FB
Publications
30
Views
17,404
Downloads
8,126
Supervised works
0
Items per page
1 - 30 of 30
Title Published in Access level OA Policy Year Views Downloads
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 499 1
Physical object protection based on digital micro-structure fingerprinting
accessLevelRestricted
2012 827 12
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 606 323
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 508 304
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 583 323
Statistical Analysis of Binarized SIFT Descriptors7th International Symposium on Image and Signal Processing and Analysis
accessLevelPublic
2011 507 307
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 546 128
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 538 313
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 585 316
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 500 275
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 569 261
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 514 262
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 612 983
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 619 407
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 548 348
Conception and limits of robust perceptual hashing: toward side information assisted hash functionsProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 572 350
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 613 405
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 581 275
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 566 300
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 531 236
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 600 246
Random projections based item authenticationProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 534 358
Authentication of Biometric Identification Documents via Mobile DevicesJournal of electronic imaging
accessLevelPublic
2008 646 364
Unclonable identification and authentication based on reference list decodingProceedings of the conference on Secure Component and System Identification
accessLevelPublic
2008 522 76
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile ArchitecturesProceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08
accessLevelPublic
2008 625 406
Secure surface identification codesSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 628 0
Analysis of physical unclonable identification based on reference list decodingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 665 0
Security Analysis of Robust Perceptual HashingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 654 0
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithmsWaCha2007, /Third WAVILA Challenge/
accessLevelPublic
2007 490 100
Robust perceptual hashing as classification problem: decision-theoretic and practical considerationsProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 616 447
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack