FF
Publications
14
Views
7 591
Downloads
2 883
Supervised works
0
Items per page
1 - 14 of 14
Title Published in Access level OA Policy Year Views Downloads
Active Content FingerpritingIEEE transactions on information forensics and security
accessLevelRestricted
2014 600 2
Information-theoretic analysis of identification systems in large-scale databases
accessLevelPublic
2014 710 508
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 460 1
Fundamental limits of identification: Identification rate, search and memory complexity trade-off2013 IEEE International Symposium on Information Theory (ISIT)
accessLevelRestricted
2013 593 0
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 548 261
Identification In Desynchronization ChannelsIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 579 318
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 529 235
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 453 217
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 505 211
Performance Analysis of Identification System Based on Order Statistics List DecoderIEEE International Symposium on Information TheoryInformation Theory Proceedings (ISIT)
accessLevelPublic
2010 529 305
Privacy Preserving Identification : Order Statistics List Decoding Perspective2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
accessLevelPublic
2010 534 462
Content Identification Based on digital fingerprint : what can be done if ML decoding fails?2010 IEEE International Workshop on Multimedia Signal Processing (MMSP)
accessLevelRestricted
2010 535 1
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 559 308
Content-Identification : towards Capacity Based on Bounded Distance DecoderApplications of Information Theory, Coding and Security, Yerevan, Armenia, 2010
accessLevelPublic
2010 457 54
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack