SV
Voloshynovskyy, Svyatoslav
Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
---|---|---|---|---|---|---|---|
PRIMIS : Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscation | Journal of biomedical informatics | 2024 | 45 | 0 | |||
Differential privacy preserved federated learning for prognostic modeling in COVID‐19 patients using large multi‐institutional chest CT dataset | Medical physics | 2024 | 64 | 27 | |||
Multi-institutional PET/CT image segmentation using federated deep transformer learning | Computer methods and programs in biomedicine | 2023 | 65 | 27 | |||
Differential privacy preserved federated transfer learning for multi-institutional 68Ga-PET image artefact detection and disentanglement | European journal of nuclear medicine and molecular imaging | 2023 | 113 | 22 | |||
Decentralized collaborative multi-institutional PET attenuation and scatter correction using federated deep learning | European journal of nuclear medicine and molecular imaging | 2023 | 106 | 62 | |||
Decentralized Distributed Multi-institutional PET Image Segmentation Using a Federated Deep Learning Framework | Clinical nuclear medicine | 2022 | 195 | 2 | |||
Variational Information Bottleneck for Semi-Supervised Classification | Entropy | 2020 | 246 | 119 | |||
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World | 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020 | 2020 | 232 | 225 | |||
Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups | 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020 | 2020 | 205 | 202 | |||
Learning Overcomplete and Sparsifying Transform With Approximate and Exact Closed Form Solutions | 7th European Workshop on Visual Information Processing (EUVIP) | 2018 | 308 | 0 | |||
Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor | 26th European Signal Processing Conference, EUSIPCO 2018 | 2018 | 157 | 0 | |||
Sparse ternary codes for similarity search have higher coding gain than dense binary codes | 2017 | 495 | 233 | ||||
Replication of the principal component analyses of the human genome diversity panel | F1000Research | 2017 | 320 | 139 | |||
Joint learning of local fingerprint and content modulation | 25th European Signal Processing Conference (EUSIPCO 2017) | 2017 | 165 | 0 | |||
PharmaPack: mobile fine-grained recognition of pharma packages | 25th European Signal Processing Conference (EUSIPCO) | 2017 | 468 | 655 | |||
Physical object authentication: detection-theoretic comparison of natural and artificial randomness | IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 | 2016 | 186 | 1 | |||
Local active content fingerprint: solutions for general linear feature maps | International Conference on Pattern recognition, ICPR 2016 | 2016 | 177 | 154 | |||
Local active content fingerprinting: Optimal solution under linear modulation | IEEE International Conference on Image Processing, ICIP 2016 | 2016 | 181 | 184 | |||
Forensic authentication of banknotes on mobile phones | IS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016 | 2016 | 339 | 254 | |||
Single Nucleotide Polymorphism Clustering in Systemic Autoimmune Diseases | PLOS ONE | 2016 | 316 | 142 | |||
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes | IEEE International Workshop on Information Forensics and Security, WIFS 2016 | 2016 | 187 | 0 | |||
Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint | 2015 | 530 | 301 | ||||
Active Content Fingerpriting | IEEE transactions on information forensics and security | 2014 | 615 | 2 | |||
The impact of denoising on independent component analysis of functional magnetic resonance imaging data | Journal of neuroscience methods | 2013 | 653 | 0 | |||
Active content fingerprinting: Shrinkage and lattice based modulations | 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | 2013 | 472 | 1 | |||
Fundamental limits of identification: Identification rate, search and memory complexity trade-off | 2013 IEEE International Symposium on Information Theory (ISIT) | 2013 | 611 | 0 | |||
Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 565 | 278 | |||
On Multiple Hypothesis Testing with Rejection Option | IEEE Information Theory Workshop (ITW) | 2011 | 576 | 299 | |||
Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 474 | 242 | |||
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting | Eighth International Conference on Computer Science and Information Technologies, CSIT 2011 | 2011 | 408 | 100 | |||
Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 593 | 341 | |||
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 546 | 267 | |||
Statistical Analysis of Binarized SIFT Descriptors | 7th International Symposium on Image and Signal Processing and Analysis | 2011 | 470 | 287 | |||
Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 507 | 93 | |||
Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 490 | 282 | |||
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects | CAST workshop - Biometrie, BIOSIG2011 | 2011 | 499 | 259 | |||
Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 554 | 267 | |||
Geometrically robust perceptual fingerprinting : an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 467 | 232 | |||
Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 525 | 226 | |||
Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 536 | 328 | |||
Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 558 | 475 | |||
On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 490 | 244 | |||
Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 548 | 1 | |||
Multimodal object authentication with random projections : a worst-case approach | Proceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II | 2010 | 575 | 483 | |||
Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 576 | 915 | |||
Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 577 | 353 | |||
Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 473 | 59 | |||
Informed data-hiding with partial side information at the decoder | Signal processing | 2009 | 496 | 72 | |||
Partially reversible data hiding with pure message communications over state-dependent channels | Signal processing | 2009 | 502 | 90 | |||
Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 507 | 301 | |||
Conception and limits of robust perceptual hashing: toward side information assisted hash functions | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 535 | 276 | |||
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 556 | 394 | |||
Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 547 | 237 | |||
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 511 | 241 | |||
Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 489 | 189 | |||
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 554 | 188 | |||
Random projections based item authentication | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 496 | 301 | |||
On security threats for robust perceptual hashing | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 513 | 283 | |||
Authentication of Biometric Identification Documents via Mobile Devices | Journal of electronic imaging | 2008 | 591 | 292 | |||
Unclonable identification and authentication based on reference list decoding | Proceedings of the conference on Secure Component and System Identification | 2008 | 493 | 68 | |||
On reversible information hiding system | Proceedings of the IEEE International Symposium on Information Theory, ISIT 2008 | 2008 | 579 | 418 | |||
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures | Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08 | 2008 | 594 | 328 | |||
Privacy-Preserving Multimodal Person and Object Identification | Proceedings of the 10th ACM Workshop on Multimedia & Security | 2008 | 558 | 0 | |||
Secure surface identification codes | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 592 | 0 | |||
Analysis of physical unclonable identification based on reference list decoding | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 583 | 0 | |||
Security Analysis of Robust Perceptual Hashing | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 627 | 0 | |||
Multimodal authentication based on random projections and distributed coding | Proceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08 | 2008 | 532 | 250 | |||
Privacy-Preserving Biometric Person Identification | Proceedings of the 16th European Signal Processing Conference, EUSIPCO 2008 | 2008 | 404 | 70 | |||
Quality Enhancement of printed-and-scanned Images using distributed coding | Signal processing | 2007 | 648 | 305 | |||
Error exponent analysis of person identification based on fusion of dependent/independent modalities | Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 532 | 293 | |||
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms | WaCha2007, /Third WAVILA Challenge/ | 2007 | 455 | 82 | |||
Analysis of multimodal binary detection systems based on dependent/independent modalities | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 484 | 307 | |||
From non-stationary Gaussian modelling to independent component analysis: an fMRI study | Lemanic-Neuroscience Annual Meeting | 2007 | 464 | 0 | |||
Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding | Proceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 598 | 386 | |||
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 572 | 378 | |||
EEG-based synchronized brain-computer interfaces : a model for optimizing the number of mental tasks | IEEE transactions on neural systems and rehabilitation engineering | 2007 | 664 | 2 | |||
Asymmetric side information and non-noticable Costa data-hiding | Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents | 2006 | 468 | 0 | |||
Performance analysis of non-uniform quantization-based data-hiding | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 563 | 284 | |||
Information-Theoretic Analysis of Electronic and Printed Document Authentication | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 502 | 337 | |||
Message Communications And Channel State Estimation For State Dependent Channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 450 | 102 | |||
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | IEEE transactions on information forensics and security | 2006 | 455 | 328 | |||
On reversibility of random binning based data-hiding techniques: security perspectives | ACM Multimedia and Security Workshop 2006 | 2006 | 457 | 0 | |||
Tangible interactive system for document browsing and visualisation of multimedia data | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122) | 2006 | 646 | 137 | |||
The Edge Process Model and Its Application to Information Hiding Capacity Analysis | IEEE transactions on signal processing | 2006 | 533 | 330 | |||
Facial Image Compression Based on Structured Codebooks in Overcomplete Domain | EURASIP journal on applied signal processing | 2006 | 547 | 307 | |||
Robustness Improvement of Known-Host-State Watermarking Using Host Statistics | Signal processing | 2006 | 554 | 611 | |||
E-capacity analysis of data-hiding channels with geometrical attacks | Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 536 | 241 | |||
Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 552 | 292 | |||
Novel interactive services for e-tourism and e-commerce | Proceedings of International Conference on | 2006 | 448 | 0 | |||
Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva | IEEE transactions on neural systems and rehabilitation engineering | 2006 | 688 | 0 | |||
Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results | 2006 | 475 | 64 | ||||
Host communications for non-Gaussian state-dependent channels : Laplacian case | Proceedings of International Conference on Multimedia and Expo | 2006 | 474 | 0 | |||
Laplacian channel state estimation for state dependent channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 462 | 54 | |||
An Accurate Analysis of Scalar Quantization-Based Data Hiding | IEEE transactions on information forensics and security | 2006 | 548 | 514 | |||
Information-theoretic analysis of steganalysis in real images | ACM Multimedia and Security Workshop 2006 | 2006 | 513 | 0 | |||
The Gaussian transform of distributions : definition, computation and application | IEEE transactions on signal processing | 2006 | 629 | 934 | |||
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 507 | 240 | |||
Costa problem under channel ambiguity | Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2) | 2006 | 549 | 249 | |||
On reversibility of random binning techniques: multimedia perspectives | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005 | 2005 | 577 | 1,064 | |||
Security analysis of robust data hiding with geometrically structured codebooks | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 481 | 270 | |||
The Gaussian transform | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 532 | 101 | |||
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005) | 2005 | 775 | 517 | |||
Data-hiding with partially available side information | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 468 | 56 | |||
Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva | BCI 2005, Brain-Computer Interface Technology: Third International Meeting | 2005 | 521 | 0 | |||
Information-transfer rate modeling of EEG-based synchronized brain-computer interfaces | 2005 | 554 | 150 | ||||
Document interactive navigation in multimodal databases | SIMILAR NOE Workshop | 2005 | 417 | 0 | |||
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | Proceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII | 2005 | 470 | 159 | |||
Soft/hard focalization in the EEG inverse problem | IEEE/SP 13th Workshop on Statistical Signal Processing, 2005 (SSP'05) | 2005 | 530 | 271 | |||
Data-hiding with asymmetrically available side information at encoder and decoder | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 377 | 0 | |||
Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups | Proceedings of 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 437 | 0 | |||
Denoising with infinite mixture of Gaussians | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 437 | 78 | |||
Asymmetric spread spectrum data-hiding for Laplacian host data | IEEE International Conference on Image Processing (ICIP 2005) (vol. 1) | 2005 | 566 | 278 | |||
On Security of Geometrically-Robust Data-Hiding | 6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005 | 2005 | 442 | 115 | |||
Worst case additive attack against quantization-based data-hiding methods | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 583 | 299 | |||
Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva | 2005 | 504 | 0 | ||||
Image denoising based on the edge-process model | Signal processing | 2005 | 570 | 316 | |||
Practical Data-Hiding : Additive Attacks Performance Analysis | Proceedings of 4th International Workshop on Digital Watermarking, IWDW 2005 | 2005 | 559 | 499 | |||
Analysis of bit-rate definitions for Brain-Computer Interfaces | Proceedings of the 2005 Int. Conf. on Human-computer Interaction (HCI'05) | 2005 | 486 | 507 | |||
Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 441 | 68 | |||
Quantization-Based Methods: Additive Attacks Performance Analysis | IEEE transactions on signal processing | 2005 | 496 | 276 | |||
Robustness improvement of known-host-state watermarking using host statistics | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 511 | 210 | |||
Non-stationary Gaussian spatio-temporal modeling of fMRI data | Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET | 2005 | 479 | 0 | |||
Multimedia Security: open problems and solutions | In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005 | 2005 | 396 | 169 | |||
Text document data-hiding: security and multimedia perspectives | 5th International Conference on Computer Science and Information Technologies, CSIT 2005 | 2005 | 467 | 0 | |||
Towards geometrically robust data-hiding with structured codebooks | Multimedia systems | 2005 | 452 | 285 | |||
Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva | 2005 | 627 | 0 | ||||
Protocols for data-hiding based text document security and automatic processing | IEEE International Conference on Multimedia & Expo (ICME 2005) | 2005 | 533 | 0 | |||
Information-theoretic data-hiding: Recent achievements and open problems | International journal of image and graphics | 2005 | 589 | 1,212 | |||
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents | Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security | 2005 | 496 | 156 | |||
Analyse des mesures de débit pour interfaces cerveau-ordinateur | 4èmes Ateliers de Traitement et Analyse de l'Information : Méthodes et Applications,TAIMA'2005 | 2005 | 542 | 192 | |||
Capacity analysis of periodical watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 504 | 96 | |||
Brain-computer interface model: upper-capacity bound, signal-to-noise ratio estimation, and optimal number of symbols | 2004 | 432 | 120 | ||||
Joint compression of independent modalities in smart meeting rooms applications | SIMILAR NOE Workshop | 2004 | 425 | 0 | |||
Interactive segmentation with hidden object based annotations : towards smart media | Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia | 2004 | 535 | 242 | |||
Regularized two-step brain activity reconstruction from spatio-temporal EEG data | Image Reconstruction from Incomplete Data III, SPIE International Symposium on Optical Science and Technology | 2004 | 557 | 228 | |||
Non-stationary Gaussian spatio-temporal modeling of fMRI data | First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program | 2004 | 524 | 0 | |||
Quantization-based watermarking performance improvement using host statistics: AWGN attack case | ACM Multimedia and Security Workshop 2004 | 2004 | 464 | 197 | |||
Localization properties of an EEG sensor system: lower bounds and optimality | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 447 | 17 | |||
Revealing the true achievable rates of scalar Costa scheme | IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2004 | 502 | 292 | |||
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications | 2004 | 539 | 360 | |||
Spread spectrum watermarking for real images: is everything so hopeless? | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 440 | 122 | |||
Worst Case Additive Attack against Quantization-Based Watermarking Techniques | IEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004) | 2004 | 541 | 303 | |||
Distributed single source coding framework for passport photo images | Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms | 2004 | 429 | 0 | |||
Capacity-security analysis of repetitive watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 433 | 0 | |||
EEG Cortical Imaging: A Vector Field Approach For Laplacian Denoising And Missing Data Estimation | IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'04) | 2004 | 557 | 266 | |||
Distributed single source coding with side information | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing | 2004 | 519 | 428 | |||
Metadata Representation for Semantic-Based Multimedia Security and Management | On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops | 2003 | 498 | 379 | |||
Low bit rate image compression using a non-stationary geometrical image priors | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 350 | 0 | |||
Smart Media: from basic concepts to applications | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 486 | 0 | |||
Wavelet-based image denoising using non-stationary stochastic geometrical image priors | SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V | 2003 | 448 | 272 | |||
Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications | 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003 | 2003 | 547 | 956 | |||
Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models | SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V | 2003 | 471 | 68 | |||
Information-theoretic visual communications in human-computer interfaces: Interactive segmentation | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 484 | 0 | |||
Localization properties of an EEG sensor system : electrode misplacement sensitivity | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 400 | 0 | |||
Secure hybrid robust watermarking resistant against tampering and copy-attack | Signal processing | 2003 | 503 | 831 | |||
Hybrid robust watermarking resistant against copy attack | Proceedings of the 11th European Signal Processing Conference, EUSIPCO 2002 | 2002 | 466 | 120 | |||
Wavelet-based denoising using stochastic geometrical priors | (IM)2 Interactive Multimodal Information Management Workshop | 2002 | 426 | 0 | |||
Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking Applications | SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV | 2002 | 564 | 395 | |||
Special issue on : security of data hiding technologies | Signal processing | 2002 | 538 | 260 | |||
StegoWall: Blind Statistical Detection of Hidden Data | Proceedings of SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV | 2002 | 585 | 407 | |||
Capacity-security analysis of data hiding technologies | Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002) | 2002 | 524 | 274 | |||
Attack modelling : towards a second generation benchmark | Signal processing | 2001 | 677 | 485 | |||
The Watermark Template Attack | SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III | 2001 | 533 | 1,350 | |||
Wavelet-Based MAP Image Denoising Using Provably Better Class of Stochastic I.I.D. Image Models | Facta Universitatis. Series Electronics and Energetics | 2001 | 555 | 270 | |||
Optimal transform domain watermark embedding via linear programming | Signal processing | 2001 | 577 | 348 | |||
Second generation benchmarking and application oriented evaluation | Information Hiding : 4th international workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001 : proceedings | 2001 | 527 | 502 | |||
Counterfeit Attacks against a new Currency Protection Scheme | Int. Conf. on Communications and Multimedia Security CMS2001 | 2001 | 465 | 0 | |||
Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical Distortions | IEEE International Conference on Image Processing, ICIP2001 | 2001 | 520 | 300 | |||
Optimal adaptive diversity watermarking with channel state estimation | SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III | 2001 | 450 | 257 | |||
Generalized radar/radiometry imaging problems | Journal of Telecommunications and Information Technology | 2001 | 539 | 211 | |||
Blur/deblur attack against document protection systems based on digital watermarking | Information Hiding Workshop | 2001 | 463 | 286 | |||
Attacks on Digital Watermarks : Classification, Estimation-based Attacks and Benchmarks | IEEE communications magazine | 2001 | 679 | 1,087 | |||
Stochastic Digital Image Watermarking | IEEE/ISSPA ISSPA 2001, 6th Int. Symposium on Signal Processing and its Applications | 2001 | 435 | 0 | |||
Watermark copy attack | IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II | 2000 | 635 | 1,259 | |||
Optimized wavelet domain watermark embedding strategy using linear programming | Wavelet Applications VII (part of SPIE AeroSense 2000) | 2000 | 524 | 254 | |||
Robust edge-preserving image restoration in the presence of non-Gaussian noise | Electronics letters | 2000 | 506 | 0 | |||
Effective channel coding for DCT watermarks | IEEE International Conference on Image Processing ICIP 2000 | 2000 | 481 | 249 | |||
Content adaptive watermarking based on a stochastic multiresolution image modeling | Tenth European Signal Processing Conference (EUSIPCO'2000) | 2000 | 482 | 140 | |||
Generalized watermark attack based on watermark estimation and perceptual remodulation | IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II | 2000 | 576 | 303 | |||
Invariant watermarking using discrete Fourier transform and template matching | 1999 | 489 | 0 | ||||
Watermark attacks | Erlangen Watermarking Workshop | 1999 | 496 | 221 | |||
A noise removal attack for watermarked images | Multimedia and Security Workshop | 1999 | 466 | 0 | |||
A stochastic approach to content adaptive digital image watermarking | International Workshop on Information Hiding | 1999 | 598 | 809 | |||
Optical/digital identification/verification system based on digital watermarking technology | SPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS'99 | 1999 | 543 | 332 | |||
Cryptography and steganography of video information in modern communications | Facta Universitatis. Series Electronics and Energetics | 1998 | 591 | 175 | |||
Radiometry imager with robust nonlinear adaptive image restoration | IEEE Second International Conference "The detection of abandoned land mines" | 1998 | 498 | 68 | |||
Surface image formation based on sparse arrays with nonlinear signal processing | IEEE Second International Conference "The detection of abandoned land mines" | 1998 | 524 | 232 | |||
High resolution radar imaging systems with robust image restoration | 12th International Conference on Microwaves and Radar. MIKON-98. Conference Proceedings (IEEE Cat. No.98EX195) | 1998 | 498 | 0 | |||
Robust Image Restoration Based on Concept of M-Estimation and Parametric Model of Image Spectrum | IEEE, EURASIP 5th International Workshop on Systems, Signals and Image Processing | 1998 | 474 | 89 | |||
Adaptive aperture formation matched with radiometry image spatial spectrum | IEEE International Microwave and Radar Conference | 1998 | 439 | 212 | |||
Iterative image restoration with adaptive regularization and parametric constraints | Image Processing & Communications | 1998 | 572 | 94 | |||
Copyright and content protection for digital images based on asymmetric cryptographic techniques | Multimedia and Security Workshop, Sixth ACM International Multimedia Conference | 1998 | 558 | 0 | |||
Radiometry imaging system with digital signal processing | Facta Universitatis. Series Electronics and Energetics | 1995 | 451 | 67 |