Mehmet Kivanç Mihçak

According to our database1, Mehmet Kivanç Mihçak authored at least 52 papers between 1998 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Scalar Quadratic-Gaussian Soft Watermarking Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2014
A parallel two-pass MDL context tree algorithm for universal source coding.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2012
Noise modeling and OFDM based receiver design in power-line communication.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

2011
True Random Number Generation Via Sampling From Flat Band-Limited Gaussian Processes.
IEEE Trans. Circuits Syst. I Regul. Pap., 2011

A face image hashing method based on optimal linear transform under colored Gaussian noise assumption.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011

Information theoretic capacity analysis for biometric hashing methods.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011

2010
A Detection Theoretic Approach to Digital Fingerprinting With Focused Receivers Under Uniform Linear Averaging Gaussian Attacks.
IEEE Trans. Inf. Forensics Secur., 2010

On Temporal Connectivity of PFC Via Gauss - Markov Modeling of fNIRS Signals.
IEEE Trans. Biomed. Eng., 2010

Time frequency analysis of noise generated by electrical loads in PLC.
Proceedings of the 17th International Conference on Telecommunications, 2010

A learning framework for robust hashing of face images.
Proceedings of the International Conference on Image Processing, 2010

2009
An Information Theoretic Analysis of Single Transceiver Passive RFID Networks
CoRR, 2009

On detection with partial information in the Gaussian setup.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
A Note on the Periodicity and the Output Rate of Bit Search Type Generators.
IEEE Trans. Inf. Theory, 2008

On Minimax Optimal Linear Transforms for Detection with Side Information in Gaussian Setup.
IEEE Commun. Lett., 2008

Reliable Communications with Asymmetric Codebooks: An Information Theoretic Analysis of Robust Signal Hashing
CoRR, 2008

Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG
CoRR, 2008

Perceptual hash based blind geometric synchronization of images for watermarking.
Proceedings of the Security, 2008

A lightweight biometric signature scheme for user authentication over networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Generalized Improved Spread Spectrum watermarking robust against translation attacks.
Proceedings of the IEEE International Conference on Acoustics, 2008

2007
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations.
IEEE Trans. Inf. Forensics Secur., 2007

Watermarking and Streaming Compressed Video.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
The edge process model and its application to information-hiding capacity analysis.
IEEE Trans. Signal Process., 2006

Geometrically Invariant Image Watermarking via Robust Perceptual Hashes.
Proceedings of the International Conference on Image Processing, 2006

Robust Image Hashing Via Non-Negative Matrix Factorizations.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Certifying authenticity via fiber-infused paper.
SIGecom Exch., 2005

Towards geometrically robust data-hiding with structured codebooks.
Multim. Syst., 2005

Watermarking via optimization algorithms for quantizing randomized semi-global image statistics.
Multim. Syst., 2005

An improved attack analysis on a public-key spread spectrum watermarking.
Multim. Syst., 2005

Security analysis of robust data-hiding with geometrically structured codebooks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Temporal synchronization of watermarked video using image hashing.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Collusion-resistant intentional de-synchronization for digital video fingerprinting.
Proceedings of the 2005 International Conference on Image Processing, 2005

Bounded Gaussian fingerprints and the gradient collusion attack [multimedia fingerprinting applications].
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Data-hiding with partially available side information.
Proceedings of the 13th European Signal Processing Conference, 2005

Complexity regularized video watermarking via quantization of pseudo-random semi-global linear statistics.
Proceedings of the 13th European Signal Processing Conference, 2005

2004
The parallel-Gaussian watermarking game.
IEEE Trans. Inf. Theory, 2004

Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Robust perceptual image hashing via matrix invariants.
Proceedings of the 2004 International Conference on Image Processing, 2004

2002
Information Hiding Codes and Their Applications to Images and Audio
PhD thesis, 2002

A framework for evaluating the data-hiding capacity of image sources.
IEEE Trans. Image Process., 2002

Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Information embedding codes matched to locally stationary Gaussian image models.
Proceedings of the 2002 International Conference on Image Processing, 2002

Blind image watermarking via derivation and quantization of robust semi-global statistics.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
Rate-distortion-optimal subband coding without perfect-reconstruction constraints.
IEEE Trans. Signal Process., 2001

A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding.
Proceedings of the Information Hiding, 4th International Workshop, 2001

New Iterative Geometric Methods for Robust Perceptual Image Hashing.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
An Information-Theoretic Model for Image Watermarking and Data Hiding.
Proceedings of the 2000 International Conference on Image Processing, 2000

Design and Analysis of a Forward-Adaptive Wavelet Image Coder.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Low-complexity image denoising based on statistical modeling of wavelet coefficients.
IEEE Signal Process. Lett., 1999

Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Theory and design of signal-adapted FIR paraunitary filter banks.
IEEE Trans. Signal Process., 1998

Adaptive Wavelet Packet Image Coding using an Estimation-Quantization Framework.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998


  Loading...