FB
Publications
30
Views
15 864
Downloads
6 641
Supervised works
0
Items per page
1 - 30 of 30
Title Published in Access level OA Policy Year Views Downloads
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 467 1
Physical object protection based on digital micro-structure fingerprinting
accessLevelRestricted
2012 727 11
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 556 266
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 471 228
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 538 240
Statistical Analysis of Binarized SIFT Descriptors7th International Symposium on Image and Signal Processing and Analysis
accessLevelPublic
2011 462 278
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 497 85
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 481 275
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 547 255
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 460 222
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 509 214
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 484 232
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 567 897
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 563 315
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 494 294
Conception and limits of robust perceptual hashing: toward side information assisted hash functionsProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 528 262
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 544 391
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 538 222
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 500 233
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 472 180
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 537 166
Random projections based item authenticationProceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI
accessLevelPublic
2009 488 284
Authentication of Biometric Identification Documents via Mobile DevicesJournal of electronic imaging
accessLevelPublic
2008 584 277
Unclonable identification and authentication based on reference list decodingProceedings of the conference on Secure Component and System Identification
accessLevelPublic
2008 486 65
Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile ArchitecturesProceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08
accessLevelPublic
2008 583 310
Secure surface identification codesSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 585 0
Analysis of physical unclonable identification based on reference list decodingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 572 0
Security Analysis of Robust Perceptual HashingSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents X
2008 619 0
Decision-theoretic consideration of robust perceptual hashing: link to practical algorithmsWaCha2007, /Third WAVILA Challenge/
accessLevelPublic
2007 442 81
Robust perceptual hashing as classification problem: decision-theoretic and practical considerationsProceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007
accessLevelPublic
2007 563 357
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack