YASS: Yet Another Spike Sorter

نویسندگان

  • Jin Hyung Lee
  • David E. Carlson
  • Hooshmand Shokri Razaghi
  • Weichi Yao
  • Georges A. Goetz
  • Espen Hagen
  • Eleanor Batty
  • E. J. Chichilnisky
  • Gaute T. Einevoll
  • Liam Paninski
چکیده

Spike sorting is a critical first step in extracting neural signals from large-scale electrophysiological data. This manuscript describes an efficient, reliable pipeline for spike sorting on dense multi-electrode arrays (MEAs), where neural signals appear across many electrodes and spike sorting currently represents a major computational bottleneck. We present several new techniques that make dense MEA spike sorting more robust and scalable. Our pipeline is based on an efficient multistage “triage-then-cluster-then-pursuit” approach that initially extracts only clean, high-quality waveforms from the electrophysiological time series by temporarily skipping noisy or “collided” events (representing two neurons firing synchronously). This is accomplished by developing a neural network detection method followed by efficient outlier triaging. The clean waveforms are then used to infer the set of neural spike waveform templates through nonparametric Bayesian clustering. Our clustering approach adapts a “coreset” approach for data reduction and uses efficient inference methods in a Dirichlet process mixture model framework to dramatically improve the scalability and reliability of the entire pipeline. The “triaged” waveforms are then finally recovered with matching-pursuit deconvolution techniques. The proposed methods improve on the state-of-the-art in terms of accuracy and stability on both real and biophysically-realistic simulated MEA data. Furthermore, the proposed pipeline is efficient, learning templates and clustering much faster than real-time for a ' 500-electrode dataset, using primarily a single CPU core.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganalysis of YASS Using Huffman Length Statistics

This work proposes two main contributions to statistical steganalysis of Yet Another Steganographic Scheme (YASS) in JPEG images. Firstly, this work presents a reliable blind steganalysis technique to predict YASS which is one of recent and least statistically detectable embedding scheme using only five features, four Huffman length statistics (H) and the ratio of file size to resolution (FR In...

متن کامل

Further study on YASS: steganography based on randomized embedding to resist blind steganalysis

We present further extensions of yet another steganographic scheme (YASS), a method based on embedding data in randomized locations so as to resist blind steganalysis. YASS is a JPEG steganographic technique that hides data in the discrete cosing transform (DCT) coefficients of randomly chosen image blocks. Continuing to focus on JPEG image steganography, we present, in this paper, a further st...

متن کامل

Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS

Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform (DCT) domain in randomly chosen image blocks. To maximize the embedding rate for a given image and a specified attack channel, the redundancy factor used by the repeat-accumulate (RA) code based error correction frame...

متن کامل

YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis

A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distortion constrained attacks. We present Yet Another Steganographic Scheme (YASS), a method based on embedding data in randomized locations so as to disable the selfcalibration process (such as, by cropping a few pixel rows and/or ...

متن کامل

On YASS's Non-monotonic Security Performance

Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper first analyzes this abnormality and points out that it is caused by the non-uniformity in probability of coincidence of 8 × 8 embedding blocks and 8 × 8 JPEG blocks. Based on this ob...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017