SlideShare a Scribd company logo
Resis
Data Integrity
Solutions
Downloading
Documents are
automatically
downloaded from
their repository.
Data Extraction
Documents are
processed to extract
images and other
relevant data.
Automated Analysis
Different data types (text,
images, numbers) are
processed separately for
different purposes.
Final Report
For every confirmed positive
hit, there will be a report
containing relevant details
and suggested actions
Human Analysis
Documents flagged as
problematic in the previous
steps are revised by a
human expert.
Resis Integrity Checking Process
Scientific documents sometimes contain serious errors in data, analysis or text, either because
of honest mistakes or because of deliberate fraud. Combining informatics tools with the insight of
our experts, we uncover potential problems for scientific publishers and journals, academic
institutions, public bodies, industry and whoever needs to verify scientific data.
Forensic
certification
Suggested
actions
Findings
report
Image
checking
Resis
Resis Image Scanning Pipeline 1
Figure finding
Rectangular
portions
containing
images are
extracted from
the paper
Panel isolation
Every figure is
fragmented into
single panels
corresponding to
single experiments
Pdf to image
Every page of the
source paper is
converted into a
single, standardized
image
ROI selection
Interesting features
(regions of interest,
ROI) are isolated
from each panel
and compared
ROI flagging
If 2 ROIs are similar
beyond a
predefined
threshold, they are
flagged for analysis
Human evaluation
Using sophisticated image
analysis technique, an
expert validates the
findings
The aim of our first image checking pipeline is to assess whether images in a paper are
manipulated, i.e. whether they contain duplicated portions coming from elsewhere in a given
paper under scrutiny.
Resis Image Scanning Pipeline 2
Figure finding
Rectangular portions
containing images
are extracted from
the paper
Panel isolation
Every figure is
fragmented into
single panels
corresponding to
single experiments
Pdf to image
Every page of the
source paper is
converted into a
single, standardized
image
Panel comparison
Panels from the same
and from other papers
(if a DB is available) are
compared. Panels too
similar are flagged
Human evaluation
Using sophisticated image
analysis technique, an
expert validates the
findings
The aim of our second image checking pipeline is to assess whether images in a paper are entirely
duplicated (with slight modifications) starting from a source in the same or in different papers
(relying on a DB provided by the customer, e.g. the entire set of papers published by a journal).
Resis Image analysis
We are expert in image analysis. When needed, sophisticated algorithms might be developed and
used to uncover invisible image manipulations, so to leave no doubts in potential misconduct cases.
Original image Local variance map
Resis Independent expert opinion
Sometimes it might be extremely
difficult to assess whether an improper
image manipulation amounts to
honest error, sloppy science or serious
misconduct.
In these special occasions, we rely on
our worldwide scientific board for
supporting us with an independent
expert opinion to assess whether a
data integrity violation did occur.
Resis
Text
checking
Resis Text Checking Possibilities
Scanning over Internet Scanning side-by-side Multiple comparison
To uncover potential plagiarism cases, we use commercial standard tools. We can check for online
sources of a plagiarized document, we can compare side-by-side a couple of documents or we
can run multiple comparisons (one to many, many to many, everyone with everyone else)
1. Scan
2. Certificate
Resis
As a matter of fact, there are lots of
excellent commercial solutions to
check for text plagiarism; we indeed
use one of them!
However, a software can only tell you
the degree of identity between the
target document and its potential
sources.
Is this a true plagiarism case or not?
Only a human can tell it.
We have documented experience in
settling legal dispute over potential
plagiarism cases.
Telling apart true plagiarism cases
Number
checking
Resis
Benford's law, also called the first-digit law, is a
phenomenological law about the frequency
distribution of leading digits in many real-life sets of
numerical data.
The law states that in many naturally occurring
collections of numbers, the leading significant digit is
likely to be small. For example, in sets which obey the
law, the number 1 appears as the most significant digit
about 30% of the time, while 9 appears as the most
significant digit less than 5% of the time. By contrast, if
the digits were distributed uniformly, they would each
occur about 11.1% of the time.
Benford's law also makes (different) predictions about
the distribution of second digits, third digits, digit
combinations, and so on.
Source: Wikipedia
The Benford’s law
Resis
Numbers in tables of scientific paper are often (but not always!) expected to obey the Benford’s law. We have developed
simple tools to check for large deviations from expected digit frequency distribution, similarly to what is done to identify
potential frauds in financial accounting.
0%
5%
10%
15%
20%
25%
30%
35%
1 2 3 4 5 6 7 8 9
Frequency
First Digit
Benford's Test - First Digit
Frequency of First Digit Predicted By Benford
0%
5%
10%
15%
20%
25%
30%
35%
1 2 3 4 5 6 7 8 9 10
Frequency
Second Digit
Benford's Test - Second Digit
Frequency of Second Digit Predicted By Benford
Benford’s test
Web: www.resis-srl.com
Mail to: info@resis-srl.com
Address: Via Ivrea, 8/1 – 10010 Samone (TO) - ITALY
Resis
Thank You!

