FF
| Title | Published in | Access level | OA Policy | Year | Views | Downloads | |
|---|---|---|---|---|---|---|---|
| Active Content Fingerpriting | IEEE transactions on information forensics and security | 2014 | 636 | 2 | |||
| Information-theoretic analysis of identification systems in large-scale databases | 2014 | 846 | 530 | ||||
| Active content fingerprinting: Shrinkage and lattice based modulations | 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) | 2013 | 498 | 1 | |||
| Fundamental limits of identification: Identification rate, search and memory complexity trade-off | 2013 IEEE International Symposium on Information Theory (ISIT) | 2013 | 645 | 0 | |||
| Private content identification based on soft fingerprinting | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 605 | 319 | |||
| Identification In Desynchronization Channels | IEEE Information Theory Workshop (ITW) | 2011 | 632 | 387 | |||
| Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification | IEEE Information Theory Workshop (ITW) | 2011 | 583 | 317 | |||
| Geometrically robust perceptual fingerprinting : an asymmetric case | Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII | 2011 | 500 | 273 | |||
| Privacy amplification of content identification based on fingerprint bit reliability | 2010 IEEE International Workshop on Information Forensics and Security (WIFS) | 2010 | 569 | 260 | |||
| Performance Analysis of Identification System Based on Order Statistics List Decoder | IEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT) | 2010 | 564 | 372 | |||
| Privacy Preserving Identification : Order Statistics List Decoding Perspective | 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) | 2010 | 597 | 530 | |||
| Content Identification Based on digital fingerprint : what can be done if ML decoding fails? | 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP) | 2010 | 578 | 1 | |||
| Information-Theoretical Analysis of Private Content Identification | 2010 IEEE Information Theory Workshop (ITW) | 2010 | 618 | 407 | |||
| Content-Identification : towards Capacity Based on Bounded Distance Decoder | Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010 | 2010 | 498 | 69 |
