Taras Holotyak

Orcid: 0009-0002-2490-0276

According to our database1, Taras Holotyak authored at least 65 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hubble Meets Webb: Image-to-Image Translation in Astronomy.
Sensors, February, 2024

Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach.
IEEE Trans. Inf. Forensics Secur., 2024

A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns.
IEEE Trans. Inf. Forensics Secur., 2024

Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model.
CoRR, 2024

2023
Correction: Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur., December, 2023

Mobile authentication of copy detection patterns.
EURASIP J. Inf. Secur., December, 2023

2022
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Anomaly localization for copy detection patterns through print estimations.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Printing variability of copy detection patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Digital twins of physical printing-imaging channel.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Compressed Data Sharing Based On Information Bottleneck Model.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
CoRR, 2021

Mobile authentication of copy detection patterns: how critical is to know fakes?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

2020
Variational Information Bottleneck for Semi-Supervised Classification.
Entropy, 2020

Information Bottleneck Classification in Extremely Distributed Systems.
Entropy, 2020

Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
EURASIP J. Inf. Secur., 2020

Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns.
Proceedings of the Computational Science - ICCS 2020, 2020

Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Information bottleneck through variational glasses.
CoRR, 2019

Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment.
CoRR, 2019

Robustification of Deep Net Classifiers by Key Based Diversified Aggregation with Pre-Filtering.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Reconstruction of Privacy-Sensitive Data from Protected Templates.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Defending Against Adversarial Attacks by Randomized Diversification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Injecting Image Priors into Learnable Compressive Subsampling.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Sparse ternary codes for similarity search have higher coding gain than dense binary codes.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

PharmaPack: Mobile fine-grained recognition of pharma packages.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Forensic authentication of banknotes on mobile phones.
Proceedings of the Media Watermarking, 2016

Local Active Content Fingerprint: Solutions for general linear feature maps.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Local active content fingerprinting: Optimal solution under linear modulation.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition.
IEEE Trans. Inf. Forensics Secur., 2015

Mobile visual object identification: from SIFT-BoF-RANSAC to Sketchprint.
Proceedings of the Media Watermarking, 2015

Privacy preserving multimedia content identification for cloud based bag-of-feature architectures.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

Feature Extraction of Palm Vein Patterns Based on Two-Dimensional Density Function.
Proceedings of the Artificial Intelligence and Soft Computing, 2015

Image Indexing and Retrieval Using GSOM Algorithm.
Proceedings of the Artificial Intelligence and Soft Computing, 2015

SketchPrint: Physical object micro-structure identification using mobile phones.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
On accuracy, robustness, and security of bag-of-word search systems.
Proceedings of the Media Watermarking, 2014

A framework for fast and secure packaging identification on mobile phones.
Proceedings of the Media Watermarking, 2014

Performance analysis of Bag-of-Features based content identification systems.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Active content fingerprinting: Shrinkage and lattice based modulations.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011

Private content identification based on soft fingerprinting.
Proceedings of the Media Forensics and Security III, 2011

Geometrically robust perceptual fingerprinting: an asymmetric case.
Proceedings of the Media Forensics and Security III, 2011

Trading-off performance and complexity in identification problem.
Proceedings of the Media Forensics and Security III, 2011

Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Statistical analysis of digital image fingerprinting based on random projections.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Information-theoretic analysis of desynchronization invariant object identification.
Proceedings of the IEEE International Conference on Acoustics, 2011

Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Private content identification: Performance-privacy-complexity trade-off.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Fast identification of highly distorted images.
Proceedings of the Media Forensics and Security II, 2010

Information-theoretical analysis of private content identification.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Fast identification algorithms for forensic applications.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2006
New blind steganalysis and its implications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Information-theoretic analysis of steganalysis in real images.
Proceedings of the 8th workshop on Multimedia & Security, 2006

2005
Stochastic approach to secret message length estimation in ±k embedding steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Forensic steganalysis: determining the stego key in spatial domain steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Proceedings of the Communications and Multimedia Security, 2005

1998
Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...