SV
Voloshynovskyy, Svyatoslav
| Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
|---|---|---|---|---|---|---|---|
| Cluster Scanning: a novel approach to resonance searches | The journal of high energy physics | 2024 | 62 | 29 | |||
| Self-supervised learning on MeerKAT wide-field continuum images | Astronomy & astrophysics | 2024 | 21 | 22 | |||
| PRIMIS : Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscation | Journal of biomedical informatics | 2024 | 70 | 0 | |||
| Differential privacy preserved federated learning for prognostic modeling in COVID‐19 patients using large multi‐institutional chest CT dataset | Medical physics | 2024 | 116 | 59 | |||
| Multi-institutional PET/CT image segmentation using federated deep transformer learning | Computer methods and programs in biomedicine | 2023 | 94 | 58 | |||
| Differential privacy preserved federated transfer learning for multi-institutional 68Ga-PET image artefact detection and disentanglement | European journal of nuclear medicine and molecular imaging | 2023 | 144 | 36 | |||
| Decentralized collaborative multi-institutional PET attenuation and scatter correction using federated deep learning | European journal of nuclear medicine and molecular imaging | 2023 | 144 | 102 | |||
| Decentralized Distributed Multi-institutional PET Image Segmentation Using a Federated Deep Learning Framework | Clinical nuclear medicine | 2022 | 248 | 2 | |||
| Variational Information Bottleneck for Semi-Supervised Classification | Entropy | 2020 | 282 | 146 | |||
| Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World | 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020 | 2020 | 277 | 334 | |||
| Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups | 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020 | 2020 | 258 | 282 | |||
| Learning Overcomplete and Sparsifying Transform With Approximate and Exact Closed Form Solutions | 7th European Workshop on Visual Information Processing (EUVIP) | 2018 | 342 | 0 | |||
| Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor | 26th European Signal Processing Conference, EUSIPCO 2018 | 2018 | 186 | 0 | |||
| Sparse ternary codes for similarity search have higher coding gain than dense binary codes | 2017 | 531 | 270 | ||||
| Replication of the principal component analyses of the human genome diversity panel | F1000Research | 2017 | 359 | 160 | |||
| Joint learning of local fingerprint and content modulation | 25th European Signal Processing Conference (EUSIPCO 2017) | 2017 | 205 | 0 | |||
| PharmaPack: mobile fine-grained recognition of pharma packages | 25th European Signal Processing Conference (EUSIPCO) | 2017 | 496 | 708 | |||
| Physical object authentication: detection-theoretic comparison of natural and artificial randomness | IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 | 2016 | 224 | 1 | |||
| Local active content fingerprint: solutions for general linear feature maps | International Conference on Pattern recognition, ICPR 2016 | 2016 | 209 | 200 | |||
| Local active content fingerprinting: Optimal solution under linear modulation | IEEE International Conference on Image Processing, ICIP 2016 | 2016 | 218 | 232 | |||
| Forensic authentication of banknotes on mobile phones | IS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016 | 2016 | 410 | 337 | |||
| Single Nucleotide Polymorphism Clustering in Systemic Autoimmune Diseases | PLOS ONE | 2016 | 353 | 160 | |||
| Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes | IEEE International Workshop on Information Forensics and Security, WIFS 2016 | 2016 | 213 | 0 | |||
| Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint | 2015 | 560 | 345 | ||||
| Active Content Fingerpriting | IEEE transactions on information forensics and security | 2014 | 636 | 2 | |||
| The impact of denoising on independent component analysis of functional magnetic resonance imaging data | Journal of neuroscience methods | 2013 | 695 | 0 | |||
| Active content fingerprinting: Shrinkage and lattice based modulations | 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | 2013 | 498 | 1 | |||
| Fundamental limits of identification: Identification rate, search and memory complexity trade-off | 2013 IEEE International Symposium on Information Theory (ISIT) | 2013 | 644 | 0 | |||
| Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 605 | 316 | |||
| On Multiple Hypothesis Testing with Rejection Option | IEEE Information Theory Workshop (ITW) | 2011 | 606 | 357 | |||
| Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 507 | 303 | |||
| Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting | Eighth International Conference on Computer Science and Information Technologies, CSIT 2011 | 2011 | 436 | 111 | |||
| Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 632 | 385 | |||
| Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 583 | 312 | |||
| Statistical Analysis of Binarized SIFT Descriptors | 7th International Symposium on Image and Signal Processing and Analysis | 2011 | 504 | 306 | |||
| Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 546 | 125 | |||
| Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 536 | 311 | |||
| A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects | CAST workshop - Biometrie, BIOSIG2011 | 2011 | 533 | 295 | |||
| Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 584 | 308 | |||
| Geometrically robust perceptual fingerprinting : an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 498 | 269 | |||
| Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 566 | 260 | |||
| Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 564 | 366 | |||
| Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 596 | 528 | |||
| On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 514 | 257 | |||
| Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 576 | 1 | |||
| Multimodal object authentication with random projections : a worst-case approach | Proceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II | 2010 | 603 | 512 | |||
| Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 611 | 974 | |||
| Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 615 | 404 | |||
| Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 498 | 68 | |||
| Informed data-hiding with partial side information at the decoder | Signal processing | 2009 | 528 | 110 | |||
| Partially reversible data hiding with pure message communications over state-dependent channels | Signal processing | 2009 | 526 | 116 | |||
| Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 547 | 345 | |||
| Conception and limits of robust perceptual hashing: toward side information assisted hash functions | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 572 | 345 | |||
| On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 612 | 404 | |||
| Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 580 | 271 | |||
| Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 566 | 297 | |||
| Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 531 | 229 | |||
| Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 598 | 235 | |||
| Random projections based item authentication | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 534 | 347 | |||
| On security threats for robust perceptual hashing | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 547 | 342 | |||
| Authentication of Biometric Identification Documents via Mobile Devices | Journal of electronic imaging | 2008 | 643 | 352 | |||
| Unclonable identification and authentication based on reference list decoding | Proceedings of the conference on Secure Component and System Identification | 2008 | 521 | 76 | |||
| On reversible information hiding system | Proceedings of the IEEE International Symposium on Information Theory, ISIT 2008 | 2008 | 618 | 478 | |||
| Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures | Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08 | 2008 | 625 | 395 | |||
| Privacy-Preserving Multimodal Person and Object Identification | Proceedings of the 10th ACM Workshop on Multimedia & Security | 2008 | 593 | 0 | |||
| Secure surface identification codes | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 626 | 0 | |||
| Analysis of physical unclonable identification based on reference list decoding | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 664 | 0 | |||
| Security Analysis of Robust Perceptual Hashing | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 652 | 0 | |||
| Multimodal authentication based on random projections and distributed coding | Proceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08 | 2008 | 559 | 316 | |||
| Privacy-Preserving Biometric Person Identification | Proceedings of the 16th European Signal Processing Conference, EUSIPCO 2008 | 2008 | 456 | 87 | |||
| Quality Enhancement of printed-and-scanned Images using distributed coding | Signal processing | 2007 | 676 | 339 | |||
| Error exponent analysis of person identification based on fusion of dependent/independent modalities | Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 555 | 354 | |||
| Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms | WaCha2007, /Third WAVILA Challenge/ | 2007 | 490 | 100 | |||
| Analysis of multimodal binary detection systems based on dependent/independent modalities | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 525 | 351 | |||
| From non-stationary Gaussian modelling to independent component analysis: an fMRI study | Lemanic-Neuroscience Annual Meeting | 2007 | 485 | 0 | |||
| Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding | Proceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 629 | 456 | |||
| Robust perceptual hashing as classification problem: decision-theoretic and practical considerations | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 614 | 439 | |||
| EEG-based synchronized brain-computer interfaces : a model for optimizing the number of mental tasks | IEEE transactions on neural systems and rehabilitation engineering | 2007 | 693 | 2 | |||
| Asymmetric side information and non-noticable Costa data-hiding | Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents | 2006 | 504 | 0 | |||
| Performance analysis of non-uniform quantization-based data-hiding | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 594 | 349 | |||
| Information-Theoretic Analysis of Electronic and Printed Document Authentication | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 542 | 410 | |||
| Message Communications And Channel State Estimation For State Dependent Channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 480 | 121 | |||
| Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | IEEE transactions on information forensics and security | 2006 | 505 | 397 | |||
| On reversibility of random binning based data-hiding techniques: security perspectives | ACM Multimedia and Security Workshop 2006 | 2006 | 487 | 0 | |||
| Tangible interactive system for document browsing and visualisation of multimedia data | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122) | 2006 | 687 | 137 | |||
| The Edge Process Model and Its Application to Information Hiding Capacity Analysis | IEEE transactions on signal processing | 2006 | 571 | 373 | |||
| Facial Image Compression Based on Structured Codebooks in Overcomplete Domain | EURASIP journal on applied signal processing | 2006 | 577 | 317 | |||
| Robustness Improvement of Known-Host-State Watermarking Using Host Statistics | Signal processing | 2006 | 584 | 651 | |||
| E-capacity analysis of data-hiding channels with geometrical attacks | Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 604 | 272 | |||
| Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 583 | 343 | |||
| Novel interactive services for e-tourism and e-commerce | Proceedings of International Conference on | 2006 | 477 | 0 | |||
| Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva | IEEE transactions on neural systems and rehabilitation engineering | 2006 | 728 | 0 | |||
| Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results | 2006 | 499 | 68 | ||||
| Host communications for non-Gaussian state-dependent channels : Laplacian case | Proceedings of International Conference on Multimedia and Expo | 2006 | 498 | 0 | |||
| Laplacian channel state estimation for state dependent channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 515 | 79 | |||
| An Accurate Analysis of Scalar Quantization-Based Data Hiding | IEEE transactions on information forensics and security | 2006 | 618 | 557 | |||
| Information-theoretic analysis of steganalysis in real images | ACM Multimedia and Security Workshop 2006 | 2006 | 547 | 0 | |||
| The Gaussian transform of distributions : definition, computation and application | IEEE transactions on signal processing | 2006 | 678 | 1,256 | |||
| Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 535 | 302 | |||
| Costa problem under channel ambiguity | Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2) | 2006 | 588 | 291 | |||
| On reversibility of random binning techniques: multimedia perspectives | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005 | 2005 | 614 | 1,097 | |||
| Security analysis of robust data hiding with geometrically structured codebooks | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 515 | 309 | |||
| The Gaussian transform | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 583 | 126 | |||
| Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005) | 2005 | 818 | 547 | |||
| Data-hiding with partially available side information | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 498 | 72 | |||
| Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva | BCI 2005, Brain-Computer Interface Technology: Third International Meeting | 2005 | 549 | 0 | |||
| Information-transfer rate modeling of EEG-based synchronized brain-computer interfaces | 2005 | 639 | 632 | ||||
| Document interactive navigation in multimodal databases | SIMILAR NOE Workshop | 2005 | 442 | 0 | |||
| Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | Proceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII | 2005 | 504 | 187 | |||
| Soft/hard focalization in the EEG inverse problem | IEEE/SP 13th Workshop on Statistical Signal Processing, 2005 (SSP'05) | 2005 | 587 | 318 | |||
| Data-hiding with asymmetrically available side information at encoder and decoder | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 404 | 0 | |||
| Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups | Proceedings of 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 463 | 0 | |||
| Denoising with infinite mixture of Gaussians | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 481 | 92 | |||
| Asymmetric spread spectrum data-hiding for Laplacian host data | IEEE International Conference on Image Processing (ICIP 2005) (vol. 1) | 2005 | 588 | 349 | |||
| On Security of Geometrically-Robust Data-Hiding | 6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005 | 2005 | 473 | 133 | |||
| Worst case additive attack against quantization-based data-hiding methods | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 634 | 351 | |||
| Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva | 2005 | 536 | 0 | ||||
| Image denoising based on the edge-process model | Signal processing | 2005 | 618 | 378 | |||
| Practical Data-Hiding : Additive Attacks Performance Analysis | Proceedings of 4th International Workshop on Digital Watermarking, IWDW 2005 | 2005 | 600 | 550 | |||
| Analysis of bit-rate definitions for Brain-Computer Interfaces | Proceedings of the 2005 Int. Conf. on Human-computer Interaction (HCI'05) | 2005 | 513 | 675 | |||
| Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 483 | 77 | |||
| Quantization-Based Methods: Additive Attacks Performance Analysis | IEEE transactions on signal processing | 2005 | 529 | 331 | |||
| Robustness improvement of known-host-state watermarking using host statistics | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 541 | 230 | |||
| Non-stationary Gaussian spatio-temporal modeling of fMRI data | Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET | 2005 | 508 | 0 | |||
| Multimedia Security: open problems and solutions | In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005 | 2005 | 421 | 203 | |||
| Text document data-hiding: security and multimedia perspectives | 5th International Conference on Computer Science and Information Technologies, CSIT 2005 | 2005 | 495 | 0 | |||
| Towards geometrically robust data-hiding with structured codebooks | Multimedia systems | 2005 | 528 | 309 | |||
| Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva | 2005 | 656 | 0 | ||||
| Protocols for data-hiding based text document security and automatic processing | IEEE International Conference on Multimedia & Expo (ICME 2005) | 2005 | 571 | 0 | |||
| Information-theoretic data-hiding: Recent achievements and open problems | International journal of image and graphics | 2005 | 634 | 1,299 | |||
| A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents | Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security | 2005 | 551 | 180 | |||
| Analyse des mesures de débit pour interfaces cerveau-ordinateur | 4èmes Ateliers de Traitement et Analyse de l'Information : Méthodes et Applications,TAIMA'2005 | 2005 | 588 | 235 | |||
| Capacity analysis of periodical watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 557 | 121 | |||
| Brain-computer interface model: upper-capacity bound, signal-to-noise ratio estimation, and optimal number of symbols | 2004 | 464 | 193 | ||||
| Joint compression of independent modalities in smart meeting rooms applications | SIMILAR NOE Workshop | 2004 | 453 | 0 | |||
| Interactive segmentation with hidden object based annotations : towards smart media | Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia | 2004 | 559 | 311 | |||
| Regularized two-step brain activity reconstruction from spatio-temporal EEG data | Image Reconstruction from Incomplete Data III, SPIE International Symposium on Optical Science and Technology | 2004 | 597 | 281 | |||
| Non-stationary Gaussian spatio-temporal modeling of fMRI data | First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program | 2004 | 542 | 0 | |||
| Quantization-based watermarking performance improvement using host statistics: AWGN attack case | ACM Multimedia and Security Workshop 2004 | 2004 | 502 | 216 | |||
| Localization properties of an EEG sensor system: lower bounds and optimality | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 475 | 25 | |||
| Revealing the true achievable rates of scalar Costa scheme | IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2004 | 525 | 345 | |||
| Visual communications with side information via distributed printing channels: extended multimedia and security perspectives | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications | 2004 | 582 | 411 | |||
| Spread spectrum watermarking for real images: is everything so hopeless? | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 473 | 129 | |||
| Worst Case Additive Attack against Quantization-Based Watermarking Techniques | IEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004) | 2004 | 571 | 362 | |||
| Distributed single source coding framework for passport photo images | Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms | 2004 | 474 | 0 | |||
| Capacity-security analysis of repetitive watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 458 | 0 | |||
| EEG Cortical Imaging: A Vector Field Approach For Laplacian Denoising And Missing Data Estimation | IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'04) | 2004 | 602 | 331 | |||
| Distributed single source coding with side information | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing | 2004 | 544 | 540 | |||
| Metadata Representation for Semantic-Based Multimedia Security and Management | On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops | 2003 | 530 | 433 | |||
| Low bit rate image compression using a non-stationary geometrical image priors | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 376 | 0 | |||
| Smart Media: from basic concepts to applications | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 515 | 0 | |||
| Wavelet-based image denoising using non-stationary stochastic geometrical image priors | SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V | 2003 | 481 | 321 | |||
| Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications | 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003 | 2003 | 573 | 1,015 | |||
| Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models | SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V | 2003 | 491 | 71 | |||
| Information-theoretic visual communications in human-computer interfaces: Interactive segmentation | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 548 | 0 | |||
| Localization properties of an EEG sensor system : electrode misplacement sensitivity | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 427 | 0 | |||
| Secure hybrid robust watermarking resistant against tampering and copy-attack | Signal processing | 2003 | 562 | 936 | |||
| Hybrid robust watermarking resistant against copy attack | Proceedings of the 11th European Signal Processing Conference, EUSIPCO 2002 | 2002 | 495 | 136 | |||
| Wavelet-based denoising using stochastic geometrical priors | (IM)2 Interactive Multimodal Information Management Workshop | 2002 | 450 | 0 | |||
| Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking Applications | SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV | 2002 | 648 | 685 | |||
| Special issue on : security of data hiding technologies | Signal processing | 2002 | 553 | 296 | |||
| StegoWall: Blind Statistical Detection of Hidden Data | Proceedings of SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV | 2002 | 625 | 455 | |||
| Capacity-security analysis of data hiding technologies | Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002) | 2002 | 615 | 309 | |||
| Attack modelling : towards a second generation benchmark | Signal processing | 2001 | 739 | 571 | |||
| The Watermark Template Attack | SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III | 2001 | 574 | 1,423 | |||
| Wavelet-Based MAP Image Denoising Using Provably Better Class of Stochastic I.I.D. Image Models | Facta Universitatis. Series Electronics and Energetics | 2001 | 577 | 297 | |||
| Optimal transform domain watermark embedding via linear programming | Signal processing | 2001 | 623 | 382 | |||
| Second generation benchmarking and application oriented evaluation | Information Hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings | 2001 | 561 | 591 | |||
| Counterfeit Attacks against a new Currency Protection Scheme | Int. Conf. on Communications and Multimedia Security CMS2001 | 2001 | 488 | 0 | |||
| Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical Distortions | IEEE International Conference on Image Processing, ICIP2001 | 2001 | 557 | 349 | |||
| Optimal adaptive diversity watermarking with channel state estimation | SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III | 2001 | 479 | 280 | |||
| Generalized radar/radiometry imaging problems | Journal of Telecommunications and Information Technology | 2001 | 571 | 250 | |||
| Blur/deblur attack against document protection systems based on digital watermarking | Information Hiding Workshop | 2001 | 503 | 311 | |||
| Attacks on Digital Watermarks : Classification, Estimation-based Attacks and Benchmarks | IEEE communications magazine | 2001 | 779 | 1,361 | |||
| Stochastic Digital Image Watermarking | IEEE/ISSPA ISSPA 2001, 6th Int. Symposium on Signal Processing and its Applications | 2001 | 476 | 0 | |||
| Watermark copy attack | IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II | 2000 | 701 | 1,285 | |||
| Optimized wavelet domain watermark embedding strategy using linear programming | Wavelet Applications VII (part of SPIE AeroSense 2000) | 2000 | 558 | 307 | |||
| Robust edge-preserving image restoration in the presence of non-Gaussian noise | Electronics letters | 2000 | 529 | 0 | |||
| Effective channel coding for DCT watermarks | IEEE International Conference on Image Processing ICIP 2000 | 2000 | 519 | 283 | |||
| Content adaptive watermarking based on a stochastic multiresolution image modeling | Tenth European Signal Processing Conference (EUSIPCO'2000) | 2000 | 517 | 146 | |||
| Generalized watermark attack based on watermark estimation and perceptual remodulation | IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II | 2000 | 627 | 343 | |||
| Invariant watermarking using discrete Fourier transform and template matching | 1999 | 512 | 0 | ||||
| Watermark attacks | Erlangen Watermarking Workshop | 1999 | 523 | 252 | |||
| A noise removal attack for watermarked images | Multimedia and Security Workshop | 1999 | 501 | 0 | |||
| A stochastic approach to content adaptive digital image watermarking | International Workshop on Information Hiding | 1999 | 646 | 882 | |||
| Optical/digital identification/verification system based on digital watermarking technology | SPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS'99 | 1999 | 586 | 400 | |||
| Cryptography and steganography of video information in modern communications | Facta Universitatis. Series Electronics and Energetics | 1998 | 623 | 185 | |||
| Radiometry imager with robust nonlinear adaptive image restoration | IEEE Second International Conference "The detection of abandoned land mines" | 1998 | 526 | 71 | |||
| Surface image formation based on sparse arrays with nonlinear signal processing | IEEE Second International Conference "The detection of abandoned land mines" | 1998 | 544 | 263 | |||
| High resolution radar imaging systems with robust image restoration | 12th International Conference on Microwaves and Radar. MIKON-98. Conference Proceedings (IEEE Cat. No.98EX195) | 1998 | 524 | 0 | |||
| Robust Image Restoration Based on Concept of M-Estimation and Parametric Model of Image Spectrum | IEEE, EURASIP 5th International Workshop on Systems, Signals and Image Processing | 1998 | 501 | 110 | |||
| Adaptive aperture formation matched with radiometry image spatial spectrum | IEEE International Microwave and Radar Conference | 1998 | 466 | 246 | |||
| Iterative image restoration with adaptive regularization and parametric constraints | Image Processing & Communications | 1998 | 623 | 116 | |||
| Copyright and content protection for digital images based on asymmetric cryptographic techniques | Multimedia and Security Workshop, Sixth ACM International Multimedia Conference | 1998 | 593 | 0 | |||
| Radiometry imaging system with digital signal processing | Facta Universitatis. Series Electronics and Energetics | 1995 | 483 | 97 |
