OK
| Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
|---|---|---|---|---|---|---|---|
| The impact of denoising on independent component analysis of functional magnetic resonance imaging data | Journal of neuroscience methods | 2013 | 704 | 0 | |||
| Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 612 | 336 | |||
| On Multiple Hypothesis Testing with Rejection Option | IEEE Information Theory Workshop (ITW) | 2011 | 608 | 421 | |||
| Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 511 | 329 | |||
| Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting | Eighth International Conference on Computer Science and Information Technologies, CSIT 2011 | 2011 | 440 | 119 | |||
| Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 634 | 417 | |||
| Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 587 | 334 | |||
| Statistical Analysis of Binarized SIFT Descriptors | 7th International Symposium on Image and Signal Processing and Analysis | 2011 | 508 | 316 | |||
| Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 549 | 134 | |||
| Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 541 | 327 | |||
| A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects | CAST workshop - Biometrie, BIOSIG2011 | 2011 | 539 | 306 | |||
| Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 588 | 331 | |||
| Geometrically robust perceptual fingerprinting: an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 504 | 292 | |||
| Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 575 | 268 | |||
| Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 567 | 389 | |||
| Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 599 | 548 | |||
| On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 517 | 272 | |||
| Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 581 | 1 | |||
| Multimodal object authentication with random projections : a worst-case approach | Proceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II | 2010 | 606 | 528 | |||
| Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 616 | 1,000 | |||
| Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 621 | 416 | |||
| Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 500 | 74 | |||
| Informed data-hiding with partial side information at the decoder | Signal processing | 2009 | 531 | 135 | |||
| Partially reversible data hiding with pure message communications over state-dependent channels | Signal processing | 2009 | 528 | 130 | |||
| Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 553 | 362 | |||
| Conception and limits of robust perceptual hashing: toward side information assisted hash functions | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 576 | 379 | |||
| On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 614 | 423 | |||
| Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 583 | 287 | |||
| Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 571 | 313 | |||
| Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 534 | 243 | |||
| Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 601 | 273 | |||
| Random projections based item authentication | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 537 | 386 | |||
| On security threats for robust perceptual hashing | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 553 | 371 | |||
| Authentication of Biometric Identification Documents via Mobile Devices | Journal of electronic imaging | 2008 | 656 | 380 | |||
| Unclonable identification and authentication based on reference list decoding | Proceedings of the conference on Secure Component and System Identification | 2008 | 524 | 91 | |||
| On reversible information hiding system | Proceedings of the IEEE International Symposium on Information Theory, ISIT 2008 | 2008 | 620 | 509 | |||
| Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures | Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08 | 2008 | 627 | 445 | |||
| Privacy-Preserving Multimodal Person and Object Identification | Proceedings of the 10th ACM Workshop on Multimedia & Security | 2008 | 597 | 0 | |||
| Secure surface identification codes | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 632 | 0 | |||
| Analysis of physical unclonable identification based on reference list decoding | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 667 | 0 | |||
| Security Analysis of Robust Perceptual Hashing | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 657 | 0 | |||
| Multimodal authentication based on random projections and distributed coding | Proceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08 | 2008 | 563 | 334 | |||
| Privacy-Preserving Biometric Person Identification | Proceedings of the 16th European Signal Processing Conference, EUSIPCO 2008 | 2008 | 460 | 93 | |||
| Quality Enhancement of printed-and-scanned Images using distributed coding | Signal processing | 2007 | 681 | 368 | |||
| Error exponent analysis of person identification based on fusion of dependent/independent modalities | Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 559 | 377 | |||
| Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms | WaCha2007, /Third WAVILA Challenge/ | 2007 | 492 | 104 | |||
| Analysis of multimodal binary detection systems based on dependent/independent modalities | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 527 | 384 | |||
| From non-stationary Gaussian modelling to independent component analysis: an fMRI study | Lemanic-Neuroscience Annual Meeting | 2007 | 488 | 0 | |||
| Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding | Proceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 634 | 483 | |||
| Robust perceptual hashing as classification problem: decision-theoretic and practical considerations | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 622 | 465 | |||
| Asymmetric side information and non-noticable Costa data-hiding | Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents | 2006 | 507 | 0 | |||
| Performance analysis of non-uniform quantization-based data-hiding | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 599 | 398 | |||
| Information-Theoretic Analysis of Electronic and Printed Document Authentication | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 546 | 471 | |||
| Message Communications And Channel State Estimation For State Dependent Channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 483 | 151 | |||
| Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | IEEE transactions on information forensics and security | 2006 | 511 | 445 | |||
| On reversibility of random binning based data-hiding techniques: security perspectives | ACM Multimedia and Security Workshop 2006 | 2006 | 493 | 0 | |||
| Tangible interactive system for document browsing and visualisation of multimedia data | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122) | 2006 | 693 | 137 | |||
| The Edge Process Model and Its Application to Information Hiding Capacity Analysis | IEEE transactions on signal processing | 2006 | 574 | 392 | |||
| Facial Image Compression Based on Structured Codebooks in Overcomplete Domain | EURASIP journal on applied signal processing | 2006 | 580 | 333 | |||
| Robustness Improvement of Known-Host-State Watermarking Using Host Statistics | Signal processing | 2006 | 590 | 672 | |||
| E-capacity analysis of data-hiding channels with geometrical attacks | Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 610 | 288 | |||
| Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 589 | 373 | |||
| Novel interactive services for e-tourism and e-commerce | Proceedings of International Conference on | 2006 | 479 | 0 | |||
| Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results | 2006 | 504 | 82 | ||||
| Host communications for non-Gaussian state-dependent channels : Laplacian case | Proceedings of International Conference on Multimedia and Expo | 2006 | 499 | 0 | |||
| Laplacian channel state estimation for state dependent channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 520 | 102 | |||
| Information-theoretic analysis of steganalysis in real images | ACM Multimedia and Security Workshop 2006 | 2006 | 554 | 0 | |||
| Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 537 | 335 | |||
| Costa problem under channel ambiguity | Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2) | 2006 | 591 | 308 | |||
| On reversibility of random binning techniques: multimedia perspectives | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005 | 2005 | 617 | 1,115 | |||
| Security analysis of robust data hiding with geometrically structured codebooks | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 519 | 339 | |||
| Data-hiding with partially available side information | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 502 | 93 | |||
| Document interactive navigation in multimodal databases | SIMILAR NOE Workshop | 2005 | 450 | 0 | |||
| Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | Proceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII | 2005 | 507 | 210 | |||
| Data-hiding with asymmetrically available side information at encoder and decoder | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 407 | 0 | |||
| Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups | Proceedings of 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 466 | 0 | |||
| Asymmetric spread spectrum data-hiding for Laplacian host data | IEEE International Conference on Image Processing (ICIP 2005) (vol. 1) | 2005 | 591 | 365 | |||
| On Security of Geometrically-Robust Data-Hiding | 6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005 | 2005 | 476 | 151 | |||
| Worst case additive attack against quantization-based data-hiding methods | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 638 | 375 | |||
| Image denoising based on the edge-process model | Signal processing | 2005 | 624 | 405 | |||
| Practical Data-Hiding : Additive Attacks Performance Analysis | Proceedings of 4th International Workshop on Digital Watermarking, IWDW 2005 | 2005 | 602 | 584 | |||
| Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 485 | 89 | |||
| Quantization-Based Methods: Additive Attacks Performance Analysis | IEEE transactions on signal processing | 2005 | 532 | 384 | |||
| Robustness improvement of known-host-state watermarking using host statistics | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 545 | 249 | |||
| Non-stationary Gaussian spatio-temporal modeling of fMRI data | Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET | 2005 | 513 | 0 | |||
| Multimedia Security: open problems and solutions | In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005 | 2005 | 425 | 221 | |||
| Towards geometrically robust data-hiding with structured codebooks | Multimedia systems | 2005 | 531 | 332 | |||
| Information-theoretic data-hiding: Recent achievements and open problems | International journal of image and graphics | 2005 | 640 | 1,359 | |||
| A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents | Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security | 2005 | 555 | 190 | |||
| Capacity analysis of periodical watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 562 | 144 | |||
| Joint compression of independent modalities in smart meeting rooms applications | SIMILAR NOE Workshop | 2004 | 455 | 0 | |||
| Non-stationary Gaussian spatio-temporal modeling of fMRI data | First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program | 2004 | 547 | 0 | |||
| Quantization-based watermarking performance improvement using host statistics: AWGN attack case | ACM Multimedia and Security Workshop 2004 | 2004 | 505 | 228 | |||
| Visual communications with side information via distributed printing channels: extended multimedia and security perspectives | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications | 2004 | 585 | 458 | |||
| Spread spectrum watermarking for real images: is everything so hopeless? | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 478 | 155 | |||
| Worst Case Additive Attack against Quantization-Based Watermarking Techniques | IEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004) | 2004 | 574 | 390 | |||
| Distributed single source coding framework for passport photo images | Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms | 2004 | 478 | 0 | |||
| Capacity-security analysis of repetitive watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 463 | 0 | |||
| Distributed single source coding with side information | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing | 2004 | 546 | 612 | |||
| Low bit rate image compression using a non-stationary geometrical image priors | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 380 | 0 | |||
| Smart Media: from basic concepts to applications | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 517 | 0 | |||
| Wavelet-based image denoising using non-stationary stochastic geometrical image priors | SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V | 2003 | 488 | 352 | |||
| Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications | 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003 | 2003 | 578 | 1,043 | |||
| Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models | SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V | 2003 | 492 | 75 | |||
| Information-theoretic visual communications in human-computer interfaces: Interactive segmentation | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 550 | 0 | |||
| Wavelet-based denoising using stochastic geometrical priors | (IM)2 Interactive Multimodal Information Management Workshop | 2002 | 452 | 0 |
