Search Publications

Title  
Author  
Year  
   

All Publications

  • V. Kinakh, Y. Belousov, G. Quétant, M. Drozdova, T. Holotyak, D. Schaerer, and S. Voloshynovskiy, "Hubble Meets Webb: Image-to-Image Translation in Astronomy," Sensors, vol. 24, iss. 4, 2024. [pdf|bib]
  • I. Shiri, B. Razeghi, S. Ferdowsi, Y. Salimi, D. Gündüz, D. Teodoro, S. Voloshynovskiy, and H. Zaidi, "PRIMIS: Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscation," Journal of biomedical informatics, vol. 150, 2024. [pdf|bib]
  • J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, "Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3124-3134, 2024. [pdf|bib]
  • Y. Belousov, G. Quétant, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications with Copy Detection Patterns," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3395-3408, 2024. [pdf|bib]
  • I. Shiri, A. Vafaei Sadr, A. Akhavan, Y. Salimi, A. Sanaat, M. Amini, B. Razeghi, A. Saberi, H. Arabi, S. Ferdowsi, and others, "Decentralized collaborative multi-institutional PET attenuation and scatter correction using federated deep learning," European Journal of Nuclear Medicine and Molecular Imaging, vol. 50, iss. 4, pp. 1034-1050, 2023. [pdf|bib]
  • B. Razeghi, F. P. Calmon, D. Gündüz, and S. Voloshynovskiy, "Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility," IEEE Transactions on Information Forensics and Security (TIFS), 2023. [pdf|bib]
  • O. Taran, O. Bait, M. Dessauges-Zavadsky, T. Holotyak, D. Schaerer, and S. Voloshynovskiy, "Challenging interferometric imaging: Machine learning-based source localization from uv-plane observations," Astronomy & Astrophysics (A&A), vol. 674, 2023. [link|bib]
  • I. Shiri, Y. Salimi, M. Maghsudi, E. Jenabi, S. Harsini, B. Razeghi, S. Mostafaei, G. Hajianfar, A. Sanaat, E. Jafari, and others, "Differential privacy preserved federated transfer learning for multi-institutional 68Ga-PET image artefact detection and disentanglement," European Journal of Nuclear Medicine and Molecular Imaging (EJNMMI), pp. 1-14, 2023. [pdf|bib]
  • D. Ullmann, O. Taran, and S. Voloshynovskiy, "Multivariate Time Series Information Bottleneck," Entropy, vol. 25, iss. 5, 2023. [link|bib]
  • Y. Belousov, O. Taran, V. Kinakh, and S. Voloshynovskiy, "Stochastic Digital Twin for Copy Detection Patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Nuremberg, Germany, 2023. [pdf|bib]
  • I. Shiri, B. Razeghi, A. Vafaei Sadr, M. Amini, Y. Salimi, S. Ferdowsi, P. Boor, D. Gündüz, S. Voloshynovskiy, and H. Zaidi, "Multi-Institutional PET/CT Image Segmentation Using Federated Deep Transformer Learning," Computer methods and programs in biomedicine, vol. 240, 2023. [pdf|bib]
  • B. Pulfer, R. Chaban, Y. Belousov, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach," in Proc. IEEE International Conference on Image Processing (ICIP), Bordeaux, France, 2022. [pdf|bib]
  • I. Shiri, A. V. Sadr, M. Amini, Y. Salimi, A. Sanaat, A. Akhavanallaf, B. Razeghi, S. Ferdowsi, A. Saberi, H. Arabi, and others, "Decentralized distributed multi-institutional PET image segmentation using a federated deep learning framework," Clinical Nuclear Medicine, vol. 47, iss. 7, pp. 606-617, 2022. [pdf|bib]
  • S. Rezaeifar, S. Voloshynovskiy, M. Jirhandeh, and V. Kinakh, "Privacy-Preserving Image Template Sharing Using Contrastive Learning," in Proc. Entropy Journal special issue "Information-Theoretic Approach to Privacy and Security", 2022. [pdf|bib]
  • R. Chaban, O. Taran, J. Tutt, Y. Belousov, B. Pulfer, T. Holotyak, and S. Voloshynovskiy, "Printing variability of copy detection patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • B. Razeghi, S. Rezaeifar, S. Ferdowsi, T. Holotyak, and S. Voloshynovskiy, "Compressed Data Sharing based on Information Bottleneck Model," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. [pdf|bib]
  • I. Shiri, E. Showkatian, R. Mohammadi, B. Razeghi, S. Bagheri, G. Hajianfar, Y. Salimi, M. Amini, M. Ghelich Oghli, S. Ferdowsi, S. Voloshynovskiy, and H. Zaidi, "Collaborative Multi-Institutional Prostate Lesion Segmentation from MR images Using Deep Federated Learning Framework," in Proc. IEEE Nuclear Science Symposium, Medical Imaging Conference, 2022. [pdf|bib]
  • I. Shiri, M. Amini, Y. Salimi, A. Sanaat, A. Saberi, B. Razeghi, S. Ferdowsi, A. V. Sadr, S. Voloshynovskiy, D. Gündüz, A. Rahmim, and H. Zaidi, "Multi-Institutional PET/CT Image Segmentation Using a Decentralized Federated Deep Transformer Learning Algorithm," Journal of Nuclear Medicine, vol. 63, iss. supplement 2, pp. 3348-3348, 2022. [link|bib]
  • B. Pulfer, Y. Belousov, J. Tutt, R. Chaban, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Anomaly localization for copy detection patterns through print estimation," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, "Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • Y. Belousov, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Digital twins of physical printing-imaging channel," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • V. Kinakh, S. Voloshynovskiy, and O. Taran, "ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets," in Proc. 2nd Visual Inductive Priors for Data-Efficient Deep Learning Workshop, 2021. [pdf|bib]
  • A. A. Atashin, B. Razeghi, D. Gündüz, and S. Voloshynovskiy, "Variational Leakage: The Role of Information Complexity in Privacy Leakage," in Proc. Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021, pp. 91-96. [pdf|bib]
  • R. Chaban, O. Taran, J. Tutt, T. Holotyak, S. Bonev, and S. Voloshynovskiy, "Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, 2021. [pdf|bib]
  • B. Razeghi, S. Ferdowsi, D. Kostadinov, F. P. Calmon, and S. Voloshynovskiy, "Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, Ontario, Canada, 2021. [pdf|bib]
  • O. Taran, J. Tutt, T. Holotyak, R. Chaban, S. Bonev, and S. Voloshynovskiy, "Mobile authentication of copy detection patterns: how critical is to know fakes?," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, 2021. [pdf|bib]
  • G. Quétant, M. Drozdova, V. Kinakh, T. Golling, and S. Voloshynovskiy, "Turbo-Sim: a generalised generative model with a physical latent space." 2021. [pdf|bib]
  • S. Klein, J. A. Raine, S. Pina-Otey, S. Voloshynovskiy, and T. Golling, "Funnels: Exact maximum likelihood with dimensionality reduction." 2021. [pdf|bib]
  • V. Kinakh, M. Drozdova, G. Quétant, T. Golling, and S. Voloshynovskiy, "Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN," in Proc. Bayesian Deep Learning NeurIPS workshop, 2021. [pdf|bib]
  • S. Ferdowsi, B. Razeghi, T. Holotyak, F. P. Calmon, and S. Voloshynovskiy, "Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020. [pdf|bib]
  • O. Taran, S. Bonev, T. Holotyak, and S. Voloshynovskiy, "Adversarial detection of counterfeited printable graphical codes: towards "adversarial games" in physical world," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020. [pdf|bib]
  • S. Rezaeifar, M. Diephuis, B. Razeghi, O. Taran, D. Ullmann, and S. Voloshynovskiy, "Distributed Semi-Private Image Classification Based on Information-Bottleneck Principle," in Proc. 28th European Signal Processing Conference (EUSIPCO), Amsterdam, Netherlands, 2020. [pdf|bib]
  • O. Taran, S. Rezaeifar, T. Holotyak, and S. Voloshynovskiy, "Machine learning through cryptographic glasses: combating adversarial attacks by key based diversified aggregation," in Proc. EURASIP Journal on Information Security, 2020. [link|bib]
  • D. Ullmann, S. Rezaeifar, O. Taran, T. Holotyak, B. Panos, and S. Voloshynovskiy, "Information Bottleneck Classification in Extremely Distributed Systems," in Proc. Information-Theoretic Methods for Deep Learning Based Data Acquisition, Analysis and Security, 2020. [link|bib]
  • B. Razeghi, F. P. Calmon, D. Gündüz, and S. Voloshynovskiy, "On Perfect Obfuscation: Local Information Geometry Analysis," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), New York, US, 2020. [pdf|bib]
  • S. Voloshynovskiy, O. Taran, M. Kondah, T. Holotyak, and D. Rezende, "Variational Information Bottleneck for Semi-Supervised Classification," in Proc. Entropy Journal special issue "Information Bottleneck: Theory and Applications in Deep Learning", 2020. [link|bib]
  • M. Gheisari, T. Furon, L. Amsaleg, B. Razeghi, and S. Voloshynovskiy, "Aggregation and Embedding for Group Membership Verification," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019. [pdf|bib]
  • O. Taran, S. Bonev, and S. Voloshynovskiy, "Clonability of anti-counterfeiting printable graphical codes: a machine learning approach," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019. [pdf|bib]
  • D. Kostadinov, B. Razeghi, S. Rezaeifar, and S. Voloshynovskiy, "Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features," in Proc. 53rd Annual Conference on Information Systems & Sciencese (CISS), Maryland, USA, 2019. [pdf|bib]
  • O. Taran, S. Rezaeifar, T. Holotyak, and S. Voloshynovskiy, "Robustification of deep net classifiers by key based diversified aggregation with pre-filtering," in Proc. IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, 2019. [pdf|bib]
  • B. Razeghi, T. Stanko, B. Škoric´, and S. Voloshynovskiy, "Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Delft, Netherlands, 2019. [pdf|bib]
  • O. Taran, S. Rezaeifar, T. Holotyak, and S. Voloshynovskiy, "Defending against adversarial attacks by randomized diversification," in Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, USA, 2019. [pdf|bib]
  • S. Voloshynovskiy, M. Kondah, S. Rezaeifar, O. Taran, T. Hotolyak, and D. J. Rezende, "Information bottleneck through variational glasses," in Proc. NeurIPS Workshop on Bayesian Deep Learning, Vancouver, Canada, 2019. [pdf|bib]
  • S. Rezaeifar, B. Razeghi, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Reconstruction of privacy-sensitive data from protected templates," in Proc. IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, 2019. [pdf|bib]
  • O. Taran, S. Rezaeifar, and S. Voloshynovskiy, "Bridging machine learning and cryptography in defence against adversarial attacks," in Proc. Workshop on Objectionable Content and Misinformation (WOCM), ECCV2018, Munich, Germany, 2018. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Vector compression for similarity search using multi-layer Sparse Ternary Codes," in Proc. 2018 IEEE Data Science Workshop (DSW2018), Lausanne, Switzerland, 2018. [pdf|bib]
  • B. Razeghi and S. Voloshynovskiy, "Privacy-Preserving Outsourced Media Search Using Secure Sparse Ternary Codes," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, Alberta, Canada, 2018. [pdf|bib]
  • B. Razeghi, S. Voloshynovskiy, S. Ferdowsi, and D. Kostadinov, "Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • S. Rezaeifar, O. Taran, and S. Voloshynovskiy, "Classification by Re-generation: Towards Classification Based on Variational Inference," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • M. Ferrari, O. Taran, T. Holotyak, K. Egiazarian, and S. Voloshynovskiy, "Injecting Image Priors into Learnable Compressive Subsampling," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • D. Kostadinov, B. Razeghi, S.Voloshynovskiy, and S.Ferdowsi, "Learning Discrimination Specific, Self-Collaborative and Nonlinear Model," in Proc. IEEE Internacial Conference on Big Knowlage (ICBK), Singapore, 2018. [pdf|bib]
  • S. Bonev and S. Voloshynovskiy, "Secure printing for labels and packaging using industrial digital printers: authentication of printed matrix codes with smartphone cameras," in Proc. 45th Iarigai Conference Advances in Printing and Media Technology: From Printing to Manufacturing, Warsaw, Poland, 2018. [pdf|bib]
  • J. Ramapuram, M. Diephuis, R. Webb, and A. Kalousis, "Variational Saccading: Efficient Inference for Large Resolution Images," in Proc. Neural Information Processing Systems (NeurIPS), Bayesian Deep Learning workshop, Montreal, Canada, 2018. [pdf|bib]
  • D. Kostadinov, S.Voloshynovskiy, and S.Ferdowsi, "Learning Overcomplete and Sparsifying Transform with Approximate and Exact Closed Form Solutions," in Proc. 7-th European Workshop on Visual Information Processing (Best Student Paper Award), Tampere, Finland, 2018. [pdf|bib]
  • D. Kostadinov, S.Voloshynovskiy, and S.Ferdowsi, "Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • D. Ullmann, S.Voloshynovskiy, L.Kleint, S.Krucker, M.Melchior, C.Huwyler, and B.Panos, "DCT-Tensor-Net for solar flares detection on IRIS data," in Proc. in Proc. 7-th European Workshop on Visual Information Processing (EUVIP), Tampere, Finland, 2018. [pdf|bib]
  • C. Thomas, D. C. A, V. Sviatoslav, and W. J, "Replication of the principal component analyses of the human genome diversity panel [version 1; referees: awaiting peer review]," F1000Research, vol. 6, iss. 278, 2017. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, and T. Holotyak, "Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes," in Proc. 2017 IEEE International Symposium on Information Theory (ISIT) (ISIT'2017), Aachen, Germany, 2017. [pdf|bib]
  • S. Ferdowsi, S. Volshinovsky, and D. Kostadinov, "Regularized Residual Quantization: a multi-layer sparse dictionary learning approach," in Proc. Signal Processing with Adaptive Sparse Structured Representations (SPARS), Lisbon, Portugal, 2017. [pdf|bib]
  • O. Taran, S. Rezaeifar, O. Dabrowski, J. Schlechten, T. Holotyak, and S. Voloshynovskiy, "PharmaPack: mobile fine-grained recognition of pharma packages," in Proc. European Signal Processing Conference (EUSIPCO), Kos, Grece, 2017. [pdf|bib]
  • D. Kostadinov, S. Volshinovsky, and S. Ferdowsi, "Joint Learning of Local Fingerprint and Content Modulation," in Proc. EUSIPCO, Kos, Grece, 2017. [pdf|bib]
  • D. Kostadinov, S. Volshinovsky, and S. Ferdowsi, "Learning non-structured, overcomplete and sparsifying transform," in Proc. Signal Processing with Adaptive Sparse Structured Representations (SPARS), Lisbon, Portugal, 2017. [pdf|bib]
  • B. Razeghi, S. Voloshynovskiy, D. Kostadinov, and O. Taran, "Privacy Preserving Identification Using Sparse Approximation with Ambiguization," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Rennes, France, 2017, pp. 1-6. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "A multi-layer image representation using Regularized Residual Quantization: application to compression and denoising," in Proc. ICIP, Beijing, China, 2017. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Local active content fingerprinting: optimal solution under linear modulation," in Proc. ICIP, Phoenix, USA, 2016. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, S. Ferdowsi, and T. Holotyak, "On local active content fingerprinting: solutions for general linear feature maps," in Proc. ICPR, Cancun, Mexico, 2016. [pdf|bib]
  • S. Voloshynovskiy, P. Bas, and T. Holotyak, "Physical object authentication: detection-theoretic comparison of natural and artificial randomness," in Proc. Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on, Shanghai, China, 2016. [pdf|bib]
  • T. H. S. Thomas Dewaele Maurits Diephuis, "Forensic authentication of banknotes on mobile phones," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2016. [pdf|bib]
  • T. Charlon, M. Martínez-Bueno, L. Bossini-Castillo, D. F. Carmona, A. Di Cara, J. Wojcik, S. Voloshynovskiy, J. Martín, and M. E. Alarcón-Riquelme, "Single Nucleotide Polymorphism Clustering in Systemic Autoimmune Diseases," PloS one, vol. 11, iss. 8, 2016. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, and T. Holotyak, "Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes," in Proc. Information Forensics and Security (WIFS), 2016 IEEE International Workshop on, 2016, pp. 1-6. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Privacy preserving multimedia content identification for cloud based bag-of-feature architectures," in Proc. Workshop on Cloud Based Media in conjunction with the 2015 IEEE International Conference on Multimedia and Expo (ICME 2015), Torino, Italy, 2015. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Soft content fingerprinting with bit polarization based on sign-magnitude decomposition," Information Forensics and Security, IEEE Transactions on, vol. PP, iss. 99, pp. 1-1, 2015. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and T. Holotyak, "Sketchprint: Physical object micro-structure identification using mobile phones," in Proc. European Signal Processing Conference (EUSIPCO), Nice, France, 2015. [bib]
  • M. Diephuis, S. Voloshynovskiy, and T. Holotyak, "Fine-grained recognition of physical objects on mobile phones: from categorization to identification," in Proc. The Third Workshop on Fine-Grained Visual Categorization (FGVC^3) in conjunction with the CVPR2015 conference, Boston, United-States, 2015. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2015. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, S. Ferdowsi, M. Diephuis, and R. Scherer, "Supervised Transform Learning for Face Recognition," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L. A., and Zurada, J. M., Eds., Springer International Publishing, 2015, vol. 9119, pp. 737-746. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, M. Korytkowski, and R. Scherer, "Secure Representation of Images Using Multi-layer Compression," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L. A., and Zurada, J. M., Eds., Springer International Publishing, 2015, vol. 9119, pp. 696-705. [pdf|bib]
  • F. Farhadzadeh, F. Willems, and S.Voloshynovskiy, "Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Rome, Italy, 2015. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Sparse Multi-layer Image Approximation: Facial Image Compression," ArXiv e-prints, 2015. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, and S. Ferdowsi, "Vector quantization with constrained likelihood for face recognition," in Proc. European Signal Processing Conference (EUSIPCO), Nice, France, 2015. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, S. Ferdowsi, M. Diephuis, and R. Scherer, "Robust Face Recognition by Group Sparse Representation That Uses Samples from List of Subjects," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., and Zurada, J., Eds., Springer International Publishing, 2014, vol. 8468, pp. 616-626. [link|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Performance analysis of bag-of-features based content identification systems," in Proc. Proceedings of 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Content identification: binary content fingerprinting versus binary content encoding," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, and S. Ferdowsi, "Robust human face recognition based on locality preserving sparse over complete block approximation," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, D. Kostadinov, F. Farhadzadeh, and T. Holotyak, "On accuracy, robustness and security of bag-of-word search systems," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • S. Ferdowsi and S. Voloshynovskiy, "Content identification: machine learning meets coding," in Proc. 35th WIC Symposium on Information Theory in the Benelux, Enschede, the Netherlands, 2014, pp. 113-120. [pdf|bib]
  • M. Diephuis, F. Beekhof, S. Voloshynovskiy, T. Holotyak, N. Standardo, and B. Keel, "A framework for fast and secure packaging identification on mobile phones," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, and M. Diephuis, "Visual information encoding for face recognition: sparse coding vs vector quantization," in Proc. Symposium on Information Theory in the Benelux, 4th Joint WIC IEEE Symposium on Information Theory and Signal Processing in the Benelux, Eindhoven, Netherlands, 2014. [pdf|bib]
  • F. Farhadzadeh and S. Voloshynovskiy, "Active Content Fingerpriting," Information Forensics and Security, IEEE Transactions on, vol. 9, iss. 6, pp. 905-920, 2014. [pdf|bib]
  • J. Rygal, J. Romanowski, R. Scherer, and S. Ferdowsi, "Novel Algorithm for Translation from Image Content to Semantic Form," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {I}, 2014, pp. 783-792. [pdf|bib]
  • F. Farhadzadeh, F. Willems, and S. Voloshynovskiy, "Information theoretical analysis of identification based on active content fingerprinting," in Proc. 35th WIC Symposium on Information Theory in the Benelux, Enschede, the Netherlands, 2014, pp. 134-139. [pdf|bib]
  • T. Nowak, P. Najgebauer, J. Romanowski, M. Gabryel, M. Korytkowski, R. Scherer, and D. Kostadinov, "Spatial Keypoint Representation for Visual Object Retrieval," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {II}, 2014, pp. 639-650. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, M. Gabryel, and M. Korytkowski, "Multi-class Classification: {A} Coding Based Space Partitioning," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {II}, 2014, pp. 593-604. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Active content fingerprinting: Shrinkage and lattice based modulations," in Proc. Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, 2013, pp. 3073-3077. [bib]
  • F. Farhadzadeh, F. M. J. Willems, and S. Voloshynovskiy, "Fundamental Limits of Identification: Identification rate, search and memory complexity trade--off," in Proc. IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 2013. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and F. Beekhof, "Physical object identification based on FAMOS microstructure fingerprinting: comparison of templates versus invariant features," in Proc. 8th International Symposium on Image and Signal Processing and Analysis, Trieste, Italy, 2013. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, F. Beekhof, and F. Farhadzadeh, "Physical object authentication with correlated camera noise.," in Proc. 15. GI-Fachtagung Datenbanksysteme für Business, Technologie und Web(BTW), Magdeburg, Germany, 2013. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, F. Beekhof, O. Koval, and B. Keel, "Towards Reproducible results in authentication based on physical non-cloneable functions: The Forensic Authentication Microstructure Optical Set (FAMOS)," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Robust Message-Privacy Preserving Image Copy Detection for Cloud-based Systems," in Proc. CBMI 2012,10th Workshop on Content-Based Multimedia Indexing, 2012. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. J. Koval, "Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding," IEEE Transactions on Information Forensics and Security, vol. 7, iss. 5, pp. 1652-1667, 2012. [pdf|bib]
  • S.Voloshynovskiy, F. Farhadzadeh, O. Koval, and T. Holotyak, "Active content fingerprinting: a marriage of digital watermarking and content fingerprinting," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, and F. Farhadzadeh, "Content Authentication and Identification under Informed Attacks," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • S.Voloshynovskiy, T. Holotyak, O. Koval, and F. Farhadzadeh, "Physical-layer Security based on Gaussian Wiretap Channel with Collaborative Wiretappers," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, F. Farhadzadeh, O. Koval, and F. Beekhof, "Fast physical object identification based on unclonable features and soft fingerprinting," in Proc. International Conference on Acoustics, Speech and Signal Processing ICASSP2011, Prague, Czech Republic, 2011. [pdf|bib]
  • A. Harutyunyan, N. Grigoryan, S. Voloshynovskiy, and O. Koval, "A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects," in Proc. Biometrie - BIOSIG2011 CAST workshop, Darmstadt, Germany, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Information-theoretic analysis of desynchronization invariant object identification," in Proc. International Conference on Acoustics, Speech and Signal Processing ICASSP2011, Prague, Czech Republic, 2011. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Trading-off privacy-complexity of identification problem," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Farhadzadeh, T. Holotyak, and F. Beekhof, "Geometrically robust perceptual fingerprinting: an asymmetric case," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, O. Koval, F. Beekhof, and F. Farhadzadeh, "Private content identification based on soft fingerprinting," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Statistical Analysis of Binarized SIFT Descriptors," in Proc. 7th International Symposium on Image and Signal Processing and Analysis, 2011. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Theoretic Multiclass Classification Based on Binary Classifiers," Signal Processing Systems, vol. 65, pp. 413-430, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, O. Koval, T. Holotyak, and F. Beekhof, "Statistical analysis of digital image fingerprinting based on random projections," in Proc. Image and Signal Processing and Analysis (ISPA), 2011 7th International Symposium, Dubrovnik, Croatia, 2011. [pdf|bib]
  • V. Balakirsky, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Information Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting," in Proc. CSIT 2011, Yerevan, Armenia, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Information-theoretic analysis of content based identification for correlated data," in Proc. IEEE Information Theory Workshop (ITW), Paraty, Brazil, 2011, pp. 205-209. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, O. Koval, F. Beekhof, and F. Farhadzadeh, "Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and F. Farhadzadeh, "Identification In Desynchronization Channels," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • N. Grigoryan, A. Harutyunyan, S. Voloshynovskiy, and O. Koval, "On Multiple Hypothesis Testing with Rejection Option," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Content-Identification: towards Capacity Based on Bounded Distance Decoder," in Proc. Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "On Accuracy, Privacy and Complexity in the Identification Problem," in Proc. Proceedings of SPIE / Multimedia Content Access: Algorithms and Systems IV, San Jose, USA, 2010. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, F. Beekhof, and O. Koval, "Fast identification of highly distorted images," in Proc. Proceedings of SPIE / Media Forensics and Security XII, San Jose, USA, 2010. [pdf|bib]
  • O. Koval and S. Voloshynovskiy, "Multimodal object authentication with random projections: a worst-case approach," in Proc. Proceedings of SPIE / Media Forensics and Security XII, San Jose, USA, 2010-1-21-24 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Performance Analysis of Identification System Based on Order Statistics List Decoder," in Proc. IEEE International Symposium on Information Theory, Austin, TX, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Content Identification Based on digital fingerprint: what can be done if ML decoding fails?," in Proc. IEEE International Workshop on Multimedia Signal Processing, Saint-Malo, France, 2010. [bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Privacy Preserving Identification: Order Statistics List Decoding Perspective," in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, T. Holotyak, F. Beekhof, and F. Farhadzadeh, "Privacy amplification of content identification based on fingerprint bit reliability," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Seattle, The USA, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, F. Farhadzadeh, and T. Holotyak, "Information-Theoretical Analysis of Private Content Identification," in Proc. IEEE Information Theory Workshop, ITW2010, Dublin, Ireland, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. Vila-Forcén, and P. Comesana-Alfaro, "Partially reversible data hiding with pure message communications over state-dependent channels," Signal Processing, 2009. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Multi-class Classifiers based on Binary Classifiers: Performance, Efficiency, and Minimum Coding Matrix Distances," in Proc. Proceedings of the IEEE International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Grenoble, France, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Conception and limits of robust perceptual hashing: toward side information assisted hash functions," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Random projections based item authentication," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, P. Bas, and F. Cayre, "On security threats for robust perceptual hashing," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Perez-Gonzalez, and M. K. Mihcak, "Informed data-hiding with partial side information at the decoder," submitted to Signal Processing, 2009. [pdf|bib]
  • S. Voloshynovskiy, F. Beekhof, O. Koval, and T. Holotyak, "On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption," in Proc. Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain, Lausanne, Switzerland, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Multi-class Classifiers based on Binary Classifiers: On Coding Matrix Design, Reliability and Maximum Number of Classes," in Proc. Proceedings of the IEEE International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Grenoble, France, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, Secure item identification and authentication system based on unclonable features, 2009. [bib]
  • S. Voloshynovskiy, O. Koval, T. Holotyak, and F. Beekhof, "Privacy enhancement of common randomness based authentication: key rate maximized case," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, London, UK, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Binary Robust Hashing based on Probabilistic Bit Reliability," in Proc. Proceedings of the Workshop on Statistical Signal Processing, Cardiff, UK, 2009. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Fast identification algorithms for forensic applications," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, London, UK, 2009. [pdf|bib]
  • T. Schürmann, Doppel-Herz: Parallelprogrammierung in C++ mit der OMPTL, 2008. [link| link|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Privacy-Preserving Biometric Person Identification," in Proc. Proceedings of the 16th European Signal Processing Conference, Lausanne, Switzerland, 2008. [pdf|bib]
  • R. Vill√°n Sebasti√°n, "Authentication of electronic and printed text documents," PhD Thesis , 2008. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Privacy-Preserving Multimodal Person and Object Identification," in Proc. Proceedings of the 10th ACM Workshop on Multimedia \& Security, Oxford, UK, 2008. [ps|bib]
  • M. Haroutunian, S. Tonoyan, O. Koval, and S. Voloshynovskiy, "On reversible information hiding system," in Proc. Proceedings of the IEEE International Symposium on Information Theory, Toronto, Ontario, Canada, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Multimodal authentication based on random projections and distributed coding," in Proc. Proceedings of the 10th ACM Workshop on Multimedia \& Security, Oxford, UK, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Unclonable identification and authentication based on reference list decoding," in Proc. Proceedings of the conference on Secure Component and System Identification, Berlin, Germany, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, R. Villán, F. Beekhof, and T. Pun, "Authentication of Biometric Identification Documents via Mobile Devices," Journal of Electronic Imaging, 2008. [pdf|bib]
  • F. Beekhof, O. Koval, R. Villán, S. Voloshynovskiy, and E. Topak, "Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures," in Proc. Proceedings of eForensics, 2008. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Beekhof, and T. Pun, "Security Analysis of Robust Perceptual Hashing," in Proc. Steganography, and Watermarking of Multimedia Contents X, (SPIE, Bellingham, WA 2008) 681906, 2008. [ps| link|bib]
  • I. Sarikaya, Les codes √ barres multi-niveaux √ deux dimensions, 2007. [bib]
  • J. Kronegg, G. Chanel, S. Voloshynovskiy, and T. Pun, "EEG-based synchronized brain-computer interfaces: a model for optimizing the number of mental tasks," IEEE transactions on neural systems and rehabilitation engineering, vol. 15, iss. 1, 2007. [bib]
  • E. Topak, "Information-theoretic performance and security analysis of geometrically structured data-hiding codes," PhD Thesis , 2007. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Error exponent analysis of person identification based on fusion of dependent/independent modalities," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007. [pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007. [pdf| ps.gz| pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Robust perceptual hashing as classification problem: decision-theoretic and practical considerations," in Proc. Proceedings of the IEEE 2007 International Workshop on Multimedia Signal Processing, Chania, Crete, Greece, 2007. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Quality Enhancement of printed-and-scanned Images using distributed coding," Signal Processing, vol. 87, iss. 6, pp. 1301-1313, 2007. [pdf|bib]
  • J. -M. Pignat, O. Koval, S. Voloshynovskiy, and T. Pun, "From non-stationary Gaussian modelling to independent component analysis: an fMRI study," in Proc. Lemanic-Neuroscience Annual Meeting, Les Diablerets, Switzerland, 2007. [bib]
  • O. Koval, S. Voloshynovskiy, F. Beekhof, and T. Pun, "Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms," in Proc. WaCha2007, /Third WAVILA Challenge/, Saint Malo, France, 2007. [pdf|bib]
  • T. Schneider, Syst√®me de protection des marques bas√© sur l'identification d'un signal audio, 2007. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Analysis of multimodal binary detection systems based on dependent/independent modalities," in Proc. Proceedings of the IEEE 2007 International Workshop on Multimedia Signal Processing, Chania, Crete, Greece, 2007. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and M. and Lozynska, "Novel interactive services for e-tourism and e-commerce," in Proc. Proceedings of International Conference on, Montreux, Switzerland, 2006. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Laplacian channel state estimation for state dependent channels," in Proc. Proceedings of 27-th Symposium on information theory in the Benelux, Noordwijk, The Netherlands, 2006. [pdf|bib]
  • J. Kronegg, G. Chanel, S. Voloshynovskiy, and T. Pun, Information-transfer rate based performance optimization for brain-computer interfacesHeraklion, Greece: , 2006. [bib]
  • O. Koval, S. Voloshynovskiy, T. Holotyak, and T. Pun, "Information-theoretic analysis of steganalysis in real images," in Proc. ACM Multimedia and Security Workshop 2006, Geneva, Switzerland, 2006. [ps|bib]
  • O. Koval, S. Voloshynovskiy, J. E. Vila-Forcén, F. Pérez-González, F. Deguillaume, and T. Pun, "Robustness Improvement of Known-Host-State Watermarking Using Host Statistics," Elsevier Science, Signal Processing, vol. 86, iss. 5, pp. 1076-1088, 2006. [pdf|bib]
  • Y. Rytsar, S. Voloshynovskiy, O. Koval, F. Deguillaume, E. Topak, S. Startchik, and T. Pun, "Tangible interactive system for document browsing and visualisation of multimedia data," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122), San Jose, USA, 2006. [bib]
  • L. Pérez-Freire, F. Pérez-González, and S. Voloshynovskiy, "An Accurate Analysis of Scalar Quantization-Based Data Hiding," IEEE Transactions on Information Forensics and Security, vol. 1, iss. 1, pp. 80-86, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, K. M. Mihcak, and T. Pun, "The Edge Process Model and Its Application to Information Hiding Capacity Analysis," IEEE Trans. on Signal Processing, vol. 54, iss. 5, pp. 1813-1825, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, BRANDS PROTECTION AND PRODUCT AUTHENTICATION USING PORTABLE DEVICES, 2006. [bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, V. J. E. Forcen, and T. Pun, "On reversibility of random binning based data-hiding techniques: security perspectives," in Proc. ACM Multimedia and Security Workshop 2006, Geneva, Switzerland, 2006. [ps|bib]
  • S. Voloshynovskiy, O. Koval, R. Villán, E. Topak, J. E. Vila-Forcén, F. Deguillaume, Y. Rytsar, and T. Pun, "Information-Theoretic Analysis of Electronic and Printed Document Authentication," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, USA, 2006. [pdf| pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, and T. Pun, "Message Communications And Channel State Estimation For State Dependent Channels," in Proc. Proceedings of 27-th Symposium on information theory in the Benelux, Noordwijk, The Netherlands, 2006. [pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, J. E. Vila-Forcén, E. Topak, F. Deguillaume, Y. Rytsar, and T. Pun, "Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, USA, 2006. [pdf| ps.gz| pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, "Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management," IEEE Transactions on Information Forensics and Security, vol. 1, iss. 4, pp. 405-420, 2006. [pdf| ps.gz|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, M. E. Haroutunian, J. E. Vila-Forcén, and T. Pun, "E-capacity analysis of data-hiding channels with geometrical attacks," in Proc. Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [ps|bib]
  • O. Koval, S. Voloshinovskiy, and T. Pun, "Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: Summary of main results," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 06.12, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Facial Image Compression Based on Structured Codebooks in Overcomplete Domain," {EURASIP} Journal on Applied Signal Processing, Frames and overcomplete representations in signal processing, communications, and information theory special issue, vol. 2006, iss. Article {ID} 69042, pp. 1-11, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Costa problem under channel ambiguity," in Proc. Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Toulouse, France, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, E. Topak, and T. Pun, "Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Performance analysis of non-uniform quantization-based data-hiding," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [pdf|bib]
  • T. Pun, T. I. Alecu, G. Chanel, and S. Voloshynovskiy, "Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva," IEEE transactions on neural systems and rehabilitation engineering, Special Issue on Brain-Computer Interaction, vol. 14, iss. 2, 2006. [bib]
  • J. E. Vila-Forcén, O. Koval, S. Voloshynovskiy, and T. Pun, "Asymmetric side information and non-noticable Costa data-hiding," in Proc. Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents, San Jose, CA, USA, 2006. [bib]
  • J. Vila Forcen, "Digital data-hiding based identification systems," PhD Thesis , 2006. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "The Gaussian Transform of distributions: definition, computation and application," IEEE Transactions on Signal Processing, vol. 54, pp. 2976-2985, 2006. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Host communications for non-Gaussian state-dependent channels: Laplacian case," in Proc. Proceedings of International Conference on Multimedia and Expo, Toronto, Canada, 2006. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, Turkey, 2005. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, J. E. Vila-Forcén, and T. Pun, "On Security of Geometrically-Robust Data-Hiding," in Proc. WIAMIS 2005, 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland, 2005. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, K. M. Mihcak, and T. Pun, "Towards geometrically robust data-hiding with structured codebooks," {ACM} Multimedia Systems Journal, Special Issue on Multimedia and Security, vol. 11, iss. 2, pp. 121-132, 2005. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Asymmetric spread spectrum data-hiding for Laplacian host data," in Proc. {IEEE} International Conference on Image Processing, Genova, Italy, 2005. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, M. K. Mihcak, and T. Pun, "Security analysis of robust data hiding with geometrically structured codebooks," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, USA, 2005. [pdf| ps| pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-González, and T. Pun, "Worst case additive attack against quantization-based data-hiding methods," in Proc. Proceedings of {SPIE} Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents {VII (EI120)}, San Jose, USA, 2005. [pdf| pdf|bib]
  • J. -M. Pignat, S. Voloshynovskiy, O. Koval, V. Ibanez, and T. Pun, "Non-stationary Gaussian spatio-temporal modeling of fMRI data," in Proc. Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET, June 7-11, 2005, Vrije Universiteit Amsterdam, The Netherlands, 2005. [bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 05.01, 2005. [bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva," in Proc. BCI 2005, Brain-Computer Interface Technology: Third International Meeting, Rensselaerville, NY, USA, 2005. [bib]
  • Y. Rytsar, F. Deguillaume, S. Voloshynovskiy, E. Rivera, and T. Pun, "Text document data-hiding: security and multimedia perspectives," in Proc. 5th International Conference on Computer Science and Information Technologies {CSIT 2005}, Yerevan, Armenia, 2005. [bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva," Technical report TR0501, Computer Science Department, University of Geneva, 05.01, 2005. [bib]
  • R. Villán, S. Voloshynovskiy, F. Deguillaume, Y. Rytsar, O. Koval, E. Topak, E. Rivera, and T. Pun, "A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents," in Proc. Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 280-281. [pdf| ps.gz| pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, F. Pérez-Gonález, O. Koval, and T. Pun, "Quantization-Based Methods: Additive Attacks Performance Analysis," IEEE Transactions on Signal Processing, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. E. Vila-Forcén, P. Comesaña, and T. Pun, "On reversibility of random binning techniques," in Proc. Proceedings of 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 108-118. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Image denoising based on the edge-process model," Signal Processing, vol. 85, iss. 10, pp. 1950-1969, 2005. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Pérez-González, K. M. Mihcak, J. E. Vila-Forcén, and T. Pun, "Data-hiding with partially available side information," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, 2005. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. E. Vila-Forcén, P. Comesana, and T. Pun, "On reversibility of random binning techniques: multimedia perspectives," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg, Austria, 2005. [pdf| ps|bib]
  • S. Voloshynovskiy, Y. Rytsar, O. Koval, and T. Pun, "Document interactive navigation in multimodal databases," in Proc. SIMILAR NOE Workshop, Paris, France, 2005. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups," in Proc. Proceedings of European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Multimedia Security: open problems and solutions," in Proc. In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program, Nork, Yerevan, Armenia, 1-12 October, 2005, Yerevan, Armenia, 2005. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Denoising with infinite mixture of Gaussians," in Proc. Eusipco 2005, 13th. European Signal Processing Conference, Sept. 4-8, Antalya, Turkey, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, F. Perez-Gonzales, M. K. Michak, J. E. Vila-Forcén, and T. Pun, "Data-hiding with asymmetrically available side information at encoder and decoder," in Proc. Proceedings of European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, "Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, USA, 2005, pp. 453-464. [pdf| ps.gz| pdf|bib]
  • O. Koval, "Stochastic image modeling in data hiding applications," PhD Thesis , 2005. [bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Information-theoretic data-hiding: Recent achievements and open problems," International Journal of Image and Graphics, vol. 5, iss. 1, pp. 1-31, 2005. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-Gonález, and T. Pun, "Practical Data-Hiding: Additive Attacks Performance Analysis," in Proc. International Workshop on Digital Watermarking, Siena, Italy, 2005, pp. 244-259. [pdf|bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Information-transfer rate modeling of EEG-based synchronized brain-computer interfaces," University of Geneva, Computer Vision and Multimedia Laboratory, Computing Centre, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 05.03, 2005. [pdf|bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Analysis of bit-rate definitions for Brain-Computer Interfaces," in Proc. Proceedings of the 2005 Int. Conf. on Human-computer Interaction {(HCI'05)}, Las Vegas, Nevada, USA, 2005. [pdf|bib]
  • T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg, Austria, 2005. [bib]
  • O. Koval, S. Voloshynovskiy, F. Deguillaume, F. Perez-Gonzalez, and T. Pun, "Robustness improvement of known-host-state watermarking using host statistics," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, USA, 2005. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "The Gaussian transform," in Proc. 13th. European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Denoising with infinite mixture of Gaussians," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, Turkey, 2005. [pdf|bib]
  • J. Kronegg, T. Alecu, G. Chanel, S. Voloshynovskiy, and T. Pun, "Analyse des mesures de débit pour interfaces cerveau-ordinateur," in Proc. TAIMA'2005, Traitement et Analyse de l'Information : Méthodes et Applications, Hammamet, Tunisia, 2005. [bib]
  • F. Deguillaume, Y. Rytsar, S. Voloshynovskiy, and T. Pun, "Data-hiding based text document security and automatic processing," in Proc. IEEE International Conference on Multimedia \& Expo (ICME) 2005, Amsterdam, The Netherlands, 2005. [bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Regularized two-step brain activity reconstruction from spatio-temporal EEG data," in Proc. Image Reconstruction from Incomplete Data III, SPIE International Symposium on Optical Science and Technology, Denver, Colorado, USA, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Visual communications with side information via distributed printing channels: extended multimedia and security perspectives," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications, San Jose, USA, 2004. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system: lower bounds and optimality," in Proc. EUSIPCO 2004, 12th European Signal Processing Conference, Vienna, Austria, 2004. [pdf|bib]
  • L. Perez-Freire, F. Perez-Gonzalez, and S. Voloshynovskiy, "Revealing the true achievable rates of scalar Costa scheme," in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Capacity analysis of periodical watermarking," in Proc. EUSIPCO-2004, 12th European Signal Processing Conference, Vienna, Austria, 2004. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "EEG Cortical Imaging: A Vector Field Approach For Laplacian Denoising And Missing Data Estimation," in Proc. IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'04), Arlington, VA, 2004. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Deguillaume, F. Perez-gonzalez, and T. Pun, "Spread spectrum watermarking for real images: is everything so hopeless?," in Proc. Proceedings of 12th European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria, 2004. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Perez-gonzalez, and T. Pun, "Worst Case Additive Attack against Quantization-Based Watermarking Techniques," in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [pdf|bib]
  • J. E. Vila-Forcén, O. Koval, and S. Voloshynovskiy, "Distributed single source coding with side information," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing, San Jose, USA, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Pérez-González, K. Mihcak, and T. Pun, "Data-hiding with host state at the encoder and partial side information at the decoder," , 2004. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Distributed single source coding framework for passport photo images," in Proc. Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms, Martigny, Switzerland, 2004. [bib]
  • J. -M. Pignat, S. Voloshynovskiy, O. Koval, V. Ibanez, and T. Pun, "Non-stationary Gaussian spatio-temporal modeling of fMRI data," in Proc. First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program, Les Diablerets, Switzerland, 2004. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Joint compression of independent modalities in smart meeting rooms applications," in Proc. SIMILAR NOE Workshop, Lausanne, Switzerland, 2004. [bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Brain-computer interface model: Upper-capacity bound, signal-to-noise ratio estimation, and optimal number of symbols," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 04.03, 2004. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, Character and vector graphics watermark for structured electronic documents security, 2004. [bib]
  • O. Koval, S. Voloshynovskiy, F. Perez-Gonzalez, F. Deguillame, and T. Pun, "Quantization-based watermarking performance improvement using host statistics: AWGN attack case," in Proc. ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, 2004. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Capacity-security analysis of repetitive watermarking," in Proc. Proceedings of European Signal Processing Conference, Vienna, Austria, 2004. [bib]
  • Y. Rytsar, S. Voloshynovskiy, F. Ehrler, and T. Pun, "Interactive segmentation with hidden object based annotations: towards smart media," in Proc. Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, 2004. [pdf|bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system : electrode misplacement sensitivity," in Proc. NCCR (IM)2 Interactive Multimodal Information Management Workshop, MartignyCrans-Montana, Switzerland, October 6-8, 2003, 2003. [bib]
  • S. Voloshynovskiy, T. Pun, J. Fridrich, F. Perez-Gonzales, and N. Memon, "Special issue on Security of Digital Data Hiding Technologies," Signal Processing, vol. 83, iss. 10, 2003. [bib]
  • Y.Rytsar, S.Voloshynovskiy, and T.Pun, "Metadata Representation for Semantic-Based Multimedia Security and Management," in Proc. On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, Catania, Italy, 2003, pp. 769-778. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models," in Proc. SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, 2003. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Wavelet-based image denoising using non-stationary stochastic geometrical image priors," in Proc. SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V, Santa Clara, CA, USA, 2003. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Robust digital watermarking with channel state estimation: part I Approaching theoretical capacity," Signal Processing, 2003. [link| link|bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications," in Proc. 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003, Nis, Yugoslavia, 2003. [ps| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Robust digital watermarking with channel state estimation: part II Applied robust watermarking," Signal Processing, 2003. [link| link|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Low bit rate image compression using a non-stationary geometrical image priors," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • F. Ehrler, Segmentation interactive pour la cr√©ation d'images intelligentes bas√©es sur les informations cach√©es, 2003. [bib]
  • S. Voloshynovskiy, Y. Rytsar, O. Koval, and T. Pun, "Information-theoretic visual communications in human-computer interfaces: Interactive segmentation," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • Y. Rytsar, S. Voloshynovskiy, O. Koval, F. Deguillaume, J. E. Vila-Forcén, and T. Pun, "Smart Media: from basic concepts to applications," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Secure hybrid robust watermarking resistant against tampering and copy-attack," Signal Processing, vol. 83, iss. 10, pp. 2133-2170, 2003. [pdf|bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system: electrode misplacement sensitivity," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • S. Voloshynovskiy, A. Herrigel, Y. Rytsar, and T. Pun, "{StegoWall}: Blind Statistical Detection of Hidden Data," in Proc. Proceedings of {SPIE} Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents {IV}, San Jose, USA, 2002. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Hybrid robust watermarking resistant against copy attack," in Proc. Proceedings of the European Signal Processing Conference {(EUSIPCO2002)}, Toulouse, France, 2002. [pdf|bib]
  • S. Voloshynovskiy and A. Herrigel, Robustness of Watermarks and Intentional Attacks, 2002. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, A method for the estimation and recovering of general affine transform, 2002. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, A method for hybrid robust watermarking and tamper proofing, 2002. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Wavelet-based denoising using stochastic geometrical priors," in Proc. IM2 Interactive Information Management Workshop, Martigny, Switzerland, 2002. [bib]
  • S. Voloshynovskiy, Robust digital watermarking: state-of-the-art and benchmarking, 2002. [bib]
