Fokko Beekhof

According to our database1, Fokko Beekhof authored at least 30 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition.
IEEE Trans. Inf. Forensics Secur., 2015

2013
Active content fingerprinting: Shrinkage and lattice based modulations.
Proceedings of the IEEE International Conference on Acoustics, 2013

Physical object authentication with correlated camera noise.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013

2012
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS).
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Content authentication and identification under informed attacks.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

DCT sign based robust privacy preserving image copy detection for cloud-based systems.
Proceedings of the 10th International Workshop on Content-Based Multimedia Indexing, 2012

2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011

Private content identification based on soft fingerprinting.
Proceedings of the Media Forensics and Security III, 2011

Geometrically robust perceptual fingerprinting: an asymmetric case.
Proceedings of the Media Forensics and Security III, 2011

Trading-off performance and complexity in identification problem.
Proceedings of the Media Forensics and Security III, 2011

Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Information-theoretic analysis of content based identification for correlated data.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Statistical analysis of digital image fingerprinting based on random projections.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Statistical analysis of binarized SIFT descriptors.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Information-theoretic analysis of desynchronization invariant object identification.
Proceedings of the IEEE International Conference on Acoustics, 2011

Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Private content identification: Performance-privacy-complexity trade-off.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Fast identification of highly distorted images.
Proceedings of the Media Forensics and Security II, 2010

Information-theoretical analysis of private content identification.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Fast identification algorithms for forensic applications.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Random projections based item authentication.
Proceedings of the Media Forensics and Security I, 2009

Conception and limits of robust perceptual hashing: towards side information assisted hash functions.
Proceedings of the Media Forensics and Security I, 2009

2008
Authentication of biometric identification documents via mobile devices.
J. Electronic Imaging, 2008

Analysis of physical unclonable identification based on reference list decoding.
Proceedings of the Security, 2008

Security analysis of robust perceptual hashing.
Proceedings of the Security, 2008

Secure surface identification codes.
Proceedings of the Security, 2008

Document forensics based on steganographic anti-counterfeiting markings and mobile architectures.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007


  Loading...