SV
Publications
196
Views
101,729
Downloads
53,366
Supervised works
26
Items per page
1 - 196 of 196
Title Published in Access level OA Policy Year Views Downloads
Examining vision foundation models for classification and detection in optical and radio astronomyAstronomy & astrophysics
accessLevelPublic
2025 5 23
Cluster Scanning: a novel approach to resonance searchesThe journal of high energy physics
accessLevelPublic
2024 67 69
Self-supervised learning on MeerKAT wide-field continuum imagesAstronomy & astrophysics
accessLevelPublic
2024 25 25
PRIMIS : Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscationJournal of biomedical informatics
accessLevelRestricted
2024 78 1
Differential privacy preserved federated learning for prognostic modeling in COVID‐19 patients using large multi‐institutional chest CT datasetMedical physics
accessLevelPublic
2024 118 67
Multi-institutional PET/CT image segmentation using federated deep transformer learningComputer methods and programs in biomedicine
accessLevelPublic
2023 98 74
Differential privacy preserved federated transfer learning for multi-institutional 68Ga-PET image artefact detection and disentanglementEuropean journal of nuclear medicine and molecular imaging
accessLevelPublic
2023 148 44
Decentralized collaborative multi-institutional PET attenuation and scatter correction using federated deep learningEuropean journal of nuclear medicine and molecular imaging
accessLevelPublic
2023 144 128
Decentralized Distributed Multi-institutional PET Image Segmentation Using a Federated Deep Learning FrameworkClinical nuclear medicine
accessLevelRestricted
2022 250 2
Variational Information Bottleneck for Semi-Supervised ClassificationEntropy
accessLevelPublic
2020 283 159
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 281 354
Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 260 310
Learning Overcomplete and Sparsifying Transform With Approximate and Exact Closed Form Solutions7th European Workshop on Visual Information Processing (EUVIP)
accessLevelRestricted
2018 343 0
Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor26th European Signal Processing Conference, EUSIPCO 2018
accessLevelRestricted
2018 186 0
Sparse ternary codes for similarity search have higher coding gain than dense binary codes
accessLevelPublic
2017 536 275
Replication of the principal component analyses of the human genome diversity panelF1000Research
accessLevelPublic
2017 363 178
Joint learning of local fingerprint and content modulation25th European Signal Processing Conference (EUSIPCO 2017)
accessLevelRestricted
2017 209 0
PharmaPack: mobile fine-grained recognition of pharma packages25th European Signal Processing Conference (EUSIPCO)
accessLevelPublic
2017 497 729
Physical object authentication: detection-theoretic comparison of natural and artificial randomnessIEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016
accessLevelRestricted
2016 226 1
Local active content fingerprint: solutions for general linear feature mapsInternational Conference on Pattern recognition, ICPR 2016
accessLevelPublic
2016 210 216
Local active content fingerprinting: Optimal solution under linear modulationIEEE International Conference on Image Processing, ICIP 2016
accessLevelPublic
2016 218 243
Forensic authentication of banknotes on mobile phonesIS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016
accessLevelPublic
2016 414 370
Single Nucleotide Polymorphism Clustering in Systemic Autoimmune DiseasesPLOS ONE
accessLevelPublic
2016 354 169
Fast content identification in high-dimensional feature spaces using Sparse Ternary CodesIEEE International Workshop on Information Forensics and Security, WIFS 2016
accessLevelRestricted
2016 215 0
Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint
accessLevelPublic
2015 568 355
Active Content FingerpritingIEEE transactions on information forensics and security
accessLevelRestricted
2014 636 2
The impact of denoising on independent component analysis of functional magnetic resonance imaging dataJournal of neuroscience methods
accessLevelRestricted
2013 702 0
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 500 1
Fundamental limits of identification: Identification rate, search and memory complexity trade-off2013 IEEE International Symposium on Information Theory (ISIT)
accessLevelRestricted
2013 645 0
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 610 330
On Multiple Hypothesis Testing with Rejection OptionIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 607 398
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 509 311
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft FingerprintingEighth International Conference on Computer Science and Information Technologies, CSIT 2011
accessLevelPublic
2011 438 113
Identification In Desynchronization ChannelsIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 633 400
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 586 324
Statistical Analysis of Binarized SIFT Descriptors7th International Symposium on Image and Signal Processing and Analysis
accessLevelPublic
2011 507 312
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 548 129
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 538 317
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying ObjectsCAST workshop - Biometrie, BIOSIG2011
accessLevelPublic
2011 537 299
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 586 323
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 501 278
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 574 262
Performance Analysis of Identification System Based on Order Statistics List DecoderIEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT)
accessLevelPublic
2010 566 385
Privacy Preserving Identification : Order Statistics List Decoding Perspective2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
accessLevelPublic
2010 598 542
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 516 265
Content Identification Based on digital fingerprint : what can be done if ML decoding fails?2010 IEEE International Workshop on Multimedia Signal Processing (MMSP)
accessLevelRestricted
2010 580 1
Multimodal object authentication with random projections : a worst-case approachProceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II
accessLevelPublic
2010 605 520
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 615 993
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 620 411
Content-Identification : towards Capacity Based on Bounded Distance DecoderApplications of Information Theory, Coding and Security, Yerevan, Armenia, 2010
accessLevelPublic
2010 499 70
Informed data-hiding with partial side information at the decoderSignal processing
accessLevelPublic
2009 530 126
Partially reversible data hiding with pure message communications over state-dependent channelsSignal processing
accessLevelPublic
2009 527 123
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 550 353
Conception and limits of robust perceptual hashing: toward side information assisted hash functionsProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 575 366
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 613 412
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 582 281
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 568 305
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 531 239
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 600 264
Random projections based item authenticationProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 535 372
On security threats for robust perceptual hashingProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 548 354
Authentication of Biometric Identification Documents via Mobile DevicesJournal of electronic imaging
accessLevelPublic
2008 650 373
Unclonable identification and authentication based on reference list decodingProceedings of the conference on Secure Component and System Identification
accessLevelPublic
2008 523 81
On reversible information hiding systemProceedings of the IEEE International Symposium on Information Theory, ISIT 2008
accessLevelPublic
2008 619 497
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile ArchitecturesProceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08
accessLevelPublic
2008 625 417
Privacy-Preserving Multimodal Person and Object IdentificationProceedings of the 10th ACM Workshop on Multimedia & Security
accessLevelRestricted
2008 595 0
Secure surface identification codesSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 629 0
Analysis of physical unclonable identification based on reference list decodingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 666 0
Security Analysis of Robust Perceptual HashingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 655 0
Multimodal authentication based on random projections and distributed codingProceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08
accessLevelPublic
2008 562 328
Privacy-Preserving Biometric Person IdentificationProceedings of the 16th European Signal Processing Conference, EUSIPCO 2008
accessLevelPublic
2008 456 87
Quality Enhancement of printed-and-scanned Images using distributed codingSignal processing
accessLevelPublic
2007 680 357
Error exponent analysis of person identification based on fusion of dependent/independent modalitiesSecurity, Steganography, and Watermarking of Multimedia Contents IX
accessLevelPublic
2007 558 369
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithmsWaCha2007, /Third WAVILA Challenge/
accessLevelPublic
2007 491 101
Analysis of multimodal binary detection systems based on dependent/independent modalitiesProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 526 377
From non-stationary Gaussian modelling to independent component analysis: an fMRI studyLemanic-Neuroscience Annual Meeting
2007 487 0
Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-HidingProceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX
accessLevelPublic
2007 633 472
Robust perceptual hashing as classification problem: decision-theoretic and practical considerationsProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 620 452
EEG-based synchronized brain-computer interfaces : a model for optimizing the number of mental tasksIEEE transactions on neural systems and rehabilitation engineering
accessLevelRestricted
2007 697 2
Asymmetric side information and non-noticable Costa data-hidingProceedings of SPIE Photonics West, Security and watermarking of multimedia contents
2006 506 0
Performance analysis of non-uniform quantization-based data-hidingProceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121)
accessLevelPublic
2006 597 374
Information-Theoretic Analysis of Electronic and Printed Document AuthenticationProceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII
accessLevelPublic
2006 544 445
Message Communications And Channel State Estimation For State Dependent ChannelsProceedings of 27-th Symposium on information theory in the Benelux
accessLevelPublic
2006 482 133
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and ManagementIEEE transactions on information forensics and security
accessLevelPublic
2006 509 432
On reversibility of random binning based data-hiding techniques: security perspectivesACM Multimedia and Security Workshop 2006
2006 488 0
Tangible interactive system for document browsing and visualisation of multimedia dataProceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122)
2006 691 137
The Edge Process Model and Its Application to Information Hiding Capacity AnalysisIEEE transactions on signal processing
accessLevelPublic
2006 573 385
Facial Image Compression Based on Structured Codebooks in Overcomplete DomainEURASIP journal on applied signal processing
accessLevelPublic
2006 579 323
Robustness Improvement of Known-Host-State Watermarking Using Host StatisticsSignal processing
accessLevelPublic
2006 588 662
E-capacity analysis of data-hiding channels with geometrical attacksProceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121)
accessLevelPublic
2006 608 277
Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical ConsiderationsProceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII
accessLevelPublic
2006 587 357
Novel interactive services for e-tourism and e-commerceProceedings of International Conference on
2006 478 0
Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of GenevaIEEE transactions on neural systems and rehabilitation engineering
accessLevelRestricted
2006 732 0
Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results
accessLevelPublic
2006 501 73
Host communications for non-Gaussian state-dependent channels : Laplacian caseProceedings of International Conference on Multimedia and Expo
2006 498 0
Laplacian channel state estimation for state dependent channelsProceedings of 27-th Symposium on information theory in the Benelux
accessLevelPublic
2006 517 96
An Accurate Analysis of Scalar Quantization-Based Data HidingIEEE transactions on information forensics and security
accessLevelPublic
2006 619 570
Information-theoretic analysis of steganalysis in real imagesACM Multimedia and Security Workshop 2006
2006 551 0
The Gaussian transform of distributions : definition, computation and applicationIEEE transactions on signal processing
accessLevelPublic
2006 681 1,320
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian hostProceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121)
accessLevelPublic
2006 535 322
Costa problem under channel ambiguityProceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2)
accessLevelPublic
2006 590 300
On reversibility of random binning techniques: multimedia perspectives9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005
accessLevelPublic
2005 616 1,107
Security analysis of robust data hiding with geometrically structured codebooksProceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120)
accessLevelPublic
2005 518 329
The Gaussian transformProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
accessLevelPublic
2005 587 132
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005)
accessLevelPublic
2005 821 593
Data-hiding with partially available side informationProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
accessLevelPublic
2005 501 80
Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of GenevaBCI 2005, Brain-Computer Interface Technology: Third International Meeting
2005 550 0
Information-transfer rate modeling of EEG-based synchronized brain-computer interfaces
accessLevelPublic
2005 642 1,027
Document interactive navigation in multimodal databasesSIMILAR NOE Workshop
2005 449 0
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and ManagementProceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII
accessLevelPublic
2005 506 195
Soft/hard focalization in the EEG inverse problemIEEE/SP 13th Workshop on Statistical Signal Processing, 2005 (SSP'05)
accessLevelPublic
2005 588 326
Data-hiding with asymmetrically available side information at encoder and decoderProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
2005 406 0
Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-upsProceedings of 13th European Signal Processing Conference, EUSIPCO 2005
2005 464 0
Denoising with infinite mixture of GaussiansProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
accessLevelPublic
2005 483 101
Asymmetric spread spectrum data-hiding for Laplacian host dataIEEE International Conference on Image Processing (ICIP 2005) (vol. 1)
accessLevelPublic
2005 590 358
On Security of Geometrically-Robust Data-Hiding6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005
accessLevelPublic
2005 474 146
Worst case additive attack against quantization-based data-hiding methodsProceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120)
accessLevelPublic
2005 636 367
Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva
2005 537 0
Image denoising based on the edge-process modelSignal processing
accessLevelPublic
2005 623 394
Practical Data-Hiding : Additive Attacks Performance AnalysisProceedings of 4th International Workshop on Digital Watermarking, IWDW 2005
accessLevelPublic
2005 601 568
Analysis of bit-rate definitions for Brain-Computer InterfacesProceedings of the 2005 Int. Conf. on Human-computer Interaction (HCI'05)
accessLevelPublic
2005 515 795
Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-upsProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
accessLevelPublic
2005 484 84
Quantization-Based Methods: Additive Attacks Performance AnalysisIEEE transactions on signal processing
accessLevelPublic
2005 531 360
Robustness improvement of known-host-state watermarking using host statisticsProceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120)
accessLevelPublic
2005 543 244
Non-stationary Gaussian spatio-temporal modeling of fMRI dataBrain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET
2005 512 0
Multimedia Security: open problems and solutionsIn Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005
accessLevelPublic
2005 424 210
Text document data-hiding: security and multimedia perspectives5th International Conference on Computer Science and Information Technologies, CSIT 2005
2005 499 0
Towards geometrically robust data-hiding with structured codebooksMultimedia systems
accessLevelPublic
2005 530 321
Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva
2005 658 0
Protocols for data-hiding based text document security and automatic processingIEEE International Conference on Multimedia & Expo (ICME 2005)
accessLevelRestricted
2005 573 0
Information-theoretic data-hiding: Recent achievements and open problemsInternational journal of image and graphics
accessLevelPublic
2005 639 1,336
A Theoretical Framework for Data-Hiding in Digital and Printed Text DocumentsProceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security
accessLevelPublic
2005 553 186
Analyse des mesures de débit pour interfaces cerveau-ordinateur4èmes Ateliers de Traitement et Analyse de l'Information : Méthodes et Applications,TAIMA'2005
accessLevelPublic
2005 592 245
Capacity analysis of periodical watermarkingProceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
accessLevelPublic
2004 560 135
Brain-computer interface model: upper-capacity bound, signal-to-noise ratio estimation, and optimal number of symbols
accessLevelPublic
2004 467 211
Joint compression of independent modalities in smart meeting rooms applicationsSIMILAR NOE Workshop
2004 454 0
Interactive segmentation with hidden object based annotations : towards smart mediaProceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia
accessLevelPublic
2004 560 318
Regularized two-step brain activity reconstruction from spatio-temporal EEG dataImage Reconstruction from Incomplete Data III, SPIE International Symposium on Optical Science and Technology
accessLevelPublic
2004 599 306
Non-stationary Gaussian spatio-temporal modeling of fMRI dataFirst Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program
2004 544 0
Quantization-based watermarking performance improvement using host statistics: AWGN attack caseACM Multimedia and Security Workshop 2004
accessLevelPublic
2004 504 220
Localization properties of an EEG sensor system: lower bounds and optimalityProceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
accessLevelPublic
2004 477 29
Revealing the true achievable rates of scalar Costa schemeIEEE International Workshop on Multimedia Signal Processing (MMSP)
accessLevelPublic
2004 528 381
Visual communications with side information via distributed printing channels: extended multimedia and security perspectivesProceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications
accessLevelPublic
2004 583 440
Spread spectrum watermarking for real images: is everything so hopeless?Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
accessLevelPublic
2004 477 144
Worst Case Additive Attack against Quantization-Based Watermarking TechniquesIEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004)
accessLevelPublic
2004 573 377
Distributed single source coding framework for passport photo imagesJoint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms
2004 477 0
Capacity-security analysis of repetitive watermarkingProceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
2004 460 0
EEG Cortical Imaging: A Vector Field Approach For Laplacian Denoising And Missing Data EstimationIEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'04)
accessLevelPublic
2004 607 356
Distributed single source coding with side informationProceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing
accessLevelPublic
2004 545 572
Metadata Representation for Semantic-Based Multimedia Security and ManagementOn The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops
accessLevelPublic
2003 532 449
Low bit rate image compression using a non-stationary geometrical image priors(IM)2 Interactive Multimodal Information Management Workshop
2003 376 0
Smart Media: from basic concepts to applications(IM)2 Interactive Multimodal Information Management Workshop
2003 516 0
Wavelet-based image denoising using non-stationary stochastic geometrical image priorsSPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V
accessLevelPublic
2003 486 339
Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003
accessLevelPublic
2003 575 1,032
Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical modelsSPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V
accessLevelPublic
2003 491 72
Information-theoretic visual communications in human-computer interfaces: Interactive segmentation(IM)2 Interactive Multimodal Information Management Workshop
2003 549 0
Localization properties of an EEG sensor system : electrode misplacement sensitivity(IM)2 Interactive Multimodal Information Management Workshop
2003 427 0
Secure hybrid robust watermarking resistant against tampering and copy-attackSignal processing
accessLevelPublic
2003 564 1,010
Hybrid robust watermarking resistant against copy attackProceedings of the 11th European Signal Processing Conference, EUSIPCO 2002
accessLevelPublic
2002 499 141
Wavelet-based denoising using stochastic geometrical priors(IM)2 Interactive Multimodal Information Management Workshop
2002 451 0
Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking ApplicationsSPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV
accessLevelPublic
2002 651 719
Special issue on : security of data hiding technologiesSignal processing
accessLevelPublic
2002 556 306
StegoWall: Blind Statistical Detection of Hidden DataProceedings of SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV
accessLevelPublic
2002 629 473
Capacity-security analysis of data hiding technologiesProceedings of IEEE International Conference on Multimedia and Expo (ICME2002)
accessLevelPublic
2002 618 315
Attack modelling : towards a second generation benchmarkSignal processing
accessLevelPublic
2001 743 604
The Watermark Template AttackSPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III
accessLevelPublic
2001 577 1,462
Wavelet-Based MAP Image Denoising Using Provably Better Class of Stochastic I.I.D. Image ModelsFacta Universitatis. Series Electronics and Energetics
accessLevelPublic
2001 577 304
Optimal transform domain watermark embedding via linear programmingSignal processing
accessLevelPublic
2001 625 399
Second generation benchmarking and application oriented evaluationInformation Hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings
accessLevelPublic
2001 564 651
Counterfeit Attacks against a new Currency Protection SchemeInt. Conf. on Communications and Multimedia Security CMS2001
2001 489 0
Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical DistortionsIEEE International Conference on Image Processing, ICIP2001
accessLevelPublic
2001 558 373
Optimal adaptive diversity watermarking with channel state estimationSPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III
accessLevelPublic
2001 481 328
Generalized radar/radiometry imaging problemsJournal of Telecommunications and Information Technology
accessLevelPublic
2001 573 254
Blur/deblur attack against document protection systems based on digital watermarkingInformation Hiding Workshop
accessLevelPublic
2001 509 332
Attacks on Digital Watermarks : Classification, Estimation-based Attacks and BenchmarksIEEE communications magazine
accessLevelPublic
2001 784 1,528
Stochastic Digital Image WatermarkingIEEE/ISSPA ISSPA 2001, 6th Int. Symposium on Signal Processing and its Applications
2001 477 0
Watermark copy attackIS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II
accessLevelPublic
2000 706 1,303
Optimized wavelet domain watermark embedding strategy using linear programmingWavelet Applications VII (part of SPIE AeroSense 2000)
accessLevelPublic
2000 562 322
Robust edge-preserving image restoration in the presence of non-Gaussian noiseElectronics letters
accessLevelRestricted
2000 530 0
Effective channel coding for DCT watermarksIEEE International Conference on Image Processing ICIP 2000
accessLevelPublic
2000 522 295
Content adaptive watermarking based on a stochastic multiresolution image modelingTenth European Signal Processing Conference (EUSIPCO'2000)
accessLevelPublic
2000 520 149
Generalized watermark attack based on watermark estimation and perceptual remodulationIS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II
accessLevelPublic
2000 628 372
Invariant watermarking using discrete Fourier transform and template matching
1999 516 0
Watermark attacksErlangen Watermarking Workshop
accessLevelPublic
1999 524 262
A noise removal attack for watermarked imagesMultimedia and Security Workshop
1999 503 0
A stochastic approach to content adaptive digital image watermarkingInternational Workshop on Information Hiding
accessLevelPublic
1999 650 927
Optical/digital identification/verification system based on digital watermarking technologySPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS'99
accessLevelPublic
1999 590 422
Cryptography and steganography of video information in modern communicationsFacta Universitatis. Series Electronics and Energetics
accessLevelPublic
1998 628 193
Radiometry imager with robust nonlinear adaptive image restorationIEEE Second International Conference "The detection of abandoned land mines"
accessLevelPublic
1998 527 72
Surface image formation based on sparse arrays with nonlinear signal processingIEEE Second International Conference "The detection of abandoned land mines"
accessLevelPublic
1998 547 269
High resolution radar imaging systems with robust image restoration12th International Conference on Microwaves and Radar. MIKON-98. Conference Proceedings (IEEE Cat. No.98EX195)
accessLevelRestricted
1998 527 0
Robust Image Restoration Based on Concept of M-Estimation and Parametric Model of Image SpectrumIEEE, EURASIP 5th International Workshop on Systems, Signals and Image Processing
accessLevelPublic
1998 503 122
Adaptive aperture formation matched with radiometry image spatial spectrumIEEE International Microwave and Radar Conference
accessLevelPublic
1998 466 249
Iterative image restoration with adaptive regularization and parametric constraintsImage Processing & Communications
accessLevelPublic
1998 624 123
Copyright and content protection for digital images based on asymmetric cryptographic techniquesMultimedia and Security Workshop, Sixth ACM International Multimedia Conference
1998 596 0
Radiometry imaging system with digital signal processingFacta Universitatis. Series Electronics and Energetics
accessLevelPublic
1995 486 110
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack