


default search action
Sviatoslav Voloshynovskiy
Person information
- affiliation: University of Geneva, Stochastic Information Processing Group, Switzerland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Behrooz Razeghi
, Marzieh Gheisari
, Amir Ahooye Atashin
, Dimche Kostadinov
, Sébastien Marcel
, Deniz Gündüz
, Slava Voloshynovskiy
:
Group Membership Verification via Nonlinear Sparsifying Transform Learning. IEEE Access 12: 86739-86751 (2024) - [j37]Vitaliy Kinakh
, Mariia Drozdova
, Slava Voloshynovskiy
:
MV-MR: Multi-Views and Multi-Representations for Self-Supervised Learning and Knowledge Distillation. Entropy 26(6): 466 (2024) - [j36]Isaac Shiri
, Behrooz Razeghi, Sohrab Ferdowsi, Yazdan Salimi
, Deniz Gündüz, Douglas Teodoro
, Slava Voloshynovskiy, Habib Zaidi
:
PRIMIS: Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscation. J. Biomed. Informatics 150: 104583 (2024) - [j35]Vitaliy Kinakh
, Yury Belousov
, Guillaume Quétant
, Mariia Drozdova
, Taras Holotyak
, Daniel Schaerer
, Slava Voloshynovskiy
:
Hubble Meets Webb: Image-to-Image Translation in Astronomy. Sensors 24(4): 1151 (2024) - [j34]Joakim Tutt
, Olga Taran
, Roman Chaban
, Brian Pulfer
, Yury Belousov
, Taras Holotyak, Slava Voloshynovskiy
:
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach. IEEE Trans. Inf. Forensics Secur. 19: 3124-3134 (2024) - [j33]Yury Belousov
, Guillaume Quétant
, Brian Pulfer
, Roman Chaban
, Joakim Tutt
, Olga Taran
, Taras Holotyak, Slava Voloshynovskiy
:
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns. IEEE Trans. Inf. Forensics Secur. 19: 3395-3408 (2024) - [c166]Brian Pulfer
, Yury Belousov
, Slava Voloshynovskiy
:
Robustness Tokens: Towards Adversarial Robustness of Transformers. ECCV (59) 2024: 110-127 - [c165]Roman Chaban, Ethan Icet, Olga Taran, Slava Voloshynovskiy:
Comparative Analysis of Copy Detection Patterns and Physical Unclonable Functions in Authentication Systems: A Mobile Phone Perspective. EUSIPCO 2024: 740-744 - [c164]Roman Chaban, Brian Pulfer, Slava Voloshynovskiy:
Assessing the Viability of Synthetic Physical Copy Detection Patterns on Different Imaging Systems. WIFS 2024: 1-6 - [c163]Vitaliy Kinakh, Brian Pulfer, Yury Belousov, Pierre Fernandez, Teddy Furon, Slava Voloshynovskiy:
Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks. WIFS 2024: 1-6 - [c162]Joakim Tutt, Slava Voloshynovskiy:
Provable Performance Guarantees of Copy Detection Patterns. WIFS 2024: 1-6 - [i53]Mariia Drozdova, Vitaliy Kinakh, Omkar Bait, Olga Taran, Erica Lastufka, Miroslava Dessauges-Zavadsky, Taras Holotyak, Daniel Schaerer, Slava Voloshynovskiy:
Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model. CoRR abs/2402.10204 (2024) - [i52]Francesco P. Ramunno, Stefan Hackstein, Vitaliy Kinakh, Mariia Drozdova, Guillaume Quétant, André Csillaghy, Sviatoslav Voloshynovskiy:
Solar synthetic imaging: Introducing denoising diffusion probabilistic models on SDO/AIA data. CoRR abs/2404.02552 (2024) - [i51]Francesco P. Ramunno, Hyun-Jin Jeong, Stefan Hackstein, André Csillaghy, Svyatoslav Voloshynovskiy, Manolis K. Georgoulis:
Magnetogram-to-Magnetogram: Generative Forecasting of Solar Evolution. CoRR abs/2407.11659 (2024) - [i50]Vitaliy Kinakh, Slava Voloshynovskiy:
Tabular Data Generation using Binary Diffusion. CoRR abs/2409.13882 (2024) - [i49]Joakim Tutt, Slava Voloshynovskiy:
Provable Performance Guarantees of Copy Detection Patterns. CoRR abs/2409.17649 (2024) - [i48]Vitaliy Kinakh, Brian Pulfer, Yury Belousov, Pierre Fernandez, Teddy Furon, Slava Voloshynovskiy:
Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks. CoRR abs/2409.18211 (2024) - [i47]Mariia Drozdova, Vitaliy Kinakh, Yury Belousov, Erica Lastufka, Slava Voloshynovskiy:
Semi-Supervised Fine-Tuning of Vision Foundation Models with Content-Style Decomposition. CoRR abs/2410.02069 (2024) - [i46]Roman Chaban, Brian Pulfer, Slava Voloshynovskiy:
Assessing the Viability of Synthetic Physical Copy Detection Patterns on Different Imaging Systems. CoRR abs/2410.02575 (2024) - 2023
- [j32]Isaac Shiri
, Behrooz Razeghi
, Alireza Vafaei Sadr
, Mehdi Amini
, Yazdan Salimi
, Sohrab Ferdowsi, Peter Boor
, Deniz Gündüz
, Slava Voloshynovskiy, Habib Zaidi
:
Multi-institutional PET/CT image segmentation using federated deep transformer learning. Comput. Methods Programs Biomed. 240: 107706 (2023) - [j31]Olga Taran
, Joakim Tutt, Taras Holotyak
, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy:
Mobile authentication of copy detection patterns. EURASIP J. Inf. Secur. 2023(1): 4 (2023) - [j30]Olga Taran
, Joakim Tutt, Taras Holotyak
, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy:
Correction: Mobile authentication of copy detection patterns. EURASIP J. Inf. Secur. 2023(1): 8 (2023) - [j29]Denis Ullmann
, Olga Taran
, Slava Voloshynovskiy
:
Multivariate Time Series Information Bottleneck. Entropy 25(5): 831 (2023) - [j28]Guillaume Quétant
, Yury Belousov
, Vitaliy Kinakh
, Slava Voloshynovskiy
:
TURBO: The Swiss Knife of Auto-Encoders. Entropy 25(10): 1471 (2023) - [j27]Behrooz Razeghi
, Flávio P. Calmon
, Deniz Gündüz
, Slava Voloshynovskiy
:
Bottlenecks CLUB: Unifying Information-Theoretic Trade-Offs Among Complexity, Leakage, and Utility. IEEE Trans. Inf. Forensics Secur. 18: 2060-2075 (2023) - [c161]Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy:
Stochastic Digital Twin for Copy Detection Patterns. WIFS 2023: 1-6 - [i45]Vitaliy Kinakh
, Mariia Drozdova, Slava Voloshynovskiy:
MV-MR: multi-views and multi-representations for self-supervised learning and knowledge distillation. CoRR abs/2303.12130 (2023) - [i44]Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy:
Stochastic Digital Twin for Copy Detection Patterns. CoRR abs/2309.16866 (2023) - [i43]Guillaume Quétant, Yury Belousov, Vitaliy Kinakh, Slava Voloshynovskiy:
TURBO: The Swiss Knife of Auto-Encoders. CoRR abs/2311.06527 (2023) - 2022
- [j26]Shideh Rezaeifar
, Slava Voloshynovskiy
, Meisam Asgari Jirhandeh
, Vitaliy Kinakh
:
Privacy-Preserving Image Template Sharing Using Contrastive Learning. Entropy 24(5): 643 (2022) - [c160]Behrooz Razeghi
, Shideh Rezaeifar, Sohrab Ferdowsi, Taras Holotyak
, Slava Voloshynovskiy:
Compressed Data Sharing Based On Information Bottleneck Model. ICASSP 2022: 3009-3013 - [c159]Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak
, Svyatoslav Voloshynovskiy:
Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach. ICIP 2022: 1296-1300 - [c158]Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
Digital twins of physical printing-imaging channel. WIFS 2022: 1-6 - [c157]Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy:
Printing variability of copy detection patterns. WIFS 2022: 1-6 - [c156]Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
Anomaly localization for copy detection patterns through print estimations. WIFS 2022: 1-6 - [c155]Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak
, Slava Voloshynovskiy:
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns. WIFS 2022: 1-6 - [i42]Olga Taran, Joakim Tutt, Taras Holotyak
, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy:
Mobile authentication of copy detection patterns. CoRR abs/2203.02397 (2022) - [i41]Brian Pulfer
, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak
, Slava Voloshynovskiy:
Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach. CoRR abs/2206.11793 (2022) - [i40]Behrooz Razeghi
, Flávio P. Calmon, Deniz Gündüz, Slava Voloshynovskiy:
Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility. CoRR abs/2207.04895 (2022) - [i39]Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak
, Slava Voloshynovskiy:
Anomaly localization for copy detection patterns through print estimations. CoRR abs/2209.15625 (2022) - [i38]Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak
, Slava Voloshynovskiy:
Printing variability of copy detection patterns. CoRR abs/2210.05343 (2022) - [i37]Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak
, Slava Voloshynovskiy:
Digital twins of physical printing-imaging channel. CoRR abs/2210.17420 (2022) - [i36]Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak
, Slava Voloshynovskiy:
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns. CoRR abs/2212.07326 (2022) - 2021
- [j25]S. Ivanov, Maksym Tsizh
, Denis Ullmann
, Brandon Panos
, Sviatoslav Voloshynovskiy
:
Solar activity classification based on Mg II spectra: Towards classification on compressed data. Astron. Comput. 36: 100473 (2021) - [c154]Behrooz Razeghi
, Sohrab Ferdowsi, Dimche Kostadinov, Flávio P. Calmon
, Slava Voloshynovskiy:
Privacy-Preserving near Neighbor Search via Sparse Coding with Ambiguation. ICASSP 2021: 2635-2639 - [c153]Vitaliy Kinakh
, Olga Taran, Svyatoslav Voloshynovskiy:
ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets. ICCVW 2021: 1098-1106 - [c152]Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy:
Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable? WIFS 2021: 1-6 - [c151]Olga Taran, Joakim Tutt, Taras Holotyak
, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy:
Mobile authentication of copy detection patterns: how critical is to know fakes? WIFS 2021: 1-6 - [c150]Amir Ahooye Atashin
, Behrooz Razeghi
, Deniz Gündüz, Slava Voloshynovskiy:
Variational Leakage: The Role of Information Complexity in Privacy Leakage. WiseML@WiSec 2021: 91-96 - [i35]Behrooz Razeghi, Sohrab Ferdowsi, Dimche Kostadinov, Flávio P. Calmon, Slava Voloshynovskiy:
Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation. CoRR abs/2102.04274 (2021) - [i34]Amir Ahooye Atashin, Behrooz Razeghi, Deniz Gündüz, Slava Voloshynovskiy:
Variational Leakage: The Role of Information Complexity in Privacy Leakage. CoRR abs/2106.02818 (2021) - [i33]Vitaliy Kinakh, Olga Taran, Svyatoslav Voloshynovskiy:
ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets. CoRR abs/2108.13939 (2021) - [i32]Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy:
Mobile authentication of copy detection patterns: how critical is to know fakes? CoRR abs/2110.01864 (2021) - [i31]Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy:
Machine learning attack on copy detection patterns: are 1x1 patterns cloneable? CoRR abs/2110.02176 (2021) - [i30]Samuel Klein, John A. Raine, Sebastian Pina-Otey, Slava Voloshynovskiy, Tobias Golling:
Funnels: Exact maximum likelihood with dimensionality reduction. CoRR abs/2112.08069 (2021) - [i29]Mariia Drozdova, Vitaliy Kinakh, Guillaume Quétant, Tobias Golling, Slava Voloshynovskiy:
Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks. CoRR abs/2112.09646 (2021) - [i28]Vitaliy Kinakh, Mariia Drozdova, Guillaume Quétant, Tobias Golling, Slava Voloshynovskiy:
Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN. CoRR abs/2112.09653 (2021) - [i27]Guillaume Quétant, Mariia Drozdova, Vitaliy Kinakh, Tobias Golling, Slava Voloshynovskiy:
Turbo-Sim: a generalised generative model with a physical latent space. CoRR abs/2112.10629 (2021) - 2020
- [j24]Olga Taran
, Shideh Rezaeifar, Taras Holotyak
, Slava Voloshynovskiy
:
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation. EURASIP J. Inf. Secur. 2020: 10 (2020) - [j23]Slava Voloshynovskiy
, Olga Taran
, Mouad Kondah, Taras Holotyak
, Danilo J. Rezende
:
Variational Information Bottleneck for Semi-Supervised Classification. Entropy 22(9): 943 (2020) - [j22]Denis Ullmann
, Shideh Rezaeifar
, Olga Taran
, Taras Holotyak
, Brandon Panos
, Slava Voloshynovskiy
:
Information Bottleneck Classification in Extremely Distributed Systems. Entropy 22(11): 1237 (2020) - [c149]Shideh Rezaeifar, Maurits Diephuis, Behrooz Razeghi
, Denis Ullmann, Olga Taran, Slava Voloshynovskiy:
Distributed Semi-Private Image Classification Based on Information-Bottleneck Principle. EUSIPCO 2020: 755-759 - [c148]Sohrab Ferdowsi, Behrooz Razeghi
, Taras Holotyak
, Flávio P. Calmon, Slava Voloshynovskiy:
Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups. ICASSP 2020: 2797-2801 - [c147]Olga Taran, Slavi Bonev, Taras Holotyak, Slava Voloshynovskiy:
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World. ICASSP 2020: 2812-2816 - [c146]Jakub Nowak
, Taras Holotyak
, Marcin Korytkowski
, Rafal Scherer
, Slava Voloshynovskiy
:
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns. ICCS (4) 2020: 184-195 - [c145]Behrooz Razeghi
, Flávio P. Calmon, Deniz Gündüz, Slava Voloshynovskiy:
On Perfect Obfuscation: Local Information Geometry Analysis. WIFS 2020: 1-6 - [i26]Sohrab Ferdowsi, Behrooz Razeghi, Taras Holotyak, Flávio P. Calmon, Slava Voloshynovskiy:
Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups. CoRR abs/2002.01469 (2020) - [i25]Behrooz Razeghi, Flávio P. Calmon, Deniz Gündüz, Slava Voloshynovskiy:
On Perfect Obfuscation: Local Information Geometry Analysis. CoRR abs/2009.04157 (2020)
2010 – 2019
- 2019
- [c144]Dimche Kostadinov, Behrooz Razeghi
, Shideh Rezaeifar, Slava Voloshynovskiy
:
Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features. CISS 2019: 1-6 - [c143]Olga Taran, Shideh Rezaeifar, Taras Holotyak
, Slava Voloshynovskiy
:
Defending Against Adversarial Attacks by Randomized Diversification. CVPR 2019: 11226-11233 - [c142]Olga Taran, Slavi Bonev, Sviatoslav Voloshynovskiy:
Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach. ICASSP 2019: 2482-2486 - [c141]Marzieh Gheisari
, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi
, Slava Voloshynovskiy
:
Aggregation and Embedding for Group Membership Verification. ICASSP 2019: 2592-2596 - [c140]Shideh Rezaeifar, Behrooz Razeghi
, Olga Taran, Taras Holotyak
, Slava Voloshynovskiy
:
Reconstruction of Privacy-Sensitive Data from Protected Templates. ICIP 2019: 1163-1167 - [c139]Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy
:
Robustification of Deep Net Classifiers by Key Based Diversified Aggregation with Pre-Filtering. ICIP 2019: 2294-2298 - [c138]Behrooz Razeghi
, Taras Stanko, Boris Skoric, Slava Voloshynovskiy
:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. WIFS 2019: 1-6 - [i24]Dimche Kostadinov, Behrooz Razeghi, Taras Holotyak, Slava Voloshynovskiy:
Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment. CoRR abs/1901.10760 (2019) - [i23]Dimche Kostadinov, Behrooz Razdehi, Slava Voloshynovskiy:
Network Parameter Learning Using Nonlinear Transforms, Local Representation Goals and Local Propagation Constraints. CoRR abs/1902.00016 (2019) - [i22]Olga Taran, Slavi Bonev, Slava Voloshynovskiy:
Clonability of anti-counterfeiting printable graphical codes: a machine learning approach. CoRR abs/1903.07359 (2019) - [i21]Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy:
Defending against adversarial attacks by randomized diversification. CoRR abs/1904.00689 (2019) - [i20]Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
Reconstruction of Privacy-Sensitive Data from Protected Templates. CoRR abs/1905.03282 (2019) - [i19]Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy:
Robustification of deep net classifiers by key based diversified aggregation with pre-filtering. CoRR abs/1905.05454 (2019) - [i18]Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding. CoRR abs/1907.06388 (2019) - [i17]Sohrab Ferdowsi, Maurits Diephuis, Shideh Rezaeifar, Slava Voloshynovskiy:
ρ-VAE: Autoregressive parametrization of the VAE encoder. CoRR abs/1909.06236 (2019) - [i16]Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende:
Information bottleneck through variational glasses. CoRR abs/1912.00830 (2019) - 2018
- [c137]Sohrab Ferdowsi, Slava Voloshynovskiy
, Dimche Kostadinov:
Vector Compression for Similarity Search Using Multi-Layer Sparse Ternary Codes. DSW 2018: 110-114 - [c136]Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy
:
Bridging Machine Learning and Cryptography in Defence Against Adversarial Attacks. ECCV Workshops (2) 2018: 267-279 - [c135]Dimche Kostadinov, Sviatoslav Voloshynovskiy
, Sohrab Ferdowsi:
Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor. EUSIPCO 2018: 1417-1421 - [c134]Martino Ferrari, Olga Taran, Taras Holotyak
, Karen O. Egiazarian
, Slava Voloshynovskiy
:
Injecting Image Priors into Learnable Compressive Subsampling. EUSIPCO 2018: 1735-1739 - [c133]Shideh Rezaeifar, Olga Taran, Slava Voloshynovskiy
:
Classification by Re-generation: Towards Classification Based on Variational Inference. EUSIPCO 2018: 2005-2009 - [c132]Behrooz Razeghi
, Slava Voloshynovskiy
, Sohrab Ferdowsi, Dimche Kostadinov:
Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization. EUSIPCO 2018: 2578-2582 - [c131]Dimche Kostadinov, Sviatoslav Voloshynovskiy
, Sohrab Ferdowsi:
Learning Overcomplete and Sparsifying Transform With Approximate and Exact Closed Form Solutions. EUVIP 2018: 1-6 - [c130]Denis Ullmann
, Slava Voloshynovskiy
, Lucia Kleint
, Sam Krucker, Martin Melchior, Cédric Huwyler, Brandon Panos:
DCT-Tensor-Net for Solar Flares Detection on IRIS Data. EUVIP 2018: 1-6 - [c129]Behrooz Razeghi
, Slava Voloshynovskiy
:
Privacy-Preserving Outsourced Media Search Using Secure Sparse Ternary Codes. ICASSP 2018: 1992-1996 - [c128]Dimche Kostadinov, Behrooz Razeghi
, Svyatoslav Voloshynovskiy
, Sohrab Ferdowsi:
Learning Discrimination Specific, Self-Collaborative and Nonlinear Model. ICBK 2018: 306-313 - [i15]Dimche Kostadinov, Behrooz Razeghi, Sohrab Ferdowsi, Slava Voloshynovskiy:
Network Learning with Local Propagation. CoRR abs/1805.07802 (2018) - [i14]Behrooz Razeghi, Slava Voloshynovskiy, Sohrab Ferdowsi, Dimche Kostadinov:
Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization. CoRR abs/1806.08658 (2018) - [i13]Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy:
Bridging machine learning and cryptography in defence against adversarial attacks. CoRR abs/1809.01715 (2018) - [i12]Shideh Rezaeifar, Olga Taran, Slava Voloshynovskiy:
Classification by Re-generation: Towards Classification Based on Variational Inference. CoRR abs/1809.03259 (2018) - [i11]Marzieh Gheisari
, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy:
Aggregation and Embedding for Group Membership Verification. CoRR abs/1812.03943 (2018) - 2017
- [c127]Dimche Kostadinov, Slava Voloshynovskiy
, Sohrab Ferdowsi:
Joint learning of local fingerprint and content modulation. EUSIPCO 2017: 276-280 - [c126]Olga Taran, Shideh Rezaeifar, O. Dabrowski, J. Schlechten, Taras Holotyak
, Svyatoslav Voloshynovskiy
:
PharmaPack: Mobile fine-grained recognition of pharma packages. EUSIPCO 2017: 1917-1921 - [c125]Rafal Grycuk
, Magdalena Scherer
, Sviatoslav Voloshynovskiy
:
Local Keypoint-Based Image Detector with Object Detection. ICAISC (1) 2017: 507-517 - [c124]Sohrab Ferdowsi, Slava Voloshynovskiy
, Dimche Kostadinov:
A multi-layer image representation using regularized residual quantization: Application to compression and denoising. ICIP 2017: 2697-2701 - [c123]Sohrab Ferdowsi, Slava Voloshynovskiy
, Dimche Kostadinov, Taras Holotyak
:
Sparse ternary codes for similarity search have higher coding gain than dense binary codes. ISIT 2017: 2653-2657 - [c122]Behrooz Razeghi
, Slava Voloshynovskiy
, Dimche Kostadinov, Olga Taran:
Privacy preserving identification using sparse approximation with ambiguization. WIFS 2017: 1-6 - [e2]Matthew C. Stamm, Matthias Kirchner, Sviatoslav Voloshynovskiy:
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017. ACM 2017, ISBN 978-1-4503-5061-7 [contents] - [i10]Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras Holotyak:
Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes. CoRR abs/1701.07675 (2017) - [i9]Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov:
Regularized Residual Quantization: a multi-layer sparse dictionary learning approach. CoRR abs/1705.00522 (2017) - [i8]Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov:
A multi-layer image representation using Regularized Residual Quantization: application to compression and denoising. CoRR abs/1707.02194 (2017) - [i7]Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran:
Privacy Preserving Identification Using Sparse Approximation with Ambiguization. CoRR abs/1709.10297 (2017) - [i6]Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov:
A multi-layer network based on Sparse Ternary Codes for universal vector compression. CoRR abs/1710.11510 (2017) - 2016
- [c121]Rafal Grycuk
, Marcin Gabryel
, Magdalena Scherer
, Sviatoslav Voloshynovskiy
:
Image Descriptor Based on Edge Detection and Crawler Algorithm. ICAISC (2) 2016: 647-659 - [c120]Slava Voloshynovskiy
, Taras Holotyak
, Patrick Bas:
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness. ICASSP 2016: 2029-2033 - [c119]Dimche Kostadinov, Slava Voloshynovskiy
, Maurits Diephuis, Taras Holotyak
:
Local active content fingerprinting: Optimal solution under linear modulation. ICIP 2016: 3917-3921 - [c118]Dimche Kostadinov, Slava Voloshynovskiy
, Maurits Diephuis, Sohrab Ferdowsi, Taras Holotyak
:
Local Active Content Fingerprint: Solutions for general linear feature maps. ICPR 2016: 949-954 - [c117]Thomas Dewaele, Maurits Diephuis, Taras Holotyak
, Sviatoslav Voloshynovskiy
:
Forensic authentication of banknotes on mobile phones. Media Watermarking, Security, and Forensics 2016: 1-8 - [c116]Sohrab Ferdowsi, Slava Voloshynovskiy
, Dimche Kostadinov, Taras Holotyak
:
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes. WIFS 2016: 1-6 - 2015
- [j21]Slava Voloshynovskiy
, Taras Holotyak
, Fokko Beekhof:
Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition. IEEE Trans. Inf. Forensics Secur. 10(10): 2033-2047 (2015) - [c115]Dimche Kostadinov, Sviatoslav Voloshynovskiy
, Maurits Diephuis, Sohrab Ferdowsi:
Vector quantization with constrained likelihood for face recognition. EUSIPCO 2015: 140-144 - [c114]Maurits Diephuis, Sviatoslav Voloshynovskiy
, Taras Holotyak
:
SketchPrint: Physical object micro-structure identification using mobile phones. EUSIPCO 2015: 834-838 - [c113]Sohrab Ferdowsi, Sviatoslav Voloshynovskiy
, Dimche Kostadinov, Marcin Korytkowski
, Rafal Scherer
:
Secure Representation of Images Using Multi-layer Compression. ICAISC (1) 2015: 696-705 - [c112]Rafal Grycuk
, Marcin Gabryel
, Rafal Scherer
, Sviatoslav Voloshynovskiy
:
Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database. ICAISC (1) 2015: 715-726 - [c111]Dimche Kostadinov, Sviatoslav Voloshynovskiy
, Sohrab Ferdowsi, Maurits Diephuis, Rafal Scherer
:
Supervised Transform Learning for Face Recognition. ICAISC (1) 2015: 737-746 - [c110]Patryk Najgebauer
, Janusz Rygal, Tomasz Nowak, Jakub Romanowski, Leszek Rutkowski
, Sviatoslav Voloshynovskiy
, Rafal Scherer
:
Fast Dictionary Matching for Content-Based Image Retrieval. ICAISC (1) 2015: 747-756 - [c109]Sviatoslav Voloshynovskiy
, Maurits Diephuis, Taras Holotyak
:
Privacy preserving multimedia content identification for cloud based bag-of-feature architectures. ICME Workshops 2015: 1-6 - [c108]Sviatoslav Voloshynovskiy
, Maurits Diephuis, Taras Holotyak
:
Mobile visual object identification: from SIFT-BoF-RANSAC to Sketchprint. Media Watermarking, Security, and Forensics 2015: 94090Q - [c107]Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy
:
Information-theoretical limits of active content fingerprinting in content-based identification systems. WIFS 2015: 1-6 - [i5]Patryk Najgebauer, Janusz Rygal, Tomasz Nowak, Jakub Romanowski, Leszek Rutkowski, Sviatoslav Voloshynovskiy, Rafal Scherer:
Fast Dictionary Matching for Content-based Image Retrieval. CoRR abs/1504.06864 (2015) - [i4]Rafal Grycuk, Marcin Gabryel, Rafal Scherer, Sviatoslav Voloshynovskiy:
Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database. CoRR abs/1504.06867 (2015) - [i3]Sohrab Ferdowsi, Svyatoslav Voloshynovskiy, Dimche Kostadinov:
Sparse Multi-layer Image Approximation: Facial Image Compression. CoRR abs/1506.03998 (2015) - 2014
- [j20]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
:
Active Content Fingerpriting. IEEE Trans. Inf. Forensics Secur. 9(6): 905-920 (2014) - [c106]Sohrab Ferdowsi, Sviatoslav Voloshynovskiy
, Marcin Gabryel
, Marcin Korytkowski:
Multi-class Classification: A Coding Based Space Partitioning. ICAISC (2) 2014: 593-604 - [c105]Rafal Grycuk
, Marcin Gabryel
, Marcin Korytkowski
, Rafal Scherer
, Sviatoslav Voloshynovskiy
:
From Single Image to List of Objects Based on Edge and Blob Detection. ICAISC (2) 2014: 605-615 - [c104]Dimche Kostadinov, Sviatoslav Voloshynovskiy
, Sohrab Ferdowsi, Maurits Diephuis, Rafal Scherer
:
Robust Face Recognition by Group Sparse Representation That Uses Samples from List of Subjects. ICAISC (2) 2014: 616-626 - [c103]Sviatoslav Voloshynovskiy
, Maurits Diephuis, Taras Holotyak
:
Performance analysis of Bag-of-Features based content identification systems. ICASSP 2014: 3799-3803 - [c102]Maurits Diephuis, Svyatoslav Voloshynovskiy
, Taras Holotyak
, Nabil Stendardo, Bruno Keel:
A framework for fast and secure packaging identification on mobile phones. Media Watermarking, Security, and Forensics 2014: 90280T - [c101]Sohrab Ferdowsi, Svyatoslav Voloshynovskiy
, Dimche Kostadinov:
Content identification: binary content fingerprinting versus binary content encoding. Media Watermarking, Security, and Forensics 2014: 90280P - [c100]Svyatoslav Voloshynovskiy
, Maurits Diephuis, Dimche Kostadinov, Farzad Farhadzadeh, Taras Holotyak:
On accuracy, robustness, and security of bag-of-word search systems. Media Watermarking, Security, and Forensics 2014: 902807 - [c99]Dimche Kostadinov, Svyatoslav Voloshynovskiy
, Sohrab Ferdowsi:
Robust human face recognition based on locality preserving sparse over complete block approximation. Media Watermarking, Security, and Forensics 2014: 902809 - [i2]Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy:
Information Theoretical Analysis of Identification based on Active Content Fingerprinting. CoRR abs/1411.4836 (2014) - 2013
- [c98]Fokko Beekhof, Sviatoslav Voloshynovskiy, Maurits Diephuis, Farzad Farhadzadeh:
Physical object authentication with correlated camera noise. BTW Workshops 2013: 65-74 - [c97]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Taras Holotyak
, Fokko Beekhof:
Active content fingerprinting: Shrinkage and lattice based modulations. ICASSP 2013: 3073-3077 - [c96]Maurits Diephuis, Sviatoslav Voloshynovskiy
:
Physical object identification based on FAMOS microstructure fingerprinting: Comparison of templates versus invariant features. ISPA 2013: 119-123 - [c95]Farzad Farhadzadeh, Frans M. J. Willems, Sviatoslav Voloshynovskiy
:
Fundamental limits of identification: Identification rate, search and memory complexity trade-off. ISIT 2013: 1252-1256 - 2012
- [j19]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval:
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding. IEEE Trans. Inf. Forensics Secur. 7(5): 1652-1667 (2012) - [c94]Maurits Diephuis, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof:
DCT sign based robust privacy preserving image copy detection for cloud-based systems. CBMI 2012: 1-6 - [c93]Sviatoslav Voloshynovskiy
, Maurits Diephuis, Fokko Beekhof, Oleksiy J. Koval, Bruno Keel:
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS). WIFS 2012: 43-48 - [c92]Fokko Beekhof, Sviatoslav Voloshynovskiy
, Farzad Farhadzadeh:
Content authentication and identification under informed attacks. WIFS 2012: 133-138 - [c91]Sviatoslav Voloshynovskiy
, Farzad Farhadzadeh, Oleksiy J. Koval, Taras Holotyak
:
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting. WIFS 2012: 175-180 - 2011
- [j18]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof, Taras Holotyak
:
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes. J. Signal Process. Syst. 65(3): 413-430 (2011) - [c90]Ashot N. Harutyunyan, Naira Grigoryan, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects. BIOSIG 2011: 305-312 - [c89]Taras Holotyak
, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof:
Fast physical object identification based on unclonable features and soft fingerprinting. ICASSP 2011: 1713-1716 - [c88]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof:
Information-theoretic analysis of desynchronization invariant object identification. ICASSP 2011: 4168-4171 - [c87]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof:
Statistical analysis of digital image fingerprinting based on random projections. ISPA 2011: 200-205 - [c86]Maurits Diephuis, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
Statistical analysis of binarized SIFT descriptors. ISPA 2011: 460-465 - [c85]Naira Grigoryan, Ashot N. Harutyunyan
, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval:
On multiple hypothesis testing with rejection option. ITW 2011: 75-79 - [c84]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof:
Information-theoretic analysis of content based identification for correlated data. ITW 2011: 205-209 - [c83]Oleksiy J. Koval, Svyatoslav Voloshynovskiy
, Farzad Farhadzadeh:
Identification in desynchronization channels. ITW 2011: 297-301 - [c82]Svyatoslav Voloshynovskiy
, Taras Holotyak
, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh:
Sign-magnitude decomposition of mutual information with polarization effect in digital identification. ITW 2011: 385-389 - [c81]Taras Holotyak
, Svyatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof:
Trading-off performance and complexity in identification problem. Media Forensics and Security 2011: 78800O - [c80]Oleksiy J. Koval, Svyatoslav Voloshynovskiy
, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof:
Geometrically robust perceptual fingerprinting: an asymmetric case. Media Forensics and Security 2011: 78800N - [c79]Sviatoslav Voloshynovskiy
, Taras Holotyak, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh:
Private content identification based on soft fingerprinting. Media Forensics and Security 2011: 78800M - [i1]Naira Grigoryan, Ashot N. Harutyunyan, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
