FB
Publications
30
Views
16,172
Downloads
6,988
Supervised works
0
Items per page
1 - 30 of 30
Title Published in Access level OA Policy Year Views Downloads
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 472 1
Physical object protection based on digital micro-structure fingerprinting
accessLevelRestricted
2012 750 11
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 565 278
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 474 242
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 546 270
Statistical Analysis of Binarized SIFT Descriptors7th International Symposium on Image and Signal Processing and Analysis
accessLevelPublic
2011 471 287
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 507 93
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 490 283
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 554 268
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 467 233
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 525 227
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 490 245
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 576 915
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 577 355
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 507 301
Conception and limits of robust perceptual hashing: toward side information assisted hash functionsProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 535 276
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 556 394
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 547 238
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 512 241
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 489 189
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 555 188
Random projections based item authenticationProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 498 301
Authentication of Biometric Identification Documents via Mobile DevicesJournal of electronic imaging
accessLevelPublic
2008 591 292
Unclonable identification and authentication based on reference list decodingProceedings of the conference on Secure Component and System Identification
accessLevelPublic
2008 494 68
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile ArchitecturesProceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08
accessLevelPublic
2008 594 329
Secure surface identification codesSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 593 0
Analysis of physical unclonable identification based on reference list decodingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 583 0
Security Analysis of Robust Perceptual HashingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 627 0
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithmsWaCha2007, /Third WAVILA Challenge/
accessLevelPublic
2007 455 82
Robust perceptual hashing as classification problem: decision-theoretic and practical considerationsProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 572 381
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack