-
Fast \textit{ab initio} design of high-entropy magnetic thin films
Authors:
Dinesh Bista,
Willie B. Beeson,
Turbasu Sengupta,
Jerome Jackson,
Shiv N Khanna,
Kai Liu,
Gen Yin
Abstract:
We show that the magnetic properties of high-entropy alloys (HEAs) can be captured by \textit{ab initio} calculations within the coherent potential approximation, where the atomic details of the high-entropy mixing are considered as an effective medium that possesses the translational symmetry of the lattice. This is demonstrated using the face-centered cubic (FCC) phase of $\textrm{FeCoNiMnCu}$ a…
▽ More
We show that the magnetic properties of high-entropy alloys (HEAs) can be captured by \textit{ab initio} calculations within the coherent potential approximation, where the atomic details of the high-entropy mixing are considered as an effective medium that possesses the translational symmetry of the lattice. This is demonstrated using the face-centered cubic (FCC) phase of $\textrm{FeCoNiMnCu}$ and the $L1_0$ phase of $\textrm{(FeCoNiMnCu)Pt}$ by comparing the density functional theory (DFT) results with the experimental values. Working within the first Brillouin zone and the primitive unit cell, we show that DFT can capture the smooth profile of magnetic properties such as the saturation magnetization, the Curie temperature and the magnetic anisotropy, using only a sparse set of sampling points in the vast compositional space. The smooth profiles given by DFT indeed follow the experimental trend, demonstrating the promising potential of using machine learning to explore the magnetic properties of HEAs, by establishing reasonably large datasets with high-throughput calculations using density-functional theory.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Arbitrary Scale Super-Resolution Assisted Lunar Crater Detection in Satellite Images
Authors:
Atal Tewari,
Nitin Khanna
Abstract:
Craters are one of the most studied planetary features used for different scientific analyses, such as estimation of surface age and surface processes. Satellite images utilized for crater detection often have low resolution (LR) due to hardware constraints and transmission time. Super-resolution (SR) is a practical and cost-effective solution; however, most SR approaches work on fixed integer sca…
▽ More
Craters are one of the most studied planetary features used for different scientific analyses, such as estimation of surface age and surface processes. Satellite images utilized for crater detection often have low resolution (LR) due to hardware constraints and transmission time. Super-resolution (SR) is a practical and cost-effective solution; however, most SR approaches work on fixed integer scale factors, i.e., a single model can generate images of a specific resolution. In practical applications, SR on multiple scales provides various levels of detail, but training for each scale is resource-intensive. Therefore, this paper proposes a system for crater detection assisted with an arbitrary scale super-resolution approach (i.e., a single model can be used for multiple scale factors) for the lunar surface. Our work is composed of two subsystems. The first sub-system employs an arbitrary scale SR approach to generate super-resolved images of multiple resolutions. Subsequently, the second sub-system passes super-resolved images of multiple resolutions to a deep learning-based crater detection framework for identifying craters on the lunar surface. Employed arbitrary scale SR approach is based on a combination of convolution and transformer modules. For the crater detection sub-system, we utilize the Mask-RCNN framework. Using SR images of multiple resolutions, the proposed system detects 13.47% more craters from the ground truth than the craters detected using only the LR images. Further, in complex crater settings, specifically in overlap** and degraded craters, 11.84% and 15.01% more craters are detected as compared to the crater detection networks using only the LR images. The proposed system also leads to better localization performance, 3.19% IoU increment compared to the LR images
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Deep Learning based Systems for Crater Detection: A Review
Authors:
Atal Tewari,
K Prateek,
Amrita Singh,
Nitin Khanna
Abstract:
Craters are one of the most prominent features on planetary surfaces, used in applications such as age estimation, hazard detection, and spacecraft navigation. Crater detection is a challenging problem due to various aspects, including complex crater characteristics such as varying sizes and shapes, data resolution, and planetary data types. Similar to other computer vision tasks, deep learning-ba…
▽ More
Craters are one of the most prominent features on planetary surfaces, used in applications such as age estimation, hazard detection, and spacecraft navigation. Crater detection is a challenging problem due to various aspects, including complex crater characteristics such as varying sizes and shapes, data resolution, and planetary data types. Similar to other computer vision tasks, deep learning-based approaches have significantly impacted research on crater detection in recent years. This survey aims to assist researchers in this field by examining the development of deep learning-based crater detection algorithms (CDAs). The review includes over 140 research works covering diverse crater detection approaches, including planetary data, craters database, and evaluation metrics. To be specific, we discuss the challenges in crater detection due to the complex properties of the craters and survey the DL-based CDAs by categorizing them into three parts: (a) semantic segmentation-based, (b) object detection-based, and (c) classification-based. Additionally, we have conducted training and testing of all the semantic segmentation-based CDAs on a common dataset to evaluate the effectiveness of each architecture for crater detection and its potential applications. Finally, we have provided recommendations for potential future works.
△ Less
Submitted 28 September, 2023;
originally announced October 2023.
-
Automatic Crater Shape Retrieval using Unsupervised and Semi-Supervised Systems
Authors:
Atal Tewari,
Vikrant Jain,
Nitin Khanna
Abstract:
Impact craters are formed due to continuous impacts on the surface of planetary bodies. Most recent deep learning-based crater detection methods treat craters as circular shapes, and less attention is paid to extracting the exact shapes of craters. Extracting precise shapes of the craters can be helpful for many advanced analyses, such as crater formation. This paper proposes a combination of unsu…
▽ More
Impact craters are formed due to continuous impacts on the surface of planetary bodies. Most recent deep learning-based crater detection methods treat craters as circular shapes, and less attention is paid to extracting the exact shapes of craters. Extracting precise shapes of the craters can be helpful for many advanced analyses, such as crater formation. This paper proposes a combination of unsupervised non-deep learning and semi-supervised deep learning approach to accurately extract shapes of the craters and detect missing craters from the existing catalog. In unsupervised non-deep learning, we have proposed an adaptive rim extraction algorithm to extract craters' shapes. In this adaptive rim extraction algorithm, we utilized the elevation profiles of DEMs and applied morphological operation on DEM-derived slopes to extract craters' shapes. The extracted shapes of the craters are used in semi-supervised deep learning to get the locations, size, and refined shapes. Further, the extracted shapes of the craters are utilized to improve the estimate of the craters' diameter, depth, and other morphological factors. The craters' shape, estimated diameter, and depth with other morphological factors will be publicly available.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
In-Orbit Lunar Satellite Image Super Resolution for Selective Data Transmission
Authors:
Atal Tewari,
Chennuri Prateek,
Nitin Khanna
Abstract:
Rapid technological advancements have tremendously increased the data acquisition capabilities of remote sensing satellites. However, the data utilization efficiency in satellite missions is very low. This growing data also escalates the cost required for data downlink transmission and post-processing. Selective data transmission based on in-orbit inferences will address these issues to a great ex…
▽ More
Rapid technological advancements have tremendously increased the data acquisition capabilities of remote sensing satellites. However, the data utilization efficiency in satellite missions is very low. This growing data also escalates the cost required for data downlink transmission and post-processing. Selective data transmission based on in-orbit inferences will address these issues to a great extent. Therefore, to decrease the cost of the satellite mission, we propose a novel system design for selective data transmission, based on in-orbit inferences. As the resolution of images plays a critical role in making precise inferences, we also include in-orbit super-resolution (SR) in the system design. We introduce a new image reconstruction technique and a unique loss function to enable the execution of the SR model on low-power devices suitable for satellite environments. We present a residual dense non-local attention network (RDNLA) that provides enhanced super-resolution outputs to improve the SR performance. SR experiments on Kaguya digital ortho maps (DOMs) demonstrate that the proposed SR algorithm outperforms the residual dense network (RDN) in terms of PSNR and block-sensitive PSNR by a margin of +0.1 dB and +0.19 dB, respectively. The proposed SR system consumes 48% less memory and 67% less peak instantaneous power than the standard SR model, RDN, making it more suitable for execution on a low-powered device platform.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Source Printer Identification using Printer Specific Pooling of Letter Descriptors
Authors:
Sharad Joshi,
Yogesh Kumar Gupta,
Nitin Khanna
Abstract:
The digital revolution has replaced the use of printed documents with their digital counterparts. However, many applications require the use of both due to several factors, including challenges of digital security, installation costs, ease of use, and lack of digital expertise. Technological developments in the digital domain have also resulted in the easy availability of high-quality scanners, pr…
▽ More
The digital revolution has replaced the use of printed documents with their digital counterparts. However, many applications require the use of both due to several factors, including challenges of digital security, installation costs, ease of use, and lack of digital expertise. Technological developments in the digital domain have also resulted in the easy availability of high-quality scanners, printers, and image editing software at lower prices. Miscreants leverage such technology to develop forged documents that may go undetected in vast volumes of printed documents. These developments mandate the research on creating fast and accurate digital systems for source printer identification of printed documents. We extensively analyze and propose a printer-specific pooling that improves the performance of printer-specific local texture descriptor on two datasets. The proposed pooling performs well using a simple correlation-based prediction instead of a complex machine learning-based classifier achieving improved performance under cross-font scenarios. The proposed system achieves an average classification accuracy of 93.5%, 94.3%, and 60.3% on documents printed in Arial, Times New Roman, and Comic Sans font types respectively, when documents printed in only Cambria font are available for training.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Q-matrix Unaware Double JPEG Detection using DCT-Domain Deep BiLSTM Network
Authors:
Vinay Verma,
Deepak Singh,
Nitin Khanna
Abstract:
The double JPEG compression detection has received much attention in recent years due to its applicability as a forensic tool for the most widely used JPEG file format. Existing state-of-the-art CNN-based methods either use histograms of all the frequencies or rely on heuristics to select histograms of specific low frequencies to classify single and double compressed images. However, even amidst l…
▽ More
The double JPEG compression detection has received much attention in recent years due to its applicability as a forensic tool for the most widely used JPEG file format. Existing state-of-the-art CNN-based methods either use histograms of all the frequencies or rely on heuristics to select histograms of specific low frequencies to classify single and double compressed images. However, even amidst lower frequencies of double compressed images/patches, histograms of all the frequencies do not have distinguishable features to separate them from single compressed images. This paper directly extracts the quantized DCT coefficients from the JPEG images without decompressing them in the pixel domain, obtains all AC frequencies' histograms, uses a module based on $1\times 1$ depth-wise convolutions to learn the inherent relation between each histogram and corresponding q-factor, and utilizes a tailor-made BiLSTM network for selectively encoding these feature vector sequences. The proposed system outperforms several baseline methods on a relatively large and diverse publicly available dataset of single and double compressed patches. Another essential aspect of any single vs. double JPEG compression detection system is handling the scenario where test patches are compressed with entirely different quantization matrices (Q-matrices) than those used while training; different camera manufacturers and image processing software generally utilize their customized quantization matrices. A set of extensive experiments shows that the proposed system trained on a single dataset generalizes well on other datasets compressed with completely unseen quantization matrices and outperforms the state-of-the-art methods in both seen and unseen quantization matrices scenarios.
△ Less
Submitted 10 April, 2021;
originally announced April 2021.
-
Automated Crater Detection from Co-registered Optical Images, Elevation Maps and Slope Maps using Deep Learning
Authors:
Atal Tewari,
Vinay Verma,
Pradeep Srivastava,
Vikrant Jain,
Nitin Khanna
Abstract:
Impact craters are formed as a result of continuous impacts on the surface of planetary bodies. This paper proposes a novel way of simultaneously utilizing optical images, digital elevation maps (DEMs), and slope maps for automatic crater detection on the lunar surface. Mask R-CNN, tuned for the crater detection task, is utilized in this paper. Two catalogs, namely, Head-LROC and Robbins, are used…
▽ More
Impact craters are formed as a result of continuous impacts on the surface of planetary bodies. This paper proposes a novel way of simultaneously utilizing optical images, digital elevation maps (DEMs), and slope maps for automatic crater detection on the lunar surface. Mask R-CNN, tuned for the crater detection task, is utilized in this paper. Two catalogs, namely, Head-LROC and Robbins, are used for the performance evaluation. Exhaustive analysis of the detection results on the lunar surface has been performed with respect to both Head-LROC and Robbins catalog. With the Head-LROC catalog, which has relatively strict crater markings and larger possibility of missing craters, recall value of 94.28\% has been obtained as compared to 88.03\% for the baseline method. However, with respect to a manually marked exhaustive crater catalog based on relatively liberal marking, significant precision and recall values are obtained for different crater size ranges. The generalization capability of the proposed method in terms of crater detection on a different terrain with different input data type is also evaluated. We show that the proposed model trained on the lunar surface with optical images, DEMs and corresponding slope maps can be used to detect craters on the Martian surface even with entirely different input data type, such as thermal IR images from the Martian surface.
△ Less
Submitted 30 December, 2020;
originally announced December 2020.
-
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines
Authors:
Sharad Joshi,
Pawel Korus,
Nitin Khanna,
Nasir Memon
Abstract:
We assess the variability of PRNU-based camera fingerprints with mismatched imaging pipelines (e.g., different camera ISP or digital darkroom software). We show that camera fingerprints exhibit non-negligible variations in this setup, which may lead to unexpected degradation of detection statistics in real-world use-cases. We tested 13 different pipelines, including standard digital darkroom softw…
▽ More
We assess the variability of PRNU-based camera fingerprints with mismatched imaging pipelines (e.g., different camera ISP or digital darkroom software). We show that camera fingerprints exhibit non-negligible variations in this setup, which may lead to unexpected degradation of detection statistics in real-world use-cases. We tested 13 different pipelines, including standard digital darkroom software and recent neural-networks. We observed that correlation between fingerprints from mismatched pipelines drops on average to 0.38 and the PCE detection statistic drops by over 40%. The degradation in error rates is the strongest for small patches commonly used in photo manipulation detection, and when neural networks are used for photo development. At a fixed 0.5% FPR setting, the TPR drops by 17 ppt (percentage points) for 128 px and 256 px patches.
△ Less
Submitted 9 October, 2020; v1 submitted 4 April, 2020;
originally announced April 2020.
-
Source Printer Identification from Document Images Acquired using Smartphone
Authors:
Sharad Joshi,
Suraj Saxena,
Nitin Khanna
Abstract:
Vast volumes of printed documents continue to be used for various important as well as trivial applications. Such applications often rely on the information provided in the form of printed text documents whose integrity verification poses a challenge due to time constraints and lack of resources. Source printer identification provides essential information about the origin and integrity of a print…
▽ More
Vast volumes of printed documents continue to be used for various important as well as trivial applications. Such applications often rely on the information provided in the form of printed text documents whose integrity verification poses a challenge due to time constraints and lack of resources. Source printer identification provides essential information about the origin and integrity of a printed document in a fast and cost-effective manner. Even when fraudulent documents are identified, information about their origin can help stop future frauds. If a smartphone camera replaces scanner for the document acquisition process, document forensics would be more economical, user-friendly, and even faster in many applications where remote and distributed analysis is beneficial. Building on existing methods, we propose to learn a single CNN model from the fusion of letter images and their printer-specific noise residuals. In the absence of any publicly available dataset, we created a new dataset consisting of 2250 document images of text documents printed by eighteen printers and acquired by a smartphone camera at five acquisition settings. The proposed method achieves 98.42% document classification accuracy using images of letter 'e' under a 5x2 cross-validation approach. Further, when tested using about half a million letters of all types, it achieves 90.33% and 98.01% letter and document classification accuracies, respectively, thus highlighting the ability to learn a discriminative model without dependence on a single letter type. Also, classification accuracies are encouraging under various acquisition settings, including low illumination and change in angle between the document and camera planes.
△ Less
Submitted 27 March, 2020;
originally announced March 2020.
-
Block-level Double JPEG Compression Detection for Image Forgery Localization
Authors:
Vinay Verma,
Deepak Singh,
Nitin Khanna
Abstract:
Forged images have a ubiquitous presence in today's world due to ease of availability of image manipulation tools. In this letter, we propose a deep learning-based novel approach which utilizes the inherent relationship between DCT coefficient histograms and corresponding quantization step sizes to distinguish between original and forged regions in a JPEG image, based on the detection of single an…
▽ More
Forged images have a ubiquitous presence in today's world due to ease of availability of image manipulation tools. In this letter, we propose a deep learning-based novel approach which utilizes the inherent relationship between DCT coefficient histograms and corresponding quantization step sizes to distinguish between original and forged regions in a JPEG image, based on the detection of single and double compressed blocks, without fully decompressing the JPEG image. We consider a diverse set of 1,120 quantization matrices collected in a recent study as compared to standard 100 quantization matrices for training, testing, and creating realistic forgeries. In particular, we carefully design the input to DenseNet with a specific combination of quantization step sizes and the respective histograms for a JPEG block. Using this input to learn the compression artifacts produces state-of-the-art results for the detection of single and double compressed blocks of sizes $256 \times 256$ and gives better results for smaller blocks of sizes $128 \times 128$ and $64 \times 64$. Consequently, improved forgery localization performances are obtained on realistic forged images. Also, in the case of test blocks compressed with completely different quantization matrices as compared to matrices used in training, the proposed method outperforms the current state-of-the-art.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
First Steps Toward CNN based Source Classification of Document Images Shared Over Messaging App
Authors:
Sharad Joshi,
Suraj Saxena,
Nitin Khanna
Abstract:
Knowledge of source smartphone corresponding to a document image can be helpful in a variety of applications including copyright infringement, ownership attribution, leak identification and usage restriction. In this letter, we investigate a convolutional neural network-based approach to solve source smartphone identification problem for printed text documents which have been captured by smartphon…
▽ More
Knowledge of source smartphone corresponding to a document image can be helpful in a variety of applications including copyright infringement, ownership attribution, leak identification and usage restriction. In this letter, we investigate a convolutional neural network-based approach to solve source smartphone identification problem for printed text documents which have been captured by smartphone cameras and shared over messaging platform. In absence of any publicly available dataset addressing this problem, we introduce a new image dataset consisting of 315 images of documents printed in three different fonts, captured using 21 smartphones and shared over WhatsApp. Experiments conducted on this dataset demonstrate that, in all scenarios, the proposed system performs as well as or better than the state-of-the-art system based on handcrafted features and classification of letters extracted from document images. The new dataset and code of the proposed system will be made publicly available along with this letter's publication, presently they are submitted for review.
△ Less
Submitted 17 August, 2018;
originally announced August 2018.
-
Source Printer Classification using Printer Specific Local Texture Descriptor
Authors:
Sharad Joshi,
Nitin Khanna
Abstract:
The knowledge of source printer can help in printed text document authentication, copyright ownership, and provide important clues about the author of a fraudulent document along with his/her potential means and motives. Development of automated systems for classifying printed documents based on their source printer, using image processing techniques, is gaining a lot of attention in multimedia fo…
▽ More
The knowledge of source printer can help in printed text document authentication, copyright ownership, and provide important clues about the author of a fraudulent document along with his/her potential means and motives. Development of automated systems for classifying printed documents based on their source printer, using image processing techniques, is gaining a lot of attention in multimedia forensics. Currently, state-of-the-art systems require that the font of letters present in test documents of unknown origin must be available in those used for training the classifier. In this work, we attempt to take the first step towards overcoming this limitation. Specifically, we introduce a novel printer specific local texture descriptor. The highlight of our technique is the use of encoding and regrou** strategy based on small linear-shaped structures composed of pixels having similar intensity and gradient. The results of experiments performed on two separate datasets show that: 1) on a publicly available dataset, the proposed method outperforms state-of-the-art algorithms for characters printed in the same font, and 2) on another dataset\footnote{Code and dataset will be made publicly available with published version of this paper.} having documents printed in four different fonts, the proposed method correctly classifies all test samples when sufficient training data is available in same font setup. In addition, it outperforms state-of-the-art methods for cross font experiments. Moreover, it reduces the confusion between the printers of same brand and model.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Magnetic Behaviour of Assemblies of Interacting Cobalt-Carbide Nanoparticles
Authors:
Pallabi Sutradhar,
Shiv N. Khanna,
Jayasimha Atulasimha
Abstract:
Recent work [1] demonstrated high coercivity and magnetic moment in cobalt carbide nanoparticle assemblies and explained the high coercivity from first principles in terms of the high magnetocrystalline anisotropy of the cobalt carbide nanoparticles. In this work, we comprehensively model the interaction between the nanoparticles comprising the assembly and systematically understand the effect of…
▽ More
Recent work [1] demonstrated high coercivity and magnetic moment in cobalt carbide nanoparticle assemblies and explained the high coercivity from first principles in terms of the high magnetocrystalline anisotropy of the cobalt carbide nanoparticles. In this work, we comprehensively model the interaction between the nanoparticles comprising the assembly and systematically understand the effect of particle size, distribution of the orientations of the nanoparticles' magnetocrystalline anisotropy axis with respect to the applied magnetic field, and dipole coupling between nanoparticles on the temperature dependent magnetic behavior of the nanoparticle assembly. We show that magnetocrystalline anisotropy alone is not enough to explain the large hysteresis over the 50K-400K temperature range and suggest that defects and inhomogeneties that pin the magnetization could also play a significant role on this temperature dependent magnetic behavior.
△ Less
Submitted 20 January, 2018;
originally announced January 2018.