More Related Content

Viewers also liked

update
updateupdate
Pmi pmbok-resume template-8
Pmi pmbok-resume template-8Pmi pmbok-resume template-8
Pmi pmbok-resume template-8
vishvas786
 
Bao cao cuoi ky
Bao cao cuoi kyBao cao cuoi ky
Bao cao cuoi kykanzakido
 
Mission vishvas-resume template-11
Mission vishvas-resume template-11Mission vishvas-resume template-11
Mission vishvas-resume template-11
vishvas786
 
Pmi pmp-resume template-5
Pmi pmp-resume template-5Pmi pmp-resume template-5
Pmi pmp-resume template-5
vishvas786
 
Public speaking
Public speaking Public speaking
Public speaking
Zarmayana Nur Khairunni
 
Vishvas resume template-4
Vishvas resume template-4Vishvas resume template-4
Vishvas resume template-4
vishvas786
 
SAP-консультанты компании "ЮНИТЕРА"
SAP-консультанты компании "ЮНИТЕРА"SAP-консультанты компании "ЮНИТЕРА"
SAP-консультанты компании "ЮНИТЕРА"
Maria Prokhorova
 
Cmmaao pmi-resume template-14
Cmmaao pmi-resume template-14Cmmaao pmi-resume template-14
Cmmaao pmi-resume template-14
vishvas786
 
Cmmaao pmi-resume template-8
Cmmaao pmi-resume template-8Cmmaao pmi-resume template-8
Cmmaao pmi-resume template-8
vishvas786
 
Patient Counseling is a Legal Requirement for Pharmacists
Patient Counseling is a Legal Requirement for PharmacistsPatient Counseling is a Legal Requirement for Pharmacists
Patient Counseling is a Legal Requirement for Pharmacists
Hossam Tanana
 
Cmmaao pmi-resume template-11
Cmmaao pmi-resume template-11Cmmaao pmi-resume template-11
Cmmaao pmi-resume template-11
vishvas786
 
Resume template 16
Resume template 16Resume template 16
Resume template 16
vishvas786
 
Resume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmiResume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmi
vishvas786
 
Mission vishvas-resume template-9
Mission vishvas-resume template-9Mission vishvas-resume template-9
Mission vishvas-resume template-9
vishvas786
 
Resume template 11
Resume template 11Resume template 11
Resume template 11
vishvas786
 
Pmi pmp-resume template-16
Pmi pmp-resume template-16Pmi pmp-resume template-16
Pmi pmp-resume template-16
vishvas786
 
Pmi pmbok-resume template-16
Pmi pmbok-resume template-16Pmi pmbok-resume template-16
Pmi pmbok-resume template-16
vishvas786
 
Vishvas resume template-16
Vishvas resume template-16Vishvas resume template-16
Vishvas resume template-16
vishvas786
 
Copy of Assignment
Copy of Assignment Copy of Assignment
Copy of Assignment
Susan Amiri
 

Viewers also liked (20)

update
updateupdate
update
 
Pmi pmbok-resume template-8
Pmi pmbok-resume template-8Pmi pmbok-resume template-8
Pmi pmbok-resume template-8
 
Bao cao cuoi ky
Bao cao cuoi kyBao cao cuoi ky
Bao cao cuoi ky
 
Mission vishvas-resume template-11
Mission vishvas-resume template-11Mission vishvas-resume template-11
Mission vishvas-resume template-11
 
Pmi pmp-resume template-5
Pmi pmp-resume template-5Pmi pmp-resume template-5
Pmi pmp-resume template-5
 
Public speaking
Public speaking Public speaking
Public speaking
 
Vishvas resume template-4
Vishvas resume template-4Vishvas resume template-4
Vishvas resume template-4
 
SAP-консультанты компании "ЮНИТЕРА"
SAP-консультанты компании "ЮНИТЕРА"SAP-консультанты компании "ЮНИТЕРА"
SAP-консультанты компании "ЮНИТЕРА"
 
Cmmaao pmi-resume template-14
Cmmaao pmi-resume template-14Cmmaao pmi-resume template-14
Cmmaao pmi-resume template-14
 
Cmmaao pmi-resume template-8
Cmmaao pmi-resume template-8Cmmaao pmi-resume template-8
Cmmaao pmi-resume template-8
 
Patient Counseling is a Legal Requirement for Pharmacists
Patient Counseling is a Legal Requirement for PharmacistsPatient Counseling is a Legal Requirement for Pharmacists
Patient Counseling is a Legal Requirement for Pharmacists
 
Cmmaao pmi-resume template-11
Cmmaao pmi-resume template-11Cmmaao pmi-resume template-11
Cmmaao pmi-resume template-11
 
Resume template 16
Resume template 16Resume template 16
Resume template 16
 
Resume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmiResume template 18-cmmaao-pmi
Resume template 18-cmmaao-pmi
 
Mission vishvas-resume template-9
Mission vishvas-resume template-9Mission vishvas-resume template-9
Mission vishvas-resume template-9
 
Resume template 11
Resume template 11Resume template 11
Resume template 11
 
Pmi pmp-resume template-16
Pmi pmp-resume template-16Pmi pmp-resume template-16
Pmi pmp-resume template-16
 
Pmi pmbok-resume template-16
Pmi pmbok-resume template-16Pmi pmbok-resume template-16
Pmi pmbok-resume template-16
 
Vishvas resume template-16
Vishvas resume template-16Vishvas resume template-16
Vishvas resume template-16
 
Copy of Assignment
Copy of Assignment Copy of Assignment
Copy of Assignment
 

Similar to Integrity Services

benfords Law
benfords Lawbenfords Law
benfords Law
Mark Luciani
 
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Gianluca Tarasconi
 
Using Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and InterventionUsing Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and Intervention
Jon Gosier
 
C3602021025
C3602021025C3602021025
C3602021025
ijceronline
 
NICOLE SHANAHAN TOA Nov 4
NICOLE SHANAHAN TOA Nov 4NICOLE SHANAHAN TOA Nov 4
NICOLE SHANAHAN TOA Nov 4
Nicole Shanahan
 
How to start for machine learning career
How to start for machine learning careerHow to start for machine learning career
How to start for machine learning career
BigAnalytics .me
 
informatics_future.pdf
informatics_future.pdfinformatics_future.pdf
informatics_future.pdf
AdhySugara2
 
Framework for developing algorithmic fairness
Framework for developing algorithmic fairnessFramework for developing algorithmic fairness
Framework for developing algorithmic fairness
journalBEEI
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
Alex Pinto
 
Automated Discovery of Logical Fallacies in Legal Argumentation
Automated Discovery of Logical Fallacies in Legal ArgumentationAutomated Discovery of Logical Fallacies in Legal Argumentation
Automated Discovery of Logical Fallacies in Legal Argumentation
gerogepatton
 
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATIONAUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
ijaia
 
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATIONAUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
gerogepatton
 
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATIONAUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
gerogepatton
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Drog3
 
Applications of machine learning
Applications of machine learningApplications of machine learning
Applications of machine learning
business Corporate
 
concept real evidence and criminal investigation
concept real evidence and criminal investigationconcept real evidence and criminal investigation
concept real evidence and criminal investigation
wadani388098
 
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET Journal
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
Anton Chuvakin
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
CMR WORLD TECH
 
Agency Records, Content Analysis, and Secondary DataChap.docx
Agency Records, Content Analysis, and Secondary DataChap.docxAgency Records, Content Analysis, and Secondary DataChap.docx
Agency Records, Content Analysis, and Secondary DataChap.docx
daniahendric
 

Similar to Integrity Services (20)

benfords Law
benfords Lawbenfords Law
benfords Law
 
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
 
Using Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and InterventionUsing Predictive Analytics for Anticipatory Investigation and Intervention
Using Predictive Analytics for Anticipatory Investigation and Intervention
 
C3602021025
C3602021025C3602021025
C3602021025
 
NICOLE SHANAHAN TOA Nov 4
NICOLE SHANAHAN TOA Nov 4NICOLE SHANAHAN TOA Nov 4
NICOLE SHANAHAN TOA Nov 4
 
How to start for machine learning career
How to start for machine learning careerHow to start for machine learning career
How to start for machine learning career
 
informatics_future.pdf
informatics_future.pdfinformatics_future.pdf
informatics_future.pdf
 
Framework for developing algorithmic fairness
Framework for developing algorithmic fairnessFramework for developing algorithmic fairness
Framework for developing algorithmic fairness
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
Automated Discovery of Logical Fallacies in Legal Argumentation
Automated Discovery of Logical Fallacies in Legal ArgumentationAutomated Discovery of Logical Fallacies in Legal Argumentation
Automated Discovery of Logical Fallacies in Legal Argumentation
 
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATIONAUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
 
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATIONAUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
 
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATIONAUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
AUTOMATED DISCOVERY OF LOGICAL FALLACIES IN LEGAL ARGUMENTATION
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
Applications of machine learning
Applications of machine learningApplications of machine learning
Applications of machine learning
 
concept real evidence and criminal investigation
concept real evidence and criminal investigationconcept real evidence and criminal investigation
concept real evidence and criminal investigation
 
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Agency Records, Content Analysis, and Secondary DataChap.docx
Agency Records, Content Analysis, and Secondary DataChap.docxAgency Records, Content Analysis, and Secondary DataChap.docx
Agency Records, Content Analysis, and Secondary DataChap.docx
 

Integrity Services

  • 2. Downloading Documents are automatically downloaded from their repository. Data Extraction Documents are processed to extract images and other relevant data. Automated Analysis Different data types (text, images, numbers) are processed separately for different purposes. Final Report For every confirmed positive hit, there will be a report containing relevant details and suggested actions Human Analysis Documents flagged as problematic in the previous steps are revised by a human expert. Resis Integrity Checking Process Scientific documents sometimes contain serious errors in data, analysis or text, either because of honest mistakes or because of deliberate fraud. Combining informatics tools with the insight of our experts, we uncover potential problems for scientific publishers and journals, academic institutions, public bodies, industry and whoever needs to verify scientific data. Forensic certification Suggested actions Findings report
  • 4. Resis Image Scanning Pipeline 1 Figure finding Rectangular portions containing images are extracted from the paper Panel isolation Every figure is fragmented into single panels corresponding to single experiments Pdf to image Every page of the source paper is converted into a single, standardized image ROI selection Interesting features (regions of interest, ROI) are isolated from each panel and compared ROI flagging If 2 ROIs are similar beyond a predefined threshold, they are flagged for analysis Human evaluation Using sophisticated image analysis technique, an expert validates the findings The aim of our first image checking pipeline is to assess whether images in a paper are manipulated, i.e. whether they contain duplicated portions coming from elsewhere in a given paper under scrutiny.
  • 5. Resis Image Scanning Pipeline 2 Figure finding Rectangular portions containing images are extracted from the paper Panel isolation Every figure is fragmented into single panels corresponding to single experiments Pdf to image Every page of the source paper is converted into a single, standardized image Panel comparison Panels from the same and from other papers (if a DB is available) are compared. Panels too similar are flagged Human evaluation Using sophisticated image analysis technique, an expert validates the findings The aim of our second image checking pipeline is to assess whether images in a paper are entirely duplicated (with slight modifications) starting from a source in the same or in different papers (relying on a DB provided by the customer, e.g. the entire set of papers published by a journal).
  • 6. Resis Image analysis We are expert in image analysis. When needed, sophisticated algorithms might be developed and used to uncover invisible image manipulations, so to leave no doubts in potential misconduct cases. Original image Local variance map
  • 7. Resis Independent expert opinion Sometimes it might be extremely difficult to assess whether an improper image manipulation amounts to honest error, sloppy science or serious misconduct. In these special occasions, we rely on our worldwide scientific board for supporting us with an independent expert opinion to assess whether a data integrity violation did occur.
  • 9. Resis Text Checking Possibilities Scanning over Internet Scanning side-by-side Multiple comparison To uncover potential plagiarism cases, we use commercial standard tools. We can check for online sources of a plagiarized document, we can compare side-by-side a couple of documents or we can run multiple comparisons (one to many, many to many, everyone with everyone else)
  • 10. 1. Scan 2. Certificate Resis As a matter of fact, there are lots of excellent commercial solutions to check for text plagiarism; we indeed use one of them! However, a software can only tell you the degree of identity between the target document and its potential sources. Is this a true plagiarism case or not? Only a human can tell it. We have documented experience in settling legal dispute over potential plagiarism cases. Telling apart true plagiarism cases
  • 12. Benford's law, also called the first-digit law, is a phenomenological law about the frequency distribution of leading digits in many real-life sets of numerical data. The law states that in many naturally occurring collections of numbers, the leading significant digit is likely to be small. For example, in sets which obey the law, the number 1 appears as the most significant digit about 30% of the time, while 9 appears as the most significant digit less than 5% of the time. By contrast, if the digits were distributed uniformly, they would each occur about 11.1% of the time. Benford's law also makes (different) predictions about the distribution of second digits, third digits, digit combinations, and so on. Source: Wikipedia The Benford’s law
  • 13. Resis Numbers in tables of scientific paper are often (but not always!) expected to obey the Benford’s law. We have developed simple tools to check for large deviations from expected digit frequency distribution, similarly to what is done to identify potential frauds in financial accounting. 0% 5% 10% 15% 20% 25% 30% 35% 1 2 3 4 5 6 7 8 9 Frequency First Digit Benford's Test - First Digit Frequency of First Digit Predicted By Benford 0% 5% 10% 15% 20% 25% 30% 35% 1 2 3 4 5 6 7 8 9 10 Frequency Second Digit Benford's Test - Second Digit Frequency of Second Digit Predicted By Benford Benford’s test
  • 14. Web: www.resis-srl.com Mail to: info@resis-srl.com Address: Via Ivrea, 8/1 – 10010 Samone (TO) - ITALY Resis Thank You!