FB
| Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
|---|---|---|---|---|---|---|---|
| Active content fingerprinting: Shrinkage and lattice based modulations | 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | 2013 | 502 | 1 | |||
| Physical object protection based on digital micro-structure fingerprinting | 2012 | 863 | 12 | ||||
| Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 612 | 336 | |||
| Information–Theoretic Multiclass Classification Based on Binary Classifiers | Journal of Signal Processing Systems | 2011 | 511 | 329 | |||
| Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 587 | 334 | |||
| Statistical Analysis of Binarized SIFT Descriptors | 7th International Symposium on Image and Signal Processing and Analysis | 2011 | 508 | 316 | |||
| Trading-off privacy-complexity of identification problem | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 549 | 134 | |||
| Information-theoretic analysis of desynchronization invariant object identification | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 541 | 327 | |||
| Fast physical object identification based on unclonable features and soft fingerprinting | International Conference on Acoustics, Speech and Signal Processing, ICASSP2011 | 2011 | 588 | 331 | |||
| Geometrically robust perceptual fingerprinting: an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 504 | 292 | |||
| Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 575 | 268 | |||
| On Accuracy, Privacy and Complexity in the Identification Problem | Proceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV | 2010 | 517 | 272 | |||
| Fast identification of highly distorted images | Proceedings of SPIE / Media Forensics and Security II | 2010 | 616 | 1,000 | |||
| Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 621 | 416 | |||
| Fast identification algorithms for forensic applications | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 553 | 362 | |||
| Conception and limits of robust perceptual hashing: toward side information assisted hash functions | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 576 | 379 | |||
| On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryption | Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain | 2009 | 614 | 423 | |||
| Privacy enhancement of common randomness based authentication: key rate maximized case | First IEEE International Workshop on Information Forensics and Security, WIFS 2009 | 2009 | 583 | 287 | |||
| Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix Distances | IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009 | 2009 | 571 | 313 | |||
| Binary Robust Hashing based on Probabilistic Bit Reliability | IEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09 | 2009 | 534 | 243 | |||
| Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of Classes | IEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009 | 2009 | 601 | 273 | |||
| Random projections based item authentication | Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI | 2009 | 537 | 386 | |||
| Authentication of Biometric Identification Documents via Mobile Devices | Journal of electronic imaging | 2008 | 656 | 380 | |||
| Unclonable identification and authentication based on reference list decoding | Proceedings of the conference on Secure Component and System Identification | 2008 | 524 | 91 | |||
| Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures | Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08 | 2008 | 627 | 445 | |||
| Secure surface identification codes | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 632 | 0 | |||
| Analysis of physical unclonable identification based on reference list decoding | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 667 | 0 | |||
| Security Analysis of Robust Perceptual Hashing | Security, Forensics, Steganography, and Watermarking of Multimedia Contents X | 2008 | 657 | 0 | |||
| Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms | WaCha2007, /Third WAVILA Challenge/ | 2007 | 492 | 104 | |||
| Robust perceptual hashing as classification problem: decision-theoretic and practical considerations | Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, MMSP 2007 | 2007 | 622 | 465 |