-
DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification
Authors:
Vinay Verma,
Nikita Agarwal,
Nitin Khanna
Abstract:
With the rapid advancements in digital imaging systems and networking, low-cost hand-held image capture devices equipped with network connectivity are becoming ubiquitous. This ease of digital image capture and sharing is also accompanied by widespread usage of user-friendly image editing software. Thus, we are in an era where digital images can be very easily used for the massive spread of false…
▽ More
With the rapid advancements in digital imaging systems and networking, low-cost hand-held image capture devices equipped with network connectivity are becoming ubiquitous. This ease of digital image capture and sharing is also accompanied by widespread usage of user-friendly image editing software. Thus, we are in an era where digital images can be very easily used for the massive spread of false information and their integrity need to be seriously questioned. Application of multiple lossy compressions on images is an essential part of any image editing pipeline involving lossy compressed images. This paper aims to address the problem of classifying images based on the number of JPEG compressions they have undergone, by utilizing deep convolutional neural networks in DCT domain. The proposed system incorporates a well designed pre-processing step before feeding the image data to CNN to capture essential characteristics of compression artifacts and make the system image content independent. Detailed experiments are performed to optimize different aspects of the system, such as depth of CNN, number of DCT frequencies, and execution time. Results on the standard UCID dataset demonstrate that the proposed system outperforms existing systems for multiple JPEG compression detection and is capable of classifying more number of re-compression cycles then existing systems.
△ Less
Submitted 6 December, 2017;
originally announced December 2017.
-
Single Classifier-based Passive System for Source Printer Classification using Local Texture Features
Authors:
Sharad Joshi,
Nitin Khanna
Abstract:
An important aspect of examining printed documents for potential forgeries and copyright infringement is the identification of source printer as it can be helpful for ascertaining the leak and detecting forged documents. This paper proposes a system for classification of source printer from scanned images of printed documents using all the printed letters simultaneously. This system uses local tex…
▽ More
An important aspect of examining printed documents for potential forgeries and copyright infringement is the identification of source printer as it can be helpful for ascertaining the leak and detecting forged documents. This paper proposes a system for classification of source printer from scanned images of printed documents using all the printed letters simultaneously. This system uses local texture patterns based features and a single classifier for classifying all the printed letters. Letters are extracted from scanned images using connected component analysis followed by morphological filtering without the need of using an OCR. Each letter is sub-divided into a flat region and an edge region, and local tetra patterns are estimated separately for these two regions. A strategically constructed pooling technique is used to extract the final feature vectors. The proposed method has been tested on both a publicly available dataset of 10 printers and a new dataset of 18 printers scanned at a resolution of 600 dpi as well as 300 dpi printed in four different fonts. The results indicate shape independence property in the proposed method as using a single classifier it outperforms existing handcrafted feature-based methods and needs much smaller number of training pages by using all the printed letters.
△ Less
Submitted 22 June, 2017;
originally announced June 2017.
-
Passive Classification of Source Printer using Text-line-level Geometric Distortion Signatures from Scanned Images of Printed Documents
Authors:
Hardik Jain,
Gaurav Gupta,
Sharad Joshi,
Nitin Khanna
Abstract:
In this digital era, one thing that still holds the convention is a printed archive. Printed documents find their use in many critical domains such as contract papers, legal tenders and proof of identity documents. As more advanced printing, scanning and image editing techniques are becoming available, forgeries on these legal tenders pose a serious threat. Ability to easily and reliably identify…
▽ More
In this digital era, one thing that still holds the convention is a printed archive. Printed documents find their use in many critical domains such as contract papers, legal tenders and proof of identity documents. As more advanced printing, scanning and image editing techniques are becoming available, forgeries on these legal tenders pose a serious threat. Ability to easily and reliably identify source printer of a printed document can help a lot in reducing this menace. During printing procedure, printer hardware introduces certain distortions in printed characters' locations and shapes which are invisible to naked eyes. These distortions are referred as geometric distortions, their profile (or signature) is generally unique for each printer and can be used for printer classification purpose. This paper proposes a set of features for characterizing text-line-level geometric distortions, referred as geometric distortion signatures and presents a novel system to use them for identification of the origin of a printed document. Detailed experiments performed on a set of thirteen printers demonstrate that the proposed system achieves state of the art performance and gives much higher accuracy under small training size constraint. For four training and six test pages of three different fonts, the proposed method gives 99\% classification accuracy.
△ Less
Submitted 20 June, 2017;
originally announced June 2017.
-
Magnetic Behavior of Superatom-Fullerene Assemblies
Authors:
Pallabi Sutradhar,
Vikas Chauhan,
Shiv N. Khanna,
Jayasimha Atulasimha
Abstract:
It has recently been possible to synthesize ordered assemblies composed of magnetic superatomic clusters Ni9Te6(PEt3)8 separated by C60 and study their magnetic behavior. We have carried out theoretical studies on model systems consisting of magnetic superatoms separated by non-magnetic species to examine the evolution in magnetic response as the nature of the magnetic superatom (directions of spi…
▽ More
It has recently been possible to synthesize ordered assemblies composed of magnetic superatomic clusters Ni9Te6(PEt3)8 separated by C60 and study their magnetic behavior. We have carried out theoretical studies on model systems consisting of magnetic superatoms separated by non-magnetic species to examine the evolution in magnetic response as the nature of the magnetic superatom (directions of spin quantization), the strength of isotropic and anisotropic interactions, the magnetic anisotropy energy, and the size of the assembly are varied. We have examined square planar configurations consisting 16, 24 and 48 sites with 8, 12 and 24 magnetic superatoms respectively. The magnetic atoms are allowed 2 or 5 orientations. The model Hamiltonian includes isotropic exchange interactions with second nearest neighbor ferromagnetic and nearest neighbor antiferromagnetic couplings and anisotropic Dzyaloshinskii-Moriya interactions. It is shown that the inclusion of Dzyaloshinskii-Moriya interaction that cause spin canting is necessary to get qualitative response as observed in experiments.
△ Less
Submitted 18 July, 2016;
originally announced July 2016.
-
First-principles study of TMNan (TM= Cr, Mn, Fe, Co, Ni; n = 4-7) clusters
Authors:
Kalpataru Pradhan,
Prasenjit Sen,
J. Ulises Reveles,
Shiv N. Khanna
Abstract:
Geometry, electronic structure, and magnetic properties of TMNan (TM=Cr-Ni; n = 4-7) clusters are studied within a gradient corrected density functional theory (DFT) framework. Two complementary approaches, the first adapted to all-electron calculations on free clusters, and the second been on plane wave projector augmented wave (PAW) method within a supercell approach are used. Except for NiNan…
▽ More
Geometry, electronic structure, and magnetic properties of TMNan (TM=Cr-Ni; n = 4-7) clusters are studied within a gradient corrected density functional theory (DFT) framework. Two complementary approaches, the first adapted to all-electron calculations on free clusters, and the second been on plane wave projector augmented wave (PAW) method within a supercell approach are used. Except for NiNan, the clusters in this series are found to retain the atomic moments of the TM atoms, and the magnetic moment presented an odd-even oscillation with respect to the number of Na atoms. The origin of these odd-even oscillations is explained from the nature of chemical bonding in these clusters. Differences and similarities between the chemical bonding and the magnetic properties of these clusters and the TMNan (TM = Sc, V and Ti; n = 4-6) clusters on one hand, and TM-doped Au and Ag clusters on the other hand, are discussed.
△ Less
Submitted 2 April, 2008;
originally announced April 2008.
-
First principles study of Sc, Ti and V doped Na$_n$(n =4, 5, 6) clusters: Enhanced magnetic moments
Authors:
Kalpataru Pradhan,
Prasenjit Sen,
J. U. Reveles,
S. N. Khanna
Abstract:
Theoretical studies on the geometry, electronic structure and spin multiplicity of Sc, Ti and V doped Na$_n$ (n = 4, 5, 6) clusters have been carried out within a gradient corrected density functional approach. Two complementary approaches including all-electron calculations on free clusters, and supercell calculations using planewave pseudopotential and projector augmented wave formalisms have…
▽ More
Theoretical studies on the geometry, electronic structure and spin multiplicity of Sc, Ti and V doped Na$_n$ (n = 4, 5, 6) clusters have been carried out within a gradient corrected density functional approach. Two complementary approaches including all-electron calculations on free clusters, and supercell calculations using planewave pseudopotential and projector augmented wave formalisms have been carried out. It is shown that spin magnetic moments of the transition metal atoms, the magnitude of host polarization, and the sign of the host polarization all change with the number of alkali atoms. In particular the transition metal atoms are shown to attain spin moments that are higher than their atomic values. The role of hybridization between the transition atom d-states and the alkali $sp$-states is highlighted to account for the evolutions in the spin moments and host polarization.
△ Less
Submitted 29 November, 2007;
originally announced November 2007.