FF
| Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
|---|---|---|---|---|---|---|---|
| Active Content Fingerpriting | IEEE transactions on information forensics and security | 2014 | 638 | 2 | |||
| Information-theoretic analysis of identification systems in large-scale databases | 2014 | 885 | 542 | ||||
| Active content fingerprinting: Shrinkage and lattice based modulations | 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | 2013 | 502 | 1 | |||
| Fundamental limits of identification: Identification rate, search and memory complexity trade-off | 2013 IEEE International Symposium on Information Theory (ISIT) | 2013 | 647 | 0 | |||
| Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 612 | 336 | |||
| Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 634 | 417 | |||
| Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 587 | 334 | |||
| Geometrically robust perceptual fingerprinting: an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 504 | 292 | |||
| Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 575 | 268 | |||
| Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 567 | 389 | |||
| Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 599 | 548 | |||
| Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 581 | 1 | |||
| Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 621 | 416 | |||
| Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 500 | 74 |
