Search Publications

Title  
Author  
Year  
   

All Publications

  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, and T. Holotyak, Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes, 2017. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, and T. Holotyak, "Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes," in Proc. Information Forensics and Security (WIFS), 2016 IEEE International Workshop on, 2016, pp. 1-6. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, S. Ferdowsi, and T. Holotyak, "On local active content fingerprinting: solutions for general linear feature maps," in Proc. ICPR, Cancun, Mexico, 2016. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Local active content fingerprinting: optimal solution under linear modulation," in Proc. ICIP, Phoenix, USA, 2016. [pdf|bib]
  • T. H. S. Thomas Dewaele Maurits Diephuis, "Forensic authentication of banknotes on mobile phones," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2016. [pdf|bib]
  • S. Voloshynovskiy, P. Bas, and T. Holotyak, "Physical object authentication: detection-theoretic comparison of natural and artificial randomness," in Proc. Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on, Shanghai, China, 2016. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and T. Holotyak, "Fine-grained recognition of physical objects on mobile phones: from categorization to identification," in Proc. The Third Workshop on Fine-Grained Visual Categorization (FGVC^3) in conjunction with the CVPR2015 conference, Boston, United-States, 2015. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Soft content fingerprinting with bit polarization based on sign-magnitude decomposition," Information Forensics and Security, IEEE Transactions on, vol. PP, iss. 99, pp. 1-1, 2015. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Privacy preserving multimedia content identification for cloud based bag-of-feature architectures," in Proc. Workshop on Cloud Based Media in conjunction with the 2015 IEEE International Conference on Multimedia and Expo (ICME 2015), Torino, Italy, 2015. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, and S. Ferdowsi, "Vector quantization with constrained likelihood for face recognition," in Proc. European Signal Processing Conference (EUSIPCO), Nice, France, 2015. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2015. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and T. Holotyak, "Sketchprint: Physical object micro-structure identification using mobile phones," in Proc. European Signal Processing Conference (EUSIPCO), Nice, France, 2015. [bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, M. Korytkowski, and R. Scherer, "Secure Representation of Images Using Multi-layer Compression," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L. A., and Zurada, J. M., Eds., Springer International Publishing, 2015, vol. 9119, pp. 696-705. [pdf|bib]
  • F. Farhadzadeh, F. Willems, and S.Voloshynovskiy, "Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Rome, Italy, 2015. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, S. Ferdowsi, M. Diephuis, and R. Scherer, "Supervised Transform Learning for Face Recognition," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L. A., and Zurada, J. M., Eds., Springer International Publishing, 2015, vol. 9119, pp. 737-746. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Sparse Multi-layer Image Approximation: Facial Image Compression," ArXiv e-prints, 2015. [pdf|bib]
  • T. Nowak, P. Najgebauer, J. Romanowski, M. Gabryel, M. Korytkowski, R. Scherer, and D. Kostadinov, "Spatial Keypoint Representation for Visual Object Retrieval," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {II}, 2014, pp. 639-650. [link|bib]
  • D. Kostadinov, S. Voloshynovskiy, and M. Diephuis, "Visual information encoding for face recognition: sparse coding vs vector quantization," in Proc. Symposium on Information Theory in the Benelux, 4th Joint WIC IEEE Symposium on Information Theory and Signal Processing in the Benelux, Eindhoven, Netherlands, 2014. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, M. Gabryel, and M. Korytkowski, "Multi-class Classification: {A} Coding Based Space Partitioning," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {II}, 2014, pp. 593-604. [pdf|bib]
  • F. Farhadzadeh, F. Willems, and S. Voloshynovskiy, "Information theoretical analysis of identification based on active content fingerprinting," in Proc. 35th WIC Symposium on Information Theory in the Benelux, Enschede, the Netherlands, 2014, pp. 134-139. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, S. Ferdowsi, M. Diephuis, and R. Scherer, "Robust Face Recognition by Group Sparse Representation That Uses Samples from List of Subjects," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., and Zurada, J., Eds., Springer International Publishing, 2014, vol. 8468, pp. 616-626. [link|bib]
  • J. Rygal, J. Romanowski, R. Scherer, and S. Ferdowsi, "Novel Algorithm for Translation from Image Content to Semantic Form," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {I}, 2014, pp. 783-792. [pdf|bib]
  • M. Diephuis, F. Beekhof, S. Voloshynovskiy, T. Holotyak, N. Standardo, and B. Keel, "A framework for fast and secure packaging identification on mobile phones," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, D. Kostadinov, F. Farhadzadeh, and T. Holotyak, "On accuracy, robustness and security of bag-of-word search systems," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, and S. Ferdowsi, "Robust human face recognition based on locality preserving sparse over complete block approximation," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Content identification: binary content fingerprinting versus binary content encoding," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Performance analysis of bag-of-features based content identification systems," in Proc. Proceedings of 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. [pdf|bib]
  • S. Ferdowsi and S. Voloshynovskiy, "Content identification: machine learning meets coding," in Proc. 35th WIC Symposium on Information Theory in the Benelux, Enschede, the Netherlands, 2014, pp. 113-120. [pdf|bib]
  • F. Farhadzadeh and S. Voloshynovskiy, "Active Content Fingerpriting," Information Forensics and Security, IEEE Transactions on, vol. 9, iss. 6, pp. 905-920, 2014. [pdf|bib]
  • F. Farhadzadeh, F. M. J. Willems, and S. Voloshynovskiy, "Fundamental Limits of Identification: Identification rate, search and memory complexity trade--off," in Proc. IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 2013. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and F. Beekhof, "Physical object identification based on FAMOS microstructure fingerprinting: comparison of templates versus invariant features," in Proc. 8th International Symposium on Image and Signal Processing and Analysis, Trieste, Italy, 2013. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Active content fingerprinting: Shrinkage and lattice based modulations," in Proc. Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, 2013, pp. 3073-3077. [bib]
  • S. Voloshynovskiy, M. Diephuis, F. Beekhof, and F. Farhadzadeh, "Physical object authentication with correlated camera noise.," in Proc. 15. GI-Fachtagung Datenbanksