conversion of digital information from optical to electric and back can be removed. Plasmonic devices offer one solution due to optical computing’s potential for increased bandwidth, which would enable increased throughput and enhanced security. Plasmonic devices have small footprints and interface with electronics easily, but these potential improvements are offset by the large device footprints of conventional signal regeneration schemes, since surface plasmon polaritons (SPPs) are incredibly lossy. As such, there is a need for novel regeneration schemes. The continuous, uniform, and unambiguous digital information encoding method is phase-shift-keying (PSK), so …


Image Restoration Using Automatic Damaged Regions Detection And Machine Learning-Based Inpainting Technique, Chloe Martin-King Dec 2019

Image Restoration Using Automatic Damaged Regions Detection And Machine Learning-Based Inpainting Technique, Chloe Martin-King

Computational and Data Sciences (PhD) Dissertations

In this dissertation we propose two novel image restoration schemes. The first pertains to automatic detection of damaged regions in old photographs and digital images of cracked paintings. In cases when inpainting mask generation cannot be completely automatic, our detection algorithm facilitates precise mask creation, particularly useful for images containing damage that is tedious to annotate or difficult to geometrically define. The main contribution of this dissertation is the development and utilization of a new inpainting technique, region hiding, to repair a single image by training a convolutional neural network on various transformations of that image. Region hiding is also …


A Tutorial On Text-Independent Speaker Verification, Frédéric Bimbot, Jean-François Bonastre, Corinne Fredouille, Guillaume Gravier, Ivan Magrin-Chagnolleau, Sylvain Meignier, Teva Merlin, Javier Ortega-García, Dijana Petrovska-Delacrétaz, Douglas A. Reynolds Apr 2004

A Tutorial On Text-Independent Speaker Verification, Frédéric Bimbot, Jean-François Bonastre, Corinne Fredouille, Guillaume Gravier, Ivan Magrin-Chagnolleau, Sylvain Meignier, Teva Merlin, Javier Ortega-García, Dijana Petrovska-Delacrétaz, Douglas A. Reynolds

Presidential Fellows Articles and Research

This paper presents an overview of a state-of-the-art text-independent speaker verification system. First, an introduction proposes a modular scheme of the training and test phases of a speaker verification system. Then, the most commonly speech parameterization used in speaker verification, namely, cepstral analysis, is detailed. Gaussian mixture modeling, which is the speaker modeling technique used in most systems, is then explained. A few speaker modeling alternatives, namely, neural networks and support vector machines, are mentioned. Normalization of scores is then explained, as this is a very important step to deal with real-world data. The evaluation of a speaker verification system …