On Multiple Hypothesis Testing with Rejection Option. CoRR abs/1102.3520 (2011) - 2010
- [c78]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval:
Privacy Preserving Identification: Order Statistics List Decoding Perspective. IIH-MSP 2010: 352-355 - [c77]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval:
Performance analysis of identification system based on order statistics list decoder. ISIT 2010: 2652-2656 - [c76]Svyatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak
:
Information-theoretical analysis of private content identification. ITW 2010: 1-5 - [c75]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
:
Multimodal object authentication with random projections: a worst-case approach. Media Forensics and Security 2010: 75410D - [c74]Taras Holotyak
, Sviatoslav Voloshynovskiy
, Fokko Beekhof, Oleksiy J. Koval:
Fast identification of highly distorted images. Media Forensics and Security 2010: 754116 - [c73]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak
:
Private content identification: Performance-privacy-complexity trade-off. MMSP 2010: 58-63 - [c72]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval:
Content identification based on digital fingerprint: What can be done if ML decoding fails? MMSP 2010: 64-68 - [c71]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Taras Holotyak
, Fokko Beekhof, Farzad Farhadzadeh:
Privacy amplification of content identification systems based on fingerprint bit reliability. WIFS 2010: 1-6
2000 – 2009
- 2009
- [c70]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Patrick Bas, François Cayre:
On security threats for robust perceptual hashing. Media Forensics and Security 2009: 72540H - [c69]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof, Thierry Pun:
Conception and limits of robust perceptual hashing: towards side information assisted hash functions. Media Forensics and Security 2009: 72540D - [c68]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof, Thierry Pun:
Random projections based item authentication. Media Forensics and Security 2009: 725413 - [c67]Fokko Beekhof, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Taras Holotyak:
Fast identification algorithms for forensic applications. WIFS 2009: 76-80 - [c66]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Taras Holotyak
, Fokko Beekhof:
Privacy enhancement of common randomness based authentication: Key rate maximized case. WIFS 2009: 86-90 - 2008
- [j17]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Renato Villán, Fokko Beekhof, Thierry Pun:
Authentication of biometric identification documents via mobile devices. J. Electronic Imaging 17(1): 011014 (2008) - [j16]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fernando Pérez-González
, Thierry Pun:
Quantization-Based Methods: Additive Attacks Performance Analysis. Trans. Data Hiding Multim. Secur. 3: 70-90 (2008) - [c65]Fokko Beekhof, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Renato Villán, Emre Topak:
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures. e-Forensics 2008: 28 - [c64]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Privacy-preserving biometric person identification. EUSIPCO 2008: 1-5 - [c63]Mariam E. Haroutunian
, Smbat Tonoyan, Oleksiy J. Koval, Sviatoslav Voloshynovskiy
:
On reversible information hiding system. ISIT 2008: 940-944 - [c62]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Thierry Pun:
Privacy-preserving multimodal person and object identification. MM&Sec 2008: 177-184 - [c61]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Thierry Pun:
Multimodal authentication based on random projections and source coding. MM&Sec 2008: 195-204 - [c60]Fokko Beekhof, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Renato Villán, Thierry Pun:
Secure surface identification codes. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190D - [c59]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Fokko Beekhof, Thierry Pun:
Analysis of physical unclonable identification based on reference list decoding. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190B - [c58]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Renato Villán, Thierry Pun:
Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190P - [c57]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Fokko Beekhof, Thierry Pun:
Security analysis of robust perceptual hashing. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681906 - 2007
- [j15]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Quality enhancement of printed-and-scanned images using distributed coding. Signal Process. 87(6): 1301-1313 (2007) - [c56]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Thierry Pun:
Analysis of multimodal binary detection systems based on dependent/independent modalities. MMSP 2007: 70-73 - [c55]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fokko Beekhof, Thierry Pun:
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations. MMSP 2007: 345-348 - [c54]Renato Villán, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051T - [c53]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Thierry Pun:
Error exponent analysis of person identification based on fusion of dependent/independent modalities. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650515 - 2006
- [j14]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Thierry Pun:
Facial Image Compression Based on Structured Codebooks in Overcomplete Domain. EURASIP J. Adv. Signal Process. 2006 (2006) - [j13]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, José-Emilio Vila-Forcén, Fernando Pérez-González
, Frédéric Deguillaume, Thierry Pun:
Robustness improvement of known-host-state data-hiding using host statistics. Signal Process. 86(5): 1076-1088 (2006) - [j12]Luis Pérez-Freire, Fernando Pérez-González
, Sviatoslav Voloshynovskiy
:
An accurate analysis of scalar quantization-based data hiding. IEEE Trans. Inf. Forensics Secur. 1(1): 80-86 (2006) - [j11]Renato Villán, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Thierry Pun:
Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management. IEEE Trans. Inf. Forensics Secur. 1(4): 405-420 (2006) - [j10]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
The edge process model and its application to information-hiding capacity analysis. IEEE Trans. Signal Process. 54(5): 1813-1825 (2006) - [j9]Teodor Alecu, Sviatoslav Voloshynovskiy
, Thierry Pun:
The Gaussian Transform of Distributions: Definition, Computation and Application. IEEE Trans. Signal Process. 54(8): 2976-2985 (2006) - [c52]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Costa Problem Under Channel Ambiguity. ICASSP (2) 2006: 289-292 - [c51]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Thierry Pun:
Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case. ICME 2006: 845-848 - [c50]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Taras Holotyak
, Thierry Pun:
Information-theoretic analysis of steganalysis in real images. MM&Sec 2006: 11-16 - [c49]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun:
On reversibility of random binning based data-hiding techniques: security perspectives. MM&Sec 2006: 89-96 - [c48]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Thierry Pun:
Performance analysis of nonuniform quantization-based data hiding. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720X - [c47]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Emre Topak, Thierry Pun:
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721F - [c46]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Renato Villán, Emre Topak, José-Emilio Vila-Forcén, Frédéric Deguillaume, Yuriy B. Rytsar, Thierry Pun:
Information-theoretic analysis of electronic and printed document authentication. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721D - [c45]Renato Villán, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, José-Emilio Vila-Forcén, Emre Topak, Frédéric Deguillaume, Yuriy B. Rytsar, Thierry Pun:
Text data-hiding for digital and printed documents: theoretical and practical considerations. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607212 - [c44]Emre Topak, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Mariam E. Haroutunian
, José-Emilio Vila-Forcén, Thierry Pun:
E-capacity analysis of data-hiding channels with geometrical attacks. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607213 - [e1]Sviatoslav Voloshynovskiy, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006. ACM 2006, ISBN 1-59593-493-6 [contents] - 2005
- [j8]Sviatoslav Voloshynovskiy
, Frédéric Deguillaume, Oleksiy J. Koval, Thierry Pun:
Information-Theoretic Data-Hiding: Recent Achievements And Open Problems. Int. J. Image Graph. 5(1): 5-36 (2005) - [j7]Emre Topak, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
Towards geometrically robust data-hiding with structured codebooks. Multim. Syst. 11(2): 121-132 (2005) - [j6]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Thierry Pun:
Image denoising based on the edge-process model. Signal Process. 85(10): 1950-1969 (2005) - [c43]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun:
On Reversibility of Random Binning Techniques: Multimedia Perspectives. Communications and Multimedia Security 2005: 108-118 - [c42]Taras Holotyak
, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
:
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. Communications and Multimedia Security 2005: 273-274 - [c41]Renato Villán, Sviatoslav Voloshynovskiy
, Frédéric Deguillaume, Yuriy B. Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun:
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. Communications and Multimedia Security 2005: 280-281 - [c40]Julien Kronegg, Sviatoslav Voloshynovskiy, Thierry Pun:
Analysis of bit-rate definitions for Brain-Computer Interfaces. CSREA HCI 2005: 40-46 - [c39]Teodor Iulian Alecu, Sviatoslav Voloshynovskiy, Thierry Pun:
Denoising with Infinite Mixture of Gaussians. EUSIPCO 2005: 1-4 - [c38]Teodor Iulian Alecu, Sviatoslav Voloshynovskiy, Thierry Pun:
The Gaussian Transform. EUSIPCO 2005: 1-4 - [c37]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups. EUSIPCO 2005: 1-4 - [c36]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Mehmet Kivanç Mihçak, José-Emilio Vila-Forcén, Thierry Pun:
Data-hiding with partially available side information. EUSIPCO 2005: 1-4 - [c35]José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Thierry Pun:
Asymmetric spread spectrum data-hiding for Laplacian host data. ICIP (1) 2005: 217-220 - [c34]Frédéric Deguillaume, Yuriy B. Rytsar, Sviatoslav Voloshynovskiy
, Thierry Pun:
Protocols for data-hiding based text document security and automatic processing. ICME 2005: 25-28 - [c33]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Practical Data-Hiding: Additive Attacks Performance Analysis. IWDW 2005: 244-259 - [c32]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Fernando Pérez-González
, Thierry Pun:
Worst-case additive attack against quantization-based data-hiding methods. Security, Steganography, and Watermarking of Multimedia Contents 2005: 136-146 - [c31]Renato Villán, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Thierry Pun:
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. Security, Steganography, and Watermarking of Multimedia Contents 2005: 453-464 - [c30]Oleksiy J. Koval, Sviatoslav Voloshynovskiy
, Frédéric Deguillaume, Fernando Pérez-González
, Thierry Pun:
Robustness improvement of known-host-state watermarking using host statistics. Security, Steganography, and Watermarking of Multimedia Contents 2005: 569-577 - [c29]Emre Topak, Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
Security analysis of robust data-hiding with geometrically structured codebooks. Security, Steganography, and Watermarking of Multimedia Contents 2005: 709-720 - 2004
- [c28]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Capacity analysis of periodical watermarking. EUSIPCO 2004: 265-268 - [c27]Teodor Iulian Alecu, Sviatoslav Voloshynovskiy, Thierry Pun:
Localization properties of an EEG sensor system: Lower bounds and optimality. EUSIPCO 2004: 537-540 - [c26]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Spread spectrum watermarking for real images: Is everything so hopeless? EUSIPCO 2004: 1477-1480 - [c25]Teodor Alecu, Sviatoslav Voloshynovskiy, Thierry Pun:
EEG Cortical Imaging: A Vector Field Approach for Laplacian Denoising and Missing Data Estimation. ISBI 2004: 1335-1338 - [c24]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Quantization-based watermarking performance improvement using host statistics: AWGN attack case. MM&Sec 2004: 35-39 - [c23]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun, Fernando Pérez-González:
Worst case additive attack against quantization-based watermarking techniques. MMSP 2004: 135-138 - [c22]Luis Pérez-Freire, Fernando Pérez-González, Sviatoslav Voloshynovskiy:
Revealing the true achievable rates of scalar Costa scheme. MMSP 2004: 203-206 - [c21]Yuriy B. Rytsar, Sviatoslav Voloshynovskiy
, Frédéric Ehrler, Thierry Pun:
Interactive segmentation with hidden object-based annotations: toward smart media. Storage and Retrieval Methods and Applications for Multimedia 2004: 29-37 - [c20]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. Security, Steganography, and Watermarking of Multimedia Contents 2004: 428-445 - [c19]José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy
:
Distributed single source coding with side information. VCIP 2004 - 2003
- [j5]Sviatoslav Voloshynovskiy
, Thierry Pun, Jessica J. Fridrich, Fernando Pérez-González
, Nasir D. Memon
:
Security of data hiding technologies. Signal Process. 83(10): 2065-2067 (2003) - [j4]Frédéric Deguillaume, Sviatoslav Voloshynovskiy
, Thierry Pun:
Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process. 83(10): 2133-2170 (2003) - [c18]Yuriy B. Rytsar, Sviatoslav Voloshynovskiy
, Thierry Pun:
Metadata Representation for Semantic-Based Multimedia Security and Management. OTM Workshops 2003: 769-778 - [c17]Sviatoslav Voloshynovskiy
, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models. Security and Watermarking of Multimedia Contents 2003: 580-593 - 2002
- [c16]Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun:
Hybrid robust watermarking resistant against copy attack. EUSIPCO 2002: 1-4 - [c15]Sviatoslav Voloshynovskiy
, Thierry Pun:
Capacity-security analysis of data hiding technologies. ICME (2) 2002: 477-480 - [c14]Sviatoslav Voloshynovskiy
, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun:
StegoWall: blind statistical detection of hidden data. Security and Watermarking of Multimedia Contents 2002: 57-68 - [c13]Frédéric Deguillaume, Sviatoslav Voloshynovskiy
, Thierry Pun:
Method for the estimation and recovering from general affine transforms in digital watermarking applications. Security and Watermarking of Multimedia Contents 2002: 313-322 - 2001
- [j3]Sviatoslav Voloshynovskiy
, Shelby Pereira, Thierry Pun, Joachim J. Eggers, Jonathan K. Su:
Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks. IEEE Commun. Mag. 39(8): 118-126 (2001) - [j2]Sviatoslav Voloshynovskiy
, Shelby Pereira, V. Iquise, Thierry Pun:
Attack modelling: towards a second generation watermarking benchmark. Signal Process. 81(6): 1177-1214 (2001) - [j1]Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry Pun:
Optimal transform domain watermark embedding via linear programming. Signal Process. 81(6): 1251-1260 (2001) - [c12]Alexander Herrigel, Sviatoslav Voloshynovskiy:
Counterfeit Attacks against a new Currency Protection Scheme. Communications and Multimedia Security 2001 - [c11]Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun:
Multibit digital watermarking robust against local nonlinear geometrical distortions. ICIP (3) 2001: 999-1002 - [c10]Sviatoslav Voloshynovskiy
, Alexander Herrigel, Thierry Pun:
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. Information Hiding 2001: 330-339 - [c9]Shelby Pereira, Sviatoslav Voloshynovskiy
, Maribel Madueño, Stéphane Marchand-Maillet, Thierry Pun:
Second Generation Benchmarking and Application Oriented Evaluation. Information Hiding 2001: 340-353 - [c8]Alexander Herrigel, Sviatoslav Voloshynovskiy
, Yuri B. Rytsar:
Watermark template attack. Security and Watermarking of Multimedia Contents 2001: 394-405 - [c7]Sviatoslav Voloshynovskiy
, Frédéric Deguillaume, Shelby Pereira, Thierry Pun:
Optimal adaptive diversity watermarking with channel state estimation. Security and Watermarking of Multimedia Contents 2001: 673-685 - 2000
- [c6]Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Thierry Pun:
Content adaptive watermarking based on a stochastic multiresolution image modeling. EUSIPCO 2000: 1-4 - [c5]Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry Pun:
Effective Channel Coding for DCT Watermarks. ICIP 2000: 671-673 - [c4]Sviatoslav Voloshynovskiy, Shelby Pereira, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun:
Generalized watermarking attack based on watermark estimation and perceptual remodulation. Security and Watermarking of Multimedia Contents 2000: 358-370 - [c3]Martin Kutter, Sviatoslav Voloshynovskiy, Alexander Herrigel:
Watermark copy attack. Security and Watermarking of Multimedia Contents 2000: 371-381
1990 – 1999
- 1999
- [c2]Sviatoslav Voloshynovskiy
, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun:
A Stochastic Approach to Content Adaptive Digital Image Watermarking. Information Hiding 1999: 211-236 - 1998
- [c1]Ivan Prudyus, Sviatoslav Voloshynovskiy, Taras Holotyak:
Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays. EUSIPCO 1998: 1-4
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 23:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint