Iuliia Tkachenko

Orcid: 0000-0001-5551-1105

According to our database1, Iuliia Tkachenko authored at least 25 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CDP-Sim: Similarity Metric Learning to Identify the Fake Copy Detection Patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Printed Packaging Authentication: Similarity Metric Learning for Rotogravure Manufacture Process Identification.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023

Improving Generalization in Facial Manipulation Detection Using Image Noise Residuals and Temporal Features.
Proceedings of the IEEE International Conference on Image Processing, 2023

Learning to rank approach for refining image retrieval in visual arts.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Authentication of rotogravure print-outs using a regular test pattern.
J. Inf. Secur. Appl., 2022

A Two-Step Method for Ensuring Printed Document Integrity using Crossing Number Distances.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

2021
Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detector.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Crossing Number Features: From Biometrics to Printed Character Matching.
Proceedings of the Document Analysis and Recognition, 2021

2020
Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2019
Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Authentication of Medicine Blister Foils: Characterization of the Rotogravure Printing Process.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

Estimation of Copy-sensitive Codes Using a Neural Approach.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Copy Sensitive Graphical Code Quality Improvement Using a Super-Resolution Technique.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

2017
Sensitivity of different correlation measures to print-and-scan process.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Robustness of Character Recognition Techniques to Double Print-and-Scan Process.
Proceedings of the 1st International Workshop on Computational Document Forensics, 2017

2016
Two-Level QR Code for Private Message Sharing and Document Authentication.
IEEE Trans. Inf. Forensics Secur., 2016

Centrality bias measure for high density QR code module recognition.
Signal Process. Image Commun., 2016

Experimental study of Print-and-Scan impact as random process.
Proceedings of the Media Watermarking, 2016

Printed document authentication using two level or code.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Generation and analysis of graphical codes using textured patterns for printed document authentication. (Génération et analyse des codes graphiques utilisant des motifs texturés pour l'authentification de documents imprimés).
PhD thesis, 2015

Rich QR Code for Multimedia Management Applications.
Proceedings of the Image Analysis and Processing - ICIAP 2015, 2015

2014
Improving the module recognition rate of high density QR codes (Version 40) by using centrality bias.
Proceedings of the 4th International Conference on Image Processing Theory, 2014

Fighting against forged documents by using textured image.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors.
Proceedings of the Communications and Multimedia Security, 2013


  Loading...