Oleksiy J. Koval

According to our database1, Oleksiy J. Koval authored at least 79 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding.
IEEE Trans. Inf. Forensics Secur., 2012

Active content fingerprinting: A marriage of digital watermarking and content fingerprinting.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS).
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

DCT sign based robust privacy preserving image copy detection for cloud-based systems.
Proceedings of the 10th International Workshop on Content-Based Multimedia Indexing, 2012

2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011

Private content identification based on soft fingerprinting.
Proceedings of the Media Forensics and Security III, 2011

Geometrically robust perceptual fingerprinting: an asymmetric case.
Proceedings of the Media Forensics and Security III, 2011

Trading-off performance and complexity in identification problem.
Proceedings of the Media Forensics and Security III, 2011

Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Identification in desynchronization channels.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

On multiple hypothesis testing with rejection option.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Information-theoretic analysis of content based identification for correlated data.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Statistical analysis of digital image fingerprinting based on random projections.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Statistical analysis of binarized SIFT descriptors.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Information-theoretic analysis of desynchronization invariant object identification.
Proceedings of the IEEE International Conference on Acoustics, 2011

Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011

A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects.
Proceedings of the BIOSIG 2011, 2011

2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Private content identification: Performance-privacy-complexity trade-off.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Content identification based on digital fingerprint: What can be done if ML decoding fails?
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Multimodal object authentication with random projections: a worst-case approach.
Proceedings of the Media Forensics and Security II, 2010

Fast identification of highly distorted images.
Proceedings of the Media Forensics and Security II, 2010

Information-theoretical analysis of private content identification.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Performance analysis of identification system based on order statistics list decoder.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Privacy Preserving Identification: Order Statistics List Decoding Perspective.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Fast identification algorithms for forensic applications.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Random projections based item authentication.
Proceedings of the Media Forensics and Security I, 2009

Conception and limits of robust perceptual hashing: towards side information assisted hash functions.
Proceedings of the Media Forensics and Security I, 2009

On security threats for robust perceptual hashing.
Proceedings of the Media Forensics and Security I, 2009

2008
Quantization-Based Methods: Additive Attacks Performance Analysis.
Trans. Data Hiding Multim. Secur., 2008

Authentication of biometric identification documents via mobile devices.
J. Electronic Imaging, 2008

Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case.
Proceedings of the Security, 2008

Analysis of physical unclonable identification based on reference list decoding.
Proceedings of the Security, 2008

Security analysis of robust perceptual hashing.
Proceedings of the Security, 2008

Secure surface identification codes.
Proceedings of the Security, 2008

Multimodal authentication based on random projections and source coding.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Privacy-preserving multimodal person and object identification.
Proceedings of the 10th workshop on Multimedia & Security, 2008

On reversible information hiding system.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Privacy-preserving biometric person identification.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

Document forensics based on steganographic anti-counterfeiting markings and mobile architectures.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
Quality enhancement of printed-and-scanned images using distributed coding.
Signal Process., 2007

Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Error exponent analysis of person identification based on fusion of dependent/independent modalities.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Robust perceptual hashing as classification problem: decision-theoretic and practical considerations.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

Analysis of multimodal binary detection systems based on dependent/independent modalities.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

2006
The edge process model and its application to information-hiding capacity analysis.
IEEE Trans. Signal Process., 2006

Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management.
IEEE Trans. Inf. Forensics Secur., 2006

Robustness improvement of known-host-state data-hiding using host statistics.
Signal Process., 2006

Facial Image Compression Based on Structured Codebooks in Overcomplete Domain.
EURASIP J. Adv. Signal Process., 2006

Information-theoretic analysis of electronic and printed document authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Text data-hiding for digital and printed documents: theoretical and practical considerations.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Performance analysis of nonuniform quantization-based data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

E-capacity analysis of data-hiding channels with geometrical attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

On reversibility of random binning based data-hiding techniques: security perspectives.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Information-theoretic analysis of steganalysis in real images.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Costa Problem Under Channel Ambiguity.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Image denoising based on the edge-process model.
Signal Process., 2005

Towards geometrically robust data-hiding with structured codebooks.
Multim. Syst., 2005

Information-Theoretic Data-Hiding: Recent Achievements And Open Problems.
Int. J. Image Graph., 2005

Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Worst-case additive attack against quantization-based data-hiding methods.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Security analysis of robust data-hiding with geometrically structured codebooks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robustness improvement of known-host-state watermarking using host statistics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Practical Data-Hiding: Additive Attacks Performance Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Asymmetric spread spectrum data-hiding for Laplacian host data.
Proceedings of the 2005 International Conference on Image Processing, 2005

Data-hiding with partially available side information.
Proceedings of the 13th European Signal Processing Conference, 2005

Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups.
Proceedings of the 13th European Signal Processing Conference, 2005

On Reversibility of Random Binning Techniques: Multimedia Perspectives.
Proceedings of the Communications and Multimedia Security, 2005

A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.
Proceedings of the Communications and Multimedia Security, 2005

2004
Distributed single source coding with side information.
Proceedings of the Visual Communications and Image Processing 2004, 2004

Visual communications with side information via distributed printing channels: extended multimedia and security perspectives.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Worst case additive attack against quantization-based watermarking techniques.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Quantization-based watermarking performance improvement using host statistics: AWGN attack case.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Capacity analysis of periodical watermarking.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Spread spectrum watermarking for real images: Is everything so hopeless?
Proceedings of the 2004 12th European Signal Processing Conference, 2004

2003
Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003


  Loading...