OK
Publications
106
Views
53 045
Downloads
22 496
Supervised works
0
Items per page
1 - 106 of 106
Title Published in Access level OA Policy Year Views Downloads
The impact of denoising on independent component analysis of functional magnetic resonance imaging dataJournal of neuroscience methods
accessLevelRestricted
2013 614 0
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 552 264
On Multiple Hypothesis Testing with Rejection OptionIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 567 264
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 470 228
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft FingerprintingEighth International Conference on Computer Science and Information Technologies, CSIT 2011
accessLevelPublic
2011 401 96
Identification In Desynchronization ChannelsIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 582 323
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 535 239
Statistical Analysis of Binarized SIFT Descriptors7th International Symposium on Image and Signal Processing and Analysis
accessLevelPublic
2011 461 274
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 495 85
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 479 272
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying ObjectsCAST workshop - Biometrie, BIOSIG2011
accessLevelPublic
2011 488 254
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 545 253
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 457 218
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 508 213
Performance Analysis of Identification System Based on Order Statistics List DecoderIEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT)
accessLevelPublic
2010 531 307
Privacy Preserving Identification : Order Statistics List Decoding Perspective2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
accessLevelPublic
2010 537 464
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 477 232
Content Identification Based on digital fingerprint : what can be done if ML decoding fails?2010 IEEE International Workshop on Multimedia Signal Processing (MMSP)
accessLevelRestricted
2010 535 1
Multimodal object authentication with random projections : a worst-case approachProceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II
accessLevelPublic
2010 559 472
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 565 893
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 561 309
Content-Identification : towards Capacity Based on Bounded Distance DecoderApplications of Information Theory, Coding and Security, Yerevan, Armenia, 2010
accessLevelPublic
2010 458 54
Informed data-hiding with partial side information at the decoderSignal processing
accessLevelPublic
2009 489 71
Partially reversible data hiding with pure message communications over state-dependent channelsSignal processing
accessLevelPublic
2009 498 83
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 492 292
Conception and limits of robust perceptual hashing: toward side information assisted hash functionsProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 525 260
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 542 391
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 535 221
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 499 233
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 470 180
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 531 166
Random projections based item authenticationProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 486 281
On security threats for robust perceptual hashingProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 504 270
Authentication of Biometric Identification Documents via Mobile DevicesJournal of electronic imaging
accessLevelPublic
2008 583 276
Unclonable identification and authentication based on reference list decodingProceedings of the conference on Secure Component and System Identification
accessLevelPublic
2008 484 64
On reversible information hiding systemProceedings of the IEEE International Symposium on Information Theory, ISIT 2008
accessLevelPublic
2008 569 403
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile ArchitecturesProceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08
accessLevelPublic
2008 580 309
Privacy-Preserving Multimodal Person and Object IdentificationProceedings of the 10th ACM Workshop on Multimedia & Security
accessLevelRestricted
2008 542 0
Secure surface identification codesSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 582 0
Analysis of physical unclonable identification based on reference list decodingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 571 0
Security Analysis of Robust Perceptual HashingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 618 0
Multimodal authentication based on random projections and distributed codingProceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08
accessLevelPublic
2008 519 223
Privacy-Preserving Biometric Person IdentificationProceedings of the 16th European Signal Processing Conference, EUSIPCO 2008
accessLevelPublic
2008 395 64
Quality Enhancement of printed-and-scanned Images using distributed codingSignal processing
accessLevelPublic
2007 633 289
Error exponent analysis of person identification based on fusion of dependent/independent modalitiesSecurity, Steganography, and Watermarking of Multimedia Contents IX
accessLevelPublic
2007 521 279
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithmsWaCha2007, /Third WAVILA Challenge/
accessLevelPublic
2007 441 78
Analysis of multimodal binary detection systems based on dependent/independent modalitiesProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 472 285
From non-stationary Gaussian modelling to independent component analysis: an fMRI studyLemanic-Neuroscience Annual Meeting
2007 461 0
Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-HidingProceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX
accessLevelPublic
2007 585 365
Robust perceptual hashing as classification problem: decision-theoretic and practical considerationsProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 561 355
Asymmetric side information and non-noticable Costa data-hidingProceedings of SPIE Photonics West, Security and watermarking of multimedia contents
2006 461 0
Performance analysis of non-uniform quantization-based data-hidingProceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121)
accessLevelPublic
2006 553 269
Information-Theoretic Analysis of Electronic and Printed Document AuthenticationProceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII
accessLevelPublic
2006 495 311
Message Communications And Channel State Estimation For State Dependent ChannelsProceedings of 27-th Symposium on information theory in the Benelux
accessLevelPublic
2006 441 94
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and ManagementIEEE transactions on information forensics and security
accessLevelPublic
2006 442 304
On reversibility of random binning based data-hiding techniques: security perspectivesACM Multimedia and Security Workshop 2006
2006 447 0
Tangible interactive system for document browsing and visualisation of multimedia dataProceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122)
2006 634 137
The Edge Process Model and Its Application to Information Hiding Capacity AnalysisIEEE transactions on signal processing
accessLevelPublic
2006 524 313
Facial Image Compression Based on Structured Codebooks in Overcomplete DomainEURASIP journal on applied signal processing
accessLevelPublic
2006 536 300
Robustness Improvement of Known-Host-State Watermarking Using Host StatisticsSignal processing
accessLevelPublic
2006 539 597
E-capacity analysis of data-hiding channels with geometrical attacksProceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121)
accessLevelPublic
2006 524 226
Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical ConsiderationsProceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII
accessLevelPublic
2006 544 273
Novel interactive services for e-tourism and e-commerceProceedings of International Conference on
2006 441 0
Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results
accessLevelPublic
2006 469 60
Host communications for non-Gaussian state-dependent channels : Laplacian caseProceedings of International Conference on Multimedia and Expo
2006 465 0
Laplacian channel state estimation for state dependent channelsProceedings of 27-th Symposium on information theory in the Benelux
accessLevelPublic
2006 449 52
Information-theoretic analysis of steganalysis in real imagesACM Multimedia and Security Workshop 2006
2006 497 0
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian hostProceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121)
accessLevelPublic
2006 496 226
Costa problem under channel ambiguityProceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2)
accessLevelPublic
2006 544 237
On reversibility of random binning techniques: multimedia perspectives9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005
accessLevelPublic
2005 564 1 057
Security analysis of robust data hiding with geometrically structured codebooksProceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120)
accessLevelPublic
2005 469 254
Data-hiding with partially available side informationProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
accessLevelPublic
2005 460 47
Document interactive navigation in multimodal databasesSIMILAR NOE Workshop
2005 409 0
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and ManagementProceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII
accessLevelPublic
2005 458 155
Data-hiding with asymmetrically available side information at encoder and decoderProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
2005 371 0
Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-upsProceedings of 13th European Signal Processing Conference, EUSIPCO 2005
2005 426 0
Asymmetric spread spectrum data-hiding for Laplacian host dataIEEE International Conference on Image Processing (ICIP 2005) (vol. 1)
accessLevelPublic
2005 555 265
On Security of Geometrically-Robust Data-Hiding6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005
accessLevelPublic
2005 434 113
Worst case additive attack against quantization-based data-hiding methodsProceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120)
accessLevelPublic
2005 563 280
Image denoising based on the edge-process modelSignal processing
accessLevelPublic
2005 553 294
Practical Data-Hiding : Additive Attacks Performance AnalysisProceedings of 4th International Workshop on Digital Watermarking, IWDW 2005
accessLevelPublic
2005 545 490
Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-upsProceedings of the 13th European Signal Processing Conference, EUSIPCO 2005
accessLevelPublic
2005 436 64
Quantization-Based Methods: Additive Attacks Performance AnalysisIEEE transactions on signal processing
accessLevelPublic
2005 486 254
Robustness improvement of known-host-state watermarking using host statisticsProceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120)
accessLevelPublic
2005 504 200
Non-stationary Gaussian spatio-temporal modeling of fMRI dataBrain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET
2005 471 0
Multimedia Security: open problems and solutionsIn Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005
accessLevelPublic
2005 390 155
Towards geometrically robust data-hiding with structured codebooksMultimedia systems
accessLevelPublic
2005 444 280
Information-theoretic data-hiding: Recent achievements and open problemsInternational journal of image and graphics
accessLevelPublic
2005 582 1 188
A Theoretical Framework for Data-Hiding in Digital and Printed Text DocumentsProceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security
accessLevelPublic
2005 487 149
Capacity analysis of periodical watermarkingProceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
accessLevelPublic
2004 495 90
Joint compression of independent modalities in smart meeting rooms applicationsSIMILAR NOE Workshop
2004 416 0
Non-stationary Gaussian spatio-temporal modeling of fMRI dataFirst Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program
2004 515 0
Quantization-based watermarking performance improvement using host statistics: AWGN attack caseACM Multimedia and Security Workshop 2004
accessLevelPublic
2004 454 193
Visual communications with side information via distributed printing channels: extended multimedia and security perspectivesProceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications
accessLevelPublic
2004 534 339
Spread spectrum watermarking for real images: is everything so hopeless?Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
accessLevelPublic
2004 432 109
Worst Case Additive Attack against Quantization-Based Watermarking TechniquesIEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004)
accessLevelPublic
2004 529 286
Distributed single source coding framework for passport photo imagesJoint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms
2004 413 0
Capacity-security analysis of repetitive watermarkingProceedings of the 12th European Signal Processing Conference, EUSIPCO 2004
2004 424 0
Distributed single source coding with side informationProceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing
accessLevelPublic
2004 513 408
Low bit rate image compression using a non-stationary geometrical image priors(IM)2 Interactive Multimodal Information Management Workshop
2003 344 0
Smart Media: from basic concepts to applications(IM)2 Interactive Multimodal Information Management Workshop
2003 477 0
Wavelet-based image denoising using non-stationary stochastic geometrical image priorsSPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V
accessLevelPublic
2003 437 263
Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003
accessLevelPublic
2003 539 943
Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical modelsSPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V
accessLevelPublic
2003 462 68
Information-theoretic visual communications in human-computer interfaces: Interactive segmentation(IM)2 Interactive Multimodal Information Management Workshop
2003 465 0
Wavelet-based denoising using stochastic geometrical priors(IM)2 Interactive Multimodal Information Management Workshop
2002 423 0
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack