OK
Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
---|---|---|---|---|---|---|---|
The impact of denoising on independent component analysis of functional magnetic resonance imaging data | Journal of neuroscience methods | 2013 | 653 | 0 | |||
Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 565 | 278 | |||
On Multiple Hypothesis Testing with Rejection Option | IEEE Information Theory Workshop (ITW) | 2011 | 576 | 299 | |||
Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 474 | 242 | |||
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting | Eighth International Conference on Computer Science and Information Technologies, CSIT 2011 | 2011 | 408 | 100 | |||
Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 594 | 342 | |||
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 546 | 270 | |||
Statistical Analysis of Binarized SIFT Descriptors | 7th International Symposium on Image and Signal Processing and Analysis | 2011 | 471 | 287 | |||
Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 507 | 93 | |||
Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 490 | 283 | |||
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects | CAST workshop - Biometrie, BIOSIG2011 | 2011 | 499 | 259 | |||
Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 554 | 268 | |||
Geometrically robust perceptual fingerprinting : an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 467 | 233 | |||
Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 525 | 227 | |||
Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 536 | 329 | |||
Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 558 | 475 | |||
On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 490 | 245 | |||
Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 548 | 1 | |||
Multimodal object authentication with random projections : a worst-case approach | Proceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II | 2010 | 576 | 483 | |||
Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 576 | 915 | |||
Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 577 | 355 | |||
Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 474 | 59 | |||
Informed data-hiding with partial side information at the decoder | Signal processing | 2009 | 496 | 72 | |||
Partially reversible data hiding with pure message communications over state-dependent channels | Signal processing | 2009 | 502 | 90 | |||
Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 507 | 301 | |||
Conception and limits of robust perceptual hashing: toward side information assisted hash functions | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 535 | 276 | |||
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 556 | 394 | |||
Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 547 | 238 | |||
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 512 | 241 | |||
Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 489 | 189 | |||
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 555 | 188 | |||
Random projections based item authentication | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 498 | 301 | |||
On security threats for robust perceptual hashing | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 513 | 285 | |||
Authentication of Biometric Identification Documents via Mobile Devices | Journal of electronic imaging | 2008 | 591 | 292 | |||
Unclonable identification and authentication based on reference list decoding | Proceedings of the conference on Secure Component and System Identification | 2008 | 493 | 68 | |||
On reversible information hiding system | Proceedings of the IEEE International Symposium on Information Theory, ISIT 2008 | 2008 | 579 | 419 | |||
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures | Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08 | 2008 | 594 | 329 | |||
Privacy-Preserving Multimodal Person and Object Identification | Proceedings of the 10th ACM Workshop on Multimedia & Security | 2008 | 559 | 0 | |||
Secure surface identification codes | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 593 | 0 | |||
Analysis of physical unclonable identification based on reference list decoding | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 583 | 0 | |||
Security Analysis of Robust Perceptual Hashing | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 627 | 0 | |||
Multimodal authentication based on random projections and distributed coding | Proceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08 | 2008 | 532 | 250 | |||
Privacy-Preserving Biometric Person Identification | Proceedings of the 16th European Signal Processing Conference, EUSIPCO 2008 | 2008 | 404 | 70 | |||
Quality Enhancement of printed-and-scanned Images using distributed coding | Signal processing | 2007 | 649 | 305 | |||
Error exponent analysis of person identification based on fusion of dependent/independent modalities | Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 532 | 293 | |||
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms | WaCha2007, /Third WAVILA Challenge/ | 2007 | 455 | 82 | |||
Analysis of multimodal binary detection systems based on dependent/independent modalities | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 485 | 307 | |||
From non-stationary Gaussian modelling to independent component analysis: an fMRI study | Lemanic-Neuroscience Annual Meeting | 2007 | 465 | 0 | |||
Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding | Proceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 598 | 390 | |||
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 572 | 381 | |||
Asymmetric side information and non-noticable Costa data-hiding | Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents | 2006 | 468 | 0 | |||
Performance analysis of non-uniform quantization-based data-hiding | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 563 | 284 | |||
Information-Theoretic Analysis of Electronic and Printed Document Authentication | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 503 | 337 | |||
Message Communications And Channel State Estimation For State Dependent Channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 450 | 102 | |||
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | IEEE transactions on information forensics and security | 2006 | 455 | 332 | |||
On reversibility of random binning based data-hiding techniques: security perspectives | ACM Multimedia and Security Workshop 2006 | 2006 | 457 | 0 | |||
Tangible interactive system for document browsing and visualisation of multimedia data | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122) | 2006 | 647 | 137 | |||
The Edge Process Model and Its Application to Information Hiding Capacity Analysis | IEEE transactions on signal processing | 2006 | 533 | 331 | |||
Facial Image Compression Based on Structured Codebooks in Overcomplete Domain | EURASIP journal on applied signal processing | 2006 | 547 | 307 | |||
Robustness Improvement of Known-Host-State Watermarking Using Host Statistics | Signal processing | 2006 | 554 | 612 | |||
E-capacity analysis of data-hiding channels with geometrical attacks | Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 537 | 241 | |||
Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 552 | 293 | |||
Novel interactive services for e-tourism and e-commerce | Proceedings of International Conference on | 2006 | 448 | 0 | |||
Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results | 2006 | 475 | 64 | ||||
Host communications for non-Gaussian state-dependent channels : Laplacian case | Proceedings of International Conference on Multimedia and Expo | 2006 | 474 | 0 | |||
Laplacian channel state estimation for state dependent channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 463 | 54 | |||
Information-theoretic analysis of steganalysis in real images | ACM Multimedia and Security Workshop 2006 | 2006 | 513 | 0 | |||
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 508 | 240 | |||
Costa problem under channel ambiguity | Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2) | 2006 | 549 | 249 | |||
On reversibility of random binning techniques: multimedia perspectives | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005 | 2005 | 577 | 1,067 | |||
Security analysis of robust data hiding with geometrically structured codebooks | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 481 | 270 | |||
Data-hiding with partially available side information | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 469 | 56 | |||
Document interactive navigation in multimodal databases | SIMILAR NOE Workshop | 2005 | 417 | 0 | |||
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | Proceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII | 2005 | 471 | 159 | |||
Data-hiding with asymmetrically available side information at encoder and decoder | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 377 | 0 | |||
Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups | Proceedings of 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 437 | 0 | |||
Asymmetric spread spectrum data-hiding for Laplacian host data | IEEE International Conference on Image Processing (ICIP 2005) (vol. 1) | 2005 | 566 | 278 | |||
On Security of Geometrically-Robust Data-Hiding | 6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005 | 2005 | 442 | 115 | |||
Worst case additive attack against quantization-based data-hiding methods | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 583 | 299 | |||
Image denoising based on the edge-process model | Signal processing | 2005 | 571 | 316 | |||
Practical Data-Hiding : Additive Attacks Performance Analysis | Proceedings of 4th International Workshop on Digital Watermarking, IWDW 2005 | 2005 | 559 | 499 | |||
Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 441 | 68 | |||
Quantization-Based Methods: Additive Attacks Performance Analysis | IEEE transactions on signal processing | 2005 | 496 | 278 | |||
Robustness improvement of known-host-state watermarking using host statistics | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 512 | 211 | |||
Non-stationary Gaussian spatio-temporal modeling of fMRI data | Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET | 2005 | 479 | 0 | |||
Multimedia Security: open problems and solutions | In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005 | 2005 | 396 | 169 | |||
Towards geometrically robust data-hiding with structured codebooks | Multimedia systems | 2005 | 452 | 285 | |||
Information-theoretic data-hiding: Recent achievements and open problems | International journal of image and graphics | 2005 | 589 | 1,212 | |||
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents | Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security | 2005 | 496 | 157 | |||
Capacity analysis of periodical watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 504 | 96 | |||
Joint compression of independent modalities in smart meeting rooms applications | SIMILAR NOE Workshop | 2004 | 426 | 0 | |||
Non-stationary Gaussian spatio-temporal modeling of fMRI data | First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program | 2004 | 524 | 0 | |||
Quantization-based watermarking performance improvement using host statistics: AWGN attack case | ACM Multimedia and Security Workshop 2004 | 2004 | 464 | 197 | |||
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications | 2004 | 539 | 360 | |||
Spread spectrum watermarking for real images: is everything so hopeless? | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 440 | 122 | |||
Worst Case Additive Attack against Quantization-Based Watermarking Techniques | IEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004) | 2004 | 541 | 304 | |||
Distributed single source coding framework for passport photo images | Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms | 2004 | 430 | 0 | |||
Capacity-security analysis of repetitive watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 433 | 0 | |||
Distributed single source coding with side information | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing | 2004 | 519 | 428 | |||
Low bit rate image compression using a non-stationary geometrical image priors | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 350 | 0 | |||
Smart Media: from basic concepts to applications | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 486 | 0 | |||
Wavelet-based image denoising using non-stationary stochastic geometrical image priors | SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V | 2003 | 448 | 273 | |||
Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications | 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003 | 2003 | 547 | 957 | |||
Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models | SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V | 2003 | 472 | 68 | |||
Information-theoretic visual communications in human-computer interfaces: Interactive segmentation | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 484 | 0 | |||
Wavelet-based denoising using stochastic geometrical priors | (IM)2 Interactive Multimodal Information Management Workshop | 2002 | 427 | 0 |