Pawel Korus

Orcid: 0000-0002-4230-9853

According to our database1, Pawel Korus authored at least 34 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Dictionary Attacks on Speaker Verification.
IEEE Trans. Inf. Forensics Secur., 2023

2022
File Fragment Type (FFT) - 75 Dataset.
Dataset, May, 2022

Computational Sensor Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2022

2021
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Hard-Attention for Scalable Image Classification.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments.
IEEE Trans. Inf. Forensics Secur., 2019

FiFTy: Large-scale File Fragment Type Identification using Neural Networks.
CoRR, 2019

Neural Imaging Pipelines - the Scourge or Hope of Forensics?
CoRR, 2019

Adversarial Optimization for Dictionary Attacks on Speaker Verification.
Proceedings of the Interspeech 2019, 2019

Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Band Energy Difference for Source Attribution in Audio Forensics.
IEEE Trans. Inf. Forensics Secur., 2018

Large-Scale and Fine-Grained Evaluation of Popular JPEG Forgery Localization Schemes.
CoRR, 2018

2017
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization.
IEEE Trans. Inf. Forensics Secur., 2017

Digital image integrity - a survey of protection and verification techniques.
Digit. Signal Process., 2017

2016
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images.
IEEE Trans. Image Process., 2016

Image-Like 2D Barcodes Using Generalizations of the Kuznetsov-Tsybakov Problem.
IEEE Trans. Inf. Forensics Secur., 2016

Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk.
IEEE Signal Process. Lett., 2016

Evaluation of random field models in multi-modal unsupervised tampering localization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

2015
Towards Practical Self-Embedding for JPEG-Compressed Digital Images.
IEEE Trans. Multim., 2015

2014
A new approach to high-capacity annotation watermarking based on digital fountain codes.
Multim. Tools Appl., 2014

Iterative filtering for semi-fragile self-recovery.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

2013
Efficient Method for Content Reconstruction With Self-Embedding.
IEEE Trans. Image Process., 2013

Practical Implementation of Visual Hash Functions for CCTV Footage Authentication.
Proceedings of the Multimedia Communications, Services and Security, 2013

High-quality self-embedding for JPEG-compressed digital images.
Proceedings of the 21st European Signal Processing Conference, 2013

Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Correction Trees as an Alternative to Turbo Codes and Low Density Parity Check Codes
CoRR, 2012

Reconfigurable self-embedding with high quality restoration under extensive tampering.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
A High-Capacity Annotation Watermarking Scheme.
Proceedings of the Multimedia Communications, Services and Security, 2011

Automatic quality control of digital image content reconstruction schemes.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

A novel approach to adaptive image authentication.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
A scheme for censorship of sensitive image content with high-quality reconstruction ability.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

2009
Experimental Evaluation of PCE-Based Batch Provisioning of Grid Service Interconnections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009


  Loading...