  • S. Voloshynovskiy and T. Pun, "Capacity-security analysis of data hiding technologies," in Proc. Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002), Lausanne, Switzerland, 2002. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking Applications," in Proc. SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, 2002. [ps.gz| pdf|bib]
  • S. Voloshynovskiy and T. Pun, "Stochastic Digital Image Watermarking," in Proc. {IEEE/ISSPA} {ISSPA} 2001, 6th Int. Symposium on Signal Processing and its Applications, Kuala-Lumpur, Malaysia, 2001. [bib]
  • A. Herrigel and S. Voloshynovskiy, "Counterfeit Attacks against a new Currency Protection Scheme," in Proc. Int. Conf. on Communications and Multimedia Security CMS2001, Darmstadt, Germany, 2001. [bib]
  • A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, "The Watermark Template Attack," in Proc. SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack modelling: Towards a second generation benchmark," Signal Processing, vol. 81, iss. 6, pp. 1177-1214, 2001. [ps.gz| pdf|bib]
  • S. Pereira, S. Voloshynovskiy, M. Madueño, S. Marchand-Maillet, and T. Pun, "Second generation benchmarking and application oriented evaluation," in Proc. Information Hiding Workshop, Pittsburgh, PA, USA, 2001. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, S. Pereira, T. Pun, J. Eggers, and J. Su, "Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks," IEEE Communications Magazine (Special Issue on Digital watermarking for copyright protection: a communications perspective), vol. 39, iss. 8, pp. 118-127, 2001. [pdf| ps.gz|bib]
  • I. Prudyus, S. Voloshynovskiy, A. Synyavskyy, T. Holotyak, and L. Lazko, "Generalized radar/radiometry imaging problems," Journal of Telecommunications and Information Technology, vol. 4, pp. 15-20, 2001. [pdf|bib]
  • S. Voloshynovskiy, A. Herrigel, and T. Pun, "Blur/deblur attack against document protection systems based on digital watermarking," in Proc. Information Hiding Workshop, Pittsburgh, PA, USA, 2001. [pdf| ps.gz|bib]
  • A. Synyavskyy, S. Voloshynovskiy, and I. Prudyus, "Wavelet-Based {MAP} Image Denoising Using Provably Better Class of Stochastic I.I.D. Image Models," Facta Universitatis (Nis), vol. 14, 2001. [ps.gz| pdf|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, 2001. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, Method for Digital Watermarking Robust Against Local and Global Geometrical Distortions and Projective Transforms, 2001. [bib]
  • F. Deguillaume, S. Voloshynovskiy, S. Pereira, M. Madueño, and T. Pun, Filigranage D'images Digitales, 2001. [bib]
  • S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, "Optimal adaptive diversity watermarking with channel state estimation," in Proc. SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, "Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical Distortions," in Proc. {IEEE} International Conference on Image Processing, {ICIP2001}, Thessaloniki, Greece, 2001, pp. 999-1002. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun, "Generalized watermark attack based on watermark estimation and perceptual remodulation," in Proc. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, California USA, 2000. [pdf| pdf|bib]
  • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack Modelling: Towards a Second Generation Watermarking Benchmark," Computer Vision Group, Computing Centre, University of Geneva, rue Général Dufour, 24, CH-1211 Genève, Switzerland, 00.05, 2000. [bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Effective channel coding for DCT watermarks," in Proc. IEEE International Conference on Image Processing ICIP 2000, Vancouver, Canada, 2000. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, A. Allen, and Z. Hrytskiv, "Robust edge-preserving image restoration in the presence of non-Gaussian noise," Electronics Letters, 2000. [bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, A method for generating and decoding image dependant watermarks, 2000. [bib]
  • M. Kutter, S. Voloshynovskiy, and A. Herrigel, "Watermark copy attack," in Proc. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, California USA, 2000. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, S. Pereira, A. Herrigel, and T. Pun, Method for adaptive digital watermarking robust against geometric transforms, 2000. [bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, "Content adaptive watermarking based on a stochastic multiresolution image modeling," in Proc. Tenth European Signal Processing Conference (EUSIPCO'2000), Tampere, Finland, 2000. [ps.gz| pdf|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Optimized wavelet domain watermark embedding strategy using linear programming," in Proc. Wavelet Applications VII (part of SPIE AeroSense 2000), Orlando, Florida USA, 2000. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, A. Herrigel, F. Jordan, N. Baumgärtner, and T. Pun, "A noise removal attack for watermarked images," in Proc. Multimedia and Security Workshop, Orlando, Florida, USA, 1999. [bib]
  • S. Voloshynovskiy, S. Pereira, and T. Pun, "Watermark attacks," in Proc. Erlangen Watermarking Workshop, Erlangen, Germany, 1999. [pdf|bib]
  • A. Herrigel, S. Voloshynovskiy, and Z. Hrytskiv, "Optical/digital identification/verification system based on digital watermarking technology," in Proc. SPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS'99, Lviv, Ukraine, 1999. [pdf|bib]
  • S. Voloshynovskiy, A. Herrigel, N. Baumgärtner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. International Workshop on Information Hiding, Dresden, Germany, 1999, pp. 212-236. [ps.gz| pdf|bib]
  • Z. Hrytskiv, S. Voloshynovskiy, and A. Allen, "High resolution radar imaging systems with robust image restoration," in Proc. IEEE International Microwave and Radar Conference, Krakow, Poland, 1998. [pdf|bib]
  • I. Prudyus, S. Voloshynovskiy, and T. Holotyak, "Adaptive aperture formation matched with radiometry image spatial spectrum," in Proc. IEEE International Microwave and Radar Conference, Krakow, Poland, 1998. [pdf|bib]
  • S. Voloshynovskiy, "Iterative image restoration with adaptive regularization and parametric constraints," Journal of Image Processing and Communications, vol. 3, iss. 3--4, pp. 73-88, 1998. [pdf|bib]
  • S. Voloshynovskiy, "Robust Image Restoration Based on Concept of M-Estimation and Parametric Model of Image Spectrum," in Proc. IEEE, EURASIP 5th International Workshop on Systems, Signals and Image Processing, Zagreb, Croatia, 1998. [pdf|bib]
  • A. Herrigel and S. Voloshynovskiy, "Copyright and content protection for digital images based on asymmetric cryptographic techniques," in Proc. Multimedia and Security Workshop, Sixth ACM International Multimedia Conference, Bristol, U.K., 1998, pp. 99-112. [bib]
  • I. Prudyus, S. Voloshynovskiy, and T. Holotyak, "Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays," in Proc. Signal Processing Conference (EUSIPCO 1998), 9th European, 1998, pp. 1-4. [pdf|bib]
  • T. Holotyak, I. Prudyus, and S. Voloshynovskiy, "Surface image formation based on sparse arrays with nonlinear signal processing," in Proc. IEEE Second International Conference ``The detection of abandoned land mines'', Edinburgh, UK, 1998. [pdf|bib]
  • Z. Grytskiv, S. Voloshynovskiy, and Y. Rytsar, ," Facta Universitatis, vol. 11, iss. 1, pp. 115-125, 1998. [pdf|bib]
  • Z. Hrytskiv, S. Voloshynovskiy, and A. Allen, "Radiometry imager with robust nonlinear adaptive image restoration," in Proc. IEEE Second International Conference ``The detection of abandoned land mines'', Edinburgh, UK, 1998. [pdf|bib]
  • Z. Grytskiv and S. Voloshynovskiy, ," Facta Universitatis, vol. 8, iss. 2, pp. 263-269, 1995. [pdf|bib]