Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paul S. Everest is active.

Publication


Featured researches published by Paul S. Everest.


international workshop on information forensics and security | 2009

A system for forensic analysis of large image sets

Steven J. Simske; Margaret Sturgill; Paul S. Everest; George Guillory

Counterfeiting is a major concern for brand owners. Since printing is used to convey brands, brand owners should be able to analyze images of printed areas to gauge if the printing was performed by an authentic or a counterfeit printer/label converter. In this paper, we describe a system that uses a small set of pre-classified images (either authentic or counterfeit images from the same source) for initial training, and thereafter adaptively classifies and clusters images from multiple sources as they join the population to be classified. Authentic images and multiple sources of counterfeit images are identified, and secondary links between the non-compliant samples are provided. The system currently uses a set of 420 metrics which are filtered to a smaller set of features that can reliably describe our known set. This filtered set of features, or feature signature, is used for the search and clustering thereafter. We describe the use of this system to streamline and enhance investigations for a global brand protection program.


document engineering | 2010

Document imaging security and forensics ecosystem considerations

Steven J. Simske; Margaret Sturgill; Guy Adams; Paul S. Everest

Much of the focus in document security tends to be on the deterrent -- the physical (printed, manufactured) item placed on a document, often used for routing in addition to security purposes. Hybrid (multiple) deterrents are not always reliably read by a single imaging device, and so a single device generally cannot simultaneously provide overall document security. We herein show how a relatively simple deterrent can be used in combination with multiple imaging devices to provide document security. In this paper, we show how these devices can be used to classify the printing technology used, a subject of importance for counterfeiter identification as well as printer quality control. Forensic-level imaging is also useful in preventing repudiation and forging, while mobile and/or simple scanning can be used to prevent tampering -- propitiously in addition to providing useful, non-security related, capabilities such as document routing (track and trace) and workflow association.


Archive | 2005

Determining a delay

Richard Aufranc; James R Cole; Paul S. Everest


Archive | 2007

Wireless device association

Paul S. Everest


Archive | 2009

Variable data addition method and system

Steven J. Simske; Paul S. Everest


Archive | 2009

Method and system for testing image pipelines

Steven J. Simske; Malgorzata M. Sturgill; Paul S. Everest


Archive | 2008

Security printing analysis system and method for enhancing security printing

Steven J. Simske; Malgorzala M. Sturgill; John Stephen Dunfield; Paul S. Everest


Archive | 2012

Selecting Classifier Engines

Steven J. Simske; Malgorzata M. Sturgill; Jason S. Aronoff; Paul S. Everest


Archive | 2011

Region Selection for Counterfeit Determinations

Steven J. Simske; Malgorzata M. Sturgill; Matthew D. Gaubatz; Masoud Zavarehi; Paul S. Everest


Archive | 2009

System and method for enhancing security printing

Steven J. Simske; Malgorzata M. Sturgill; A. Marie Vans; Paul S. Everest

Collaboration


Dive into the Paul S. Everest's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge