Paul S. Everest
Hewlett-Packard
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Paul S. Everest.
international workshop on information forensics and security | 2009
Steven J. Simske; Margaret Sturgill; Paul S. Everest; George Guillory
Counterfeiting is a major concern for brand owners. Since printing is used to convey brands, brand owners should be able to analyze images of printed areas to gauge if the printing was performed by an authentic or a counterfeit printer/label converter. In this paper, we describe a system that uses a small set of pre-classified images (either authentic or counterfeit images from the same source) for initial training, and thereafter adaptively classifies and clusters images from multiple sources as they join the population to be classified. Authentic images and multiple sources of counterfeit images are identified, and secondary links between the non-compliant samples are provided. The system currently uses a set of 420 metrics which are filtered to a smaller set of features that can reliably describe our known set. This filtered set of features, or feature signature, is used for the search and clustering thereafter. We describe the use of this system to streamline and enhance investigations for a global brand protection program.
document engineering | 2010
Steven J. Simske; Margaret Sturgill; Guy Adams; Paul S. Everest
Much of the focus in document security tends to be on the deterrent -- the physical (printed, manufactured) item placed on a document, often used for routing in addition to security purposes. Hybrid (multiple) deterrents are not always reliably read by a single imaging device, and so a single device generally cannot simultaneously provide overall document security. We herein show how a relatively simple deterrent can be used in combination with multiple imaging devices to provide document security. In this paper, we show how these devices can be used to classify the printing technology used, a subject of importance for counterfeiter identification as well as printer quality control. Forensic-level imaging is also useful in preventing repudiation and forging, while mobile and/or simple scanning can be used to prevent tampering -- propitiously in addition to providing useful, non-security related, capabilities such as document routing (track and trace) and workflow association.
Archive | 2005
Richard Aufranc; James R Cole; Paul S. Everest
Archive | 2007
Paul S. Everest
Archive | 2009
Steven J. Simske; Paul S. Everest
Archive | 2009
Steven J. Simske; Malgorzata M. Sturgill; Paul S. Everest
Archive | 2008
Steven J. Simske; Malgorzala M. Sturgill; John Stephen Dunfield; Paul S. Everest
Archive | 2012
Steven J. Simske; Malgorzata M. Sturgill; Jason S. Aronoff; Paul S. Everest
Archive | 2011
Steven J. Simske; Malgorzata M. Sturgill; Matthew D. Gaubatz; Masoud Zavarehi; Paul S. Everest
Archive | 2009
Steven J. Simske; Malgorzata M. Sturgill; A. Marie Vans; Paul S. Everest