OK
Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
---|---|---|---|---|---|---|---|
The impact of denoising on independent component analysis of functional magnetic resonance imaging data | Journal of neuroscience methods | 2013 | 614 | 0 | |||
Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 552 | 264 | |||
On Multiple Hypothesis Testing with Rejection Option | IEEE Information Theory Workshop (ITW) | 2011 | 567 | 264 | |||
Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 470 | 228 | |||
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting | Eighth International Conference on Computer Science and Information Technologies, CSIT 2011 | 2011 | 401 | 96 | |||
Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 582 | 323 | |||
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 535 | 239 | |||
Statistical Analysis of Binarized SIFT Descriptors | 7th International Symposium on Image and Signal Processing and Analysis | 2011 | 461 | 274 | |||
Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 495 | 85 | |||
Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 479 | 272 | |||
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects | CAST workshop - Biometrie, BIOSIG2011 | 2011 | 488 | 254 | |||
Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 545 | 253 | |||
Geometrically robust perceptual fingerprinting : an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 457 | 218 | |||
Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 508 | 213 | |||
Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 531 | 307 | |||
Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 537 | 464 | |||
On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 477 | 232 | |||
Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 535 | 1 | |||
Multimodal object authentication with random projections : a worst-case approach | Proceedings of SPIE Photonics West, Electronic Imaging 2010 / Media Forensics and Security II | 2010 | 559 | 472 | |||
Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 565 | 893 | |||
Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 561 | 309 | |||
Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 458 | 54 | |||
Informed data-hiding with partial side information at the decoder | Signal processing | 2009 | 489 | 71 | |||
Partially reversible data hiding with pure message communications over state-dependent channels | Signal processing | 2009 | 498 | 83 | |||
Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 492 | 292 | |||
Conception and limits of robust perceptual hashing: toward side information assisted hash functions | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 525 | 260 | |||
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 542 | 391 | |||
Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 535 | 221 | |||
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 499 | 233 | |||
Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 470 | 180 | |||
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 531 | 166 | |||
Random projections based item authentication | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 486 | 281 | |||
On security threats for robust perceptual hashing | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 504 | 270 | |||
Authentication of Biometric Identification Documents via Mobile Devices | Journal of electronic imaging | 2008 | 583 | 276 | |||
Unclonable identification and authentication based on reference list decoding | Proceedings of the conference on Secure Component and System Identification | 2008 | 484 | 64 | |||
On reversible information hiding system | Proceedings of the IEEE International Symposium on Information Theory, ISIT 2008 | 2008 | 569 | 403 | |||
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures | Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08 | 2008 | 580 | 309 | |||
Privacy-Preserving Multimodal Person and Object Identification | Proceedings of the 10th ACM Workshop on Multimedia & Security | 2008 | 542 | 0 | |||
Secure surface identification codes | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 582 | 0 | |||
Analysis of physical unclonable identification based on reference list decoding | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 571 | 0 | |||
Security Analysis of Robust Perceptual Hashing | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 618 | 0 | |||
Multimodal authentication based on random projections and distributed coding | Proceedings of the 10th ACM Workshop on Multimedia & Security, MM&Sec '08 | 2008 | 519 | 223 | |||
Privacy-Preserving Biometric Person Identification | Proceedings of the 16th European Signal Processing Conference, EUSIPCO 2008 | 2008 | 395 | 64 | |||
Quality Enhancement of printed-and-scanned Images using distributed coding | Signal processing | 2007 | 633 | 289 | |||
Error exponent analysis of person identification based on fusion of dependent/independent modalities | Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 521 | 279 | |||
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms | WaCha2007, /Third WAVILA Challenge/ | 2007 | 441 | 78 | |||
Analysis of multimodal binary detection systems based on dependent/independent modalities | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 472 | 285 | |||
From non-stationary Gaussian modelling to independent component analysis: an fMRI study | Lemanic-Neuroscience Annual Meeting | 2007 | 461 | 0 | |||
Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding | Proceedings of SPIE-IS&T Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX | 2007 | 585 | 365 | |||
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 561 | 355 | |||
Asymmetric side information and non-noticable Costa data-hiding | Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents | 2006 | 461 | 0 | |||
Performance analysis of non-uniform quantization-based data-hiding | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 553 | 269 | |||
Information-Theoretic Analysis of Electronic and Printed Document Authentication | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 495 | 311 | |||
Message Communications And Channel State Estimation For State Dependent Channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 441 | 94 | |||
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | IEEE transactions on information forensics and security | 2006 | 442 | 304 | |||
On reversibility of random binning based data-hiding techniques: security perspectives | ACM Multimedia and Security Workshop 2006 | 2006 | 447 | 0 | |||
Tangible interactive system for document browsing and visualisation of multimedia data | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122) | 2006 | 634 | 137 | |||
The Edge Process Model and Its Application to Information Hiding Capacity Analysis | IEEE transactions on signal processing | 2006 | 524 | 313 | |||
Facial Image Compression Based on Structured Codebooks in Overcomplete Domain | EURASIP journal on applied signal processing | 2006 | 536 | 300 | |||
Robustness Improvement of Known-Host-State Watermarking Using Host Statistics | Signal processing | 2006 | 539 | 597 | |||
E-capacity analysis of data-hiding channels with geometrical attacks | Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 524 | 226 | |||
Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations | Proceedings of SPIE-IS&T Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII | 2006 | 544 | 273 | |||
Novel interactive services for e-tourism and e-commerce | Proceedings of International Conference on | 2006 | 441 | 0 | |||
Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: summary of main results | 2006 | 469 | 60 | ||||
Host communications for non-Gaussian state-dependent channels : Laplacian case | Proceedings of International Conference on Multimedia and Expo | 2006 | 465 | 0 | |||
Laplacian channel state estimation for state dependent channels | Proceedings of 27-th Symposium on information theory in the Benelux | 2006 | 449 | 52 | |||
Information-theoretic analysis of steganalysis in real images | ACM Multimedia and Security Workshop 2006 | 2006 | 497 | 0 | |||
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host | Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121) | 2006 | 496 | 226 | |||
Costa problem under channel ambiguity | Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006) (vol. 2) | 2006 | 544 | 237 | |||
On reversibility of random binning techniques: multimedia perspectives | 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS 2005 | 2005 | 564 | 1 057 | |||
Security analysis of robust data hiding with geometrically structured codebooks | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 469 | 254 | |||
Data-hiding with partially available side information | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 460 | 47 | |||
Document interactive navigation in multimodal databases | SIMILAR NOE Workshop | 2005 | 409 | 0 | |||
Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management | Proceedings of SPIE-IS&T Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII | 2005 | 458 | 155 | |||
Data-hiding with asymmetrically available side information at encoder and decoder | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 371 | 0 | |||
Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups | Proceedings of 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 426 | 0 | |||
Asymmetric spread spectrum data-hiding for Laplacian host data | IEEE International Conference on Image Processing (ICIP 2005) (vol. 1) | 2005 | 555 | 265 | |||
On Security of Geometrically-Robust Data-Hiding | 6th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2005 | 2005 | 434 | 113 | |||
Worst case additive attack against quantization-based data-hiding methods | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 563 | 280 | |||
Image denoising based on the edge-process model | Signal processing | 2005 | 553 | 294 | |||
Practical Data-Hiding : Additive Attacks Performance Analysis | Proceedings of 4th International Workshop on Digital Watermarking, IWDW 2005 | 2005 | 545 | 490 | |||
Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups | Proceedings of the 13th European Signal Processing Conference, EUSIPCO 2005 | 2005 | 436 | 64 | |||
Quantization-Based Methods: Additive Attacks Performance Analysis | IEEE transactions on signal processing | 2005 | 486 | 254 | |||
Robustness improvement of known-host-state watermarking using host statistics | Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120) | 2005 | 504 | 200 | |||
Non-stationary Gaussian spatio-temporal modeling of fMRI data | Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET | 2005 | 471 | 0 | |||
Multimedia Security: open problems and solutions | In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program 2005 | 2005 | 390 | 155 | |||
Towards geometrically robust data-hiding with structured codebooks | Multimedia systems | 2005 | 444 | 280 | |||
Information-theoretic data-hiding: Recent achievements and open problems | International journal of image and graphics | 2005 | 582 | 1 188 | |||
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents | Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security | 2005 | 487 | 149 | |||
Capacity analysis of periodical watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 495 | 90 | |||
Joint compression of independent modalities in smart meeting rooms applications | SIMILAR NOE Workshop | 2004 | 416 | 0 | |||
Non-stationary Gaussian spatio-temporal modeling of fMRI data | First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program | 2004 | 515 | 0 | |||
Quantization-based watermarking performance improvement using host statistics: AWGN attack case | ACM Multimedia and Security Workshop 2004 | 2004 | 454 | 193 | |||
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications | 2004 | 534 | 339 | |||
Spread spectrum watermarking for real images: is everything so hopeless? | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 432 | 109 | |||
Worst Case Additive Attack against Quantization-Based Watermarking Techniques | IEEE 6th Workshop on Multimedia Signal Processing (MMSP 2004) | 2004 | 529 | 286 | |||
Distributed single source coding framework for passport photo images | Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms | 2004 | 413 | 0 | |||
Capacity-security analysis of repetitive watermarking | Proceedings of the 12th European Signal Processing Conference, EUSIPCO 2004 | 2004 | 424 | 0 | |||
Distributed single source coding with side information | Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing | 2004 | 513 | 408 | |||
Low bit rate image compression using a non-stationary geometrical image priors | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 344 | 0 | |||
Smart Media: from basic concepts to applications | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 477 | 0 | |||
Wavelet-based image denoising using non-stationary stochastic geometrical image priors | SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V | 2003 | 437 | 263 | |||
Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications | 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003 | 2003 | 539 | 943 | |||
Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models | SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V | 2003 | 462 | 68 | |||
Information-theoretic visual communications in human-computer interfaces: Interactive segmentation | (IM)2 Interactive Multimodal Information Management Workshop | 2003 | 465 | 0 | |||
Wavelet-based denoising using stochastic geometrical priors | (IM)2 Interactive Multimodal Information Management Workshop | 2002 | 423 | 0 |