Sviatoslav Voloshynovskiy

Orcid: 0000-0003-0416-9674

Affiliations:
  • University of Geneva, Stochastic Information Processing Group, Switzerland


According to our database1, Sviatoslav Voloshynovskiy authored at least 213 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hubble Meets Webb: Image-to-Image Translation in Astronomy.
Sensors, February, 2024

Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach.
IEEE Trans. Inf. Forensics Secur., 2024

A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns.
IEEE Trans. Inf. Forensics Secur., 2024

Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model.
CoRR, 2024

2023
Correction: Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur., December, 2023

Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur., December, 2023

TURBO: The Swiss Knife of Auto-Encoders.
Entropy, October, 2023

Multi-institutional PET/CT image segmentation using federated deep transformer learning.
Comput. Methods Programs Biomed., October, 2023

Bottlenecks CLUB: Unifying Information-Theoretic Trade-Offs Among Complexity, Leakage, and Utility.
IEEE Trans. Inf. Forensics Secur., 2023

Multivariate Time Series Information Bottleneck.
Entropy, 2023

MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation.
CoRR, 2023

Stochastic Digital Twin for Copy Detection Patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

2022
Privacy-Preserving Image Template Sharing Using Contrastive Learning.
Entropy, 2022

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Anomaly localization for copy detection patterns through print estimations.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Printing variability of copy detection patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Digital twins of physical printing-imaging channel.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Compressed Data Sharing Based On Information Bottleneck Model.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Turbo-Sim: a generalised generative model with a physical latent space.
CoRR, 2021

Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN.
CoRR, 2021

Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks.
CoRR, 2021

Funnels: Exact maximum likelihood with dimensionality reduction.
CoRR, 2021

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
CoRR, 2021

Solar activity classification based on Mg II spectra: Towards classification on compressed data.
Astron. Comput., 2021

Variational Leakage: The Role of Information Complexity in Privacy Leakage.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Mobile authentication of copy detection patterns: how critical is to know fakes?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Privacy-Preserving near Neighbor Search via Sparse Coding with Ambiguation.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Variational Information Bottleneck for Semi-Supervised Classification.
Entropy, 2020

Information Bottleneck Classification in Extremely Distributed Systems.
Entropy, 2020

Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
EURASIP J. Inf. Secur., 2020

On Perfect Obfuscation: Local Information Geometry Analysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns.
Proceedings of the Computational Science - ICCS 2020, 2020

Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Distributed Semi-Private Image Classification Based on Information-Bottleneck Principle.
Proceedings of the 28th European Signal Processing Conference, 2020

2019
Information bottleneck through variational glasses.
CoRR, 2019

ρ-VAE: Autoregressive parametrization of the VAE encoder.
CoRR, 2019

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding.
CoRR, 2019

Network Parameter Learning Using Nonlinear Transforms, Local Representation Goals and Local Propagation Constraints.
CoRR, 2019

Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment.
CoRR, 2019

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Robustification of Deep Net Classifiers by Key Based Diversified Aggregation with Pre-Filtering.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Reconstruction of Privacy-Sensitive Data from Protected Templates.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach.
Proceedings of the IEEE International Conference on Acoustics, 2019

Aggregation and Embedding for Group Membership Verification.
Proceedings of the IEEE International Conference on Acoustics, 2019

Defending Against Adversarial Attacks by Randomized Diversification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
Network Learning with Local Propagation.
CoRR, 2018

Learning Discrimination Specific, Self-Collaborative and Nonlinear Model.
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018

Privacy-Preserving Outsourced Media Search Using Secure Sparse Ternary Codes.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

DCT-Tensor-Net for Solar Flares Detection on IRIS Data.
Proceedings of the 7th European Workshop on Visual Information Processing, 2018

Learning Overcomplete and Sparsifying Transform With Approximate and Exact Closed Form Solutions.
Proceedings of the 7th European Workshop on Visual Information Processing, 2018

Classification by Re-generation: Towards Classification Based on Variational Inference.
Proceedings of the 26th European Signal Processing Conference, 2018

Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization.
Proceedings of the 26th European Signal Processing Conference, 2018

Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor.
Proceedings of the 26th European Signal Processing Conference, 2018

Injecting Image Priors into Learnable Compressive Subsampling.
Proceedings of the 26th European Signal Processing Conference, 2018

Bridging Machine Learning and Cryptography in Defence Against Adversarial Attacks.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Vector Compression for Similarity Search Using Multi-Layer Sparse Ternary Codes.
Proceedings of the 2018 IEEE Data Science Workshop, 2018

2017
A multi-layer network based on Sparse Ternary Codes for universal vector compression.
CoRR, 2017

Regularized Residual Quantization: a multi-layer sparse dictionary learning approach.
CoRR, 2017

Privacy preserving identification using sparse approximation with ambiguization.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Sparse ternary codes for similarity search have higher coding gain than dense binary codes.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A multi-layer image representation using regularized residual quantization: Application to compression and denoising.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Local Keypoint-Based Image Detector with Object Detection.
Proceedings of the Artificial Intelligence and Soft Computing, 2017

PharmaPack: Mobile fine-grained recognition of pharma packages.
Proceedings of the 25th European Signal Processing Conference, 2017

Joint learning of local fingerprint and content modulation.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Forensic authentication of banknotes on mobile phones.
Proceedings of the Media Watermarking, 2016

Local Active Content Fingerprint: Solutions for general linear feature maps.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Local active content fingerprinting: Optimal solution under linear modulation.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Image Descriptor Based on Edge Detection and Crawler Algorithm.
Proceedings of the Artificial Intelligence and Soft Computing, 2016

2015
Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition.
IEEE Trans. Inf. Forensics Secur., 2015

Sparse Multi-layer Image Approximation: Facial Image Compression.
CoRR, 2015

Information-theoretical limits of active content fingerprinting in content-based identification systems.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Mobile visual object identification: from SIFT-BoF-RANSAC to Sketchprint.
Proceedings of the Media Watermarking, 2015

Privacy preserving multimedia content identification for cloud based bag-of-feature architectures.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

Fast Dictionary Matching for Content-Based Image Retrieval.
Proceedings of the Artificial Intelligence and Soft Computing, 2015

Supervised Transform Learning for Face Recognition.
Proceedings of the Artificial Intelligence and Soft Computing, 2015

Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database.
Proceedings of the Artificial Intelligence and Soft Computing, 2015

Secure Representation of Images Using Multi-layer Compression.
Proceedings of the Artificial Intelligence and Soft Computing, 2015

Vector quantization with constrained likelihood for face recognition.
Proceedings of the 23rd European Signal Processing Conference, 2015

SketchPrint: Physical object micro-structure identification using mobile phones.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Active Content Fingerpriting.
IEEE Trans. Inf. Forensics Secur., 2014

Information Theoretical Analysis of Identification based on Active Content Fingerprinting.
CoRR, 2014

On accuracy, robustness, and security of bag-of-word search systems.
Proceedings of the Media Watermarking, 2014

Robust human face recognition based on locality preserving sparse over complete block approximation.
Proceedings of the Media Watermarking, 2014

Content identification: binary content fingerprinting versus binary content encoding.
Proceedings of the Media Watermarking, 2014

A framework for fast and secure packaging identification on mobile phones.
Proceedings of the Media Watermarking, 2014

Performance analysis of Bag-of-Features based content identification systems.
Proceedings of the IEEE International Conference on Acoustics, 2014

Robust Face Recognition by Group Sparse Representation That Uses Samples from List of Subjects.
Proceedings of the Artificial Intelligence and Soft Computing, 2014

From Single Image to List of Objects Based on Edge and Blob Detection.
Proceedings of the Artificial Intelligence and Soft Computing, 2014

Multi-class Classification: A Coding Based Space Partitioning.
Proceedings of the Artificial Intelligence and Soft Computing, 2014

2013
Fundamental limits of identification: Identification rate, search and memory complexity trade-off.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Physical object identification based on FAMOS microstructure fingerprinting: Comparison of templates versus invariant features.
Proceedings of the 8th International Symposium on Image and Signal Processing and Analysis, 2013

Active content fingerprinting: Shrinkage and lattice based modulations.
Proceedings of the IEEE International Conference on Acoustics, 2013

Physical object authentication with correlated camera noise.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013

2012
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding.
IEEE Trans. Inf. Forensics Secur., 2012

Active content fingerprinting: A marriage of digital watermarking and content fingerprinting.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS).
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Content authentication and identification under informed attacks.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

DCT sign based robust privacy preserving image copy detection for cloud-based systems.
Proceedings of the 10th International Workshop on Content-Based Multimedia Indexing, 2012

2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011

Private content identification based on soft fingerprinting.
Proceedings of the Media Forensics and Security III, 2011

Geometrically robust perceptual fingerprinting: an asymmetric case.
Proceedings of the Media Forensics and Security III, 2011

Trading-off performance and complexity in identification problem.
Proceedings of the Media Forensics and Security III, 2011

Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Identification in desynchronization channels.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

On multiple hypothesis testing with rejection option.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Information-theoretic analysis of content based identification for correlated data.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Statistical analysis of digital image fingerprinting based on random projections.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Statistical analysis of binarized SIFT descriptors.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Information-theoretic analysis of desynchronization invariant object identification.
Proceedings of the IEEE International Conference on Acoustics, 2011

Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011

A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects.
Proceedings of the BIOSIG 2011, 2011

2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Private content identification: Performance-privacy-complexity trade-off.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Content identification based on digital fingerprint: What can be done if ML decoding fails?
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Multimodal object authentication with random projections: a worst-case approach.
Proceedings of the Media Forensics and Security II, 2010

Fast identification of highly distorted images.
Proceedings of the Media Forensics and Security II, 2010

Information-theoretical analysis of private content identification.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Performance analysis of identification system based on order statistics list decoder.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Privacy Preserving Identification: Order Statistics List Decoding Perspective.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Fast identification algorithms for forensic applications.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Random projections based item authentication.
Proceedings of the Media Forensics and Security I, 2009

Conception and limits of robust perceptual hashing: towards side information assisted hash functions.
Proceedings of the Media Forensics and Security I, 2009

On security threats for robust perceptual hashing.
Proceedings of the Media Forensics and Security I, 2009

2008
Quantization-Based Methods: Additive Attacks Performance Analysis.
Trans. Data Hiding Multim. Secur., 2008

Authentication of biometric identification documents via mobile devices.
J. Electronic Imaging, 2008

Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case.
Proceedings of the Security, 2008

Analysis of physical unclonable identification based on reference list decoding.
Proceedings of the Security, 2008

Security analysis of robust perceptual hashing.
Proceedings of the Security, 2008

Secure surface identification codes.
Proceedings of the Security, 2008

Multimodal authentication based on random projections and source coding.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Privacy-preserving multimodal person and object identification.
Proceedings of the 10th workshop on Multimedia & Security, 2008

On reversible information hiding system.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Privacy-preserving biometric person identification.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

Document forensics based on steganographic anti-counterfeiting markings and mobile architectures.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
Quality enhancement of printed-and-scanned images using distributed coding.
Signal Process., 2007

Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Error exponent analysis of person identification based on fusion of dependent/independent modalities.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Robust perceptual hashing as classification problem: decision-theoretic and practical considerations.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

Analysis of multimodal binary detection systems based on dependent/independent modalities.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

2006
The edge process model and its application to information-hiding capacity analysis.
IEEE Trans. Signal Process., 2006

The Gaussian Transform of Distributions: Definition, Computation and Application.
IEEE Trans. Signal Process., 2006

Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management.
IEEE Trans. Inf. Forensics Secur., 2006

An accurate analysis of scalar quantization-based data hiding.
IEEE Trans. Inf. Forensics Secur., 2006

Robustness improvement of known-host-state data-hiding using host statistics.
Signal Process., 2006

Facial Image Compression Based on Structured Codebooks in Overcomplete Domain.
EURASIP J. Adv. Signal Process., 2006

Information-theoretic analysis of electronic and printed document authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Text data-hiding for digital and printed documents: theoretical and practical considerations.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Performance analysis of nonuniform quantization-based data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

E-capacity analysis of data-hiding channels with geometrical attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

On reversibility of random binning based data-hiding techniques: security perspectives.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Information-theoretic analysis of steganalysis in real images.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Costa Problem Under Channel Ambiguity.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Image denoising based on the edge-process model.
Signal Process., 2005

Towards geometrically robust data-hiding with structured codebooks.
Multim. Syst., 2005

Information-Theoretic Data-Hiding: Recent Achievements And Open Problems.
Int. J. Image Graph., 2005

Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Worst-case additive attack against quantization-based data-hiding methods.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Security analysis of robust data-hiding with geometrically structured codebooks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robustness improvement of known-host-state watermarking using host statistics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Practical Data-Hiding: Additive Attacks Performance Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Protocols for data-hiding based text document security and automatic processing.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Asymmetric spread spectrum data-hiding for Laplacian host data.
Proceedings of the 2005 International Conference on Image Processing, 2005

Data-hiding with partially available side information.
Proceedings of the 13th European Signal Processing Conference, 2005

Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups.
Proceedings of the 13th European Signal Processing Conference, 2005

The Gaussian Transform.
Proceedings of the 13th European Signal Processing Conference, 2005

Denoising with Infinite Mixture of Gaussians.
Proceedings of the 13th European Signal Processing Conference, 2005

Analysis of bit-rate definitions for Brain-Computer Interfaces.
Proceedings of The 2005 International Conference on Human-Computer Interaction, 2005

On Reversibility of Random Binning Techniques: Multimedia Perspectives.
Proceedings of the Communications and Multimedia Security, 2005

A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.
Proceedings of the Communications and Multimedia Security, 2005

Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Proceedings of the Communications and Multimedia Security, 2005

2004
Distributed single source coding with side information.
Proceedings of the Visual Communications and Image Processing 2004, 2004

Visual communications with side information via distributed printing channels: extended multimedia and security perspectives.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Interactive segmentation with hidden object-based annotations: toward smart media.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2004, 2004

Worst case additive attack against quantization-based watermarking techniques.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Revealing the true achievable rates of scalar Costa scheme.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Quantization-based watermarking performance improvement using host statistics: AWGN attack case.
Proceedings of the 6th workshop on Multimedia & Security, 2004

EEG Cortical Imaging: A Vector Field Approach for Laplacian Denoising and Missing Data Estimation.
Proceedings of the 2004 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2004

Capacity analysis of periodical watermarking.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Spread spectrum watermarking for real images: Is everything so hopeless?
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Localization properties of an EEG sensor system: Lower bounds and optimality.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

2003
Security of data hiding technologies.
Signal Process., 2003

Secure hybrid robust watermarking resistant against tampering and copy attack.
Signal Process., 2003

Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Metadata Representation for Semantic-Based Multimedia Security and Management.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

2002
StegoWall: blind statistical detection of hidden data.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Method for the estimation and recovering from general affine transforms in digital watermarking applications.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Capacity-security analysis of data hiding technologies.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Hybrid robust watermarking resistant against copy attack.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
Attack modelling: towards a second generation watermarking benchmark.
Signal Process., 2001

Optimal transform domain watermark embedding via linear programming.
Signal Process., 2001

Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks.
IEEE Commun. Mag., 2001

Optimal adaptive diversity watermarking with channel state estimation.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Watermark template attack.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Second Generation Benchmarking and Application Oriented Evaluation.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Multibit digital watermarking robust against local nonlinear geometrical distortions.
Proceedings of the 2001 International Conference on Image Processing, 2001

Counterfeit Attacks against a new Currency Protection Scheme.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Generalized watermarking attack based on watermark estimation and perceptual remodulation.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Watermark copy attack.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Effective Channel Coding for DCT Watermarks.
Proceedings of the 2000 International Conference on Image Processing, 2000

Content adaptive watermarking based on a stochastic multiresolution image modeling.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
A Stochastic Approach to Content Adaptive Digital Image Watermarking.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...