FB
Publications
30
Views
17,540
Downloads
8,519
Supervised works
0
Items per page
1 - 30 of 30
Title Published in Access level OA Policy Year Views Downloads
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 502 1
Physical object protection based on digital micro-structure fingerprinting
accessLevelRestricted
2012 863 12
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 612 336
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 511 329
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 587 334
Statistical Analysis of Binarized SIFT Descriptors7th International Symposium on Image and Signal Processing and Analysis
accessLevelPublic
2011 508 316
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 549 134
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 541 327
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 588 331
Geometrically robust perceptual fingerprinting: an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 504 292
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 575 268
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 517 272
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 616 1,000
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 621 416
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 553 362
Conception and limits of robust perceptual hashing: toward side information assisted hash functionsProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 576 379
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 614 423
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 583 287
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 571 313
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 534 243
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 601 273
Random projections based item authenticationProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 537 386
Authentication of Biometric Identification Documents via Mobile DevicesJournal of electronic imaging
accessLevelPublic
2008 656 380
Unclonable identification and authentication based on reference list decodingProceedings of the conference on Secure Component and System Identification
accessLevelPublic
2008 524 91
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile ArchitecturesProceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08
accessLevelPublic
2008 627 445
Secure surface identification codesSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 632 0
Analysis of physical unclonable identification based on reference list decodingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 667 0
Security Analysis of Robust Perceptual HashingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 657 0
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithmsWaCha2007, /Third WAVILA Challenge/
accessLevelPublic
2007 492 104
Robust perceptual hashing as classification problem: decision-theoretic and practical considerationsProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 622 465
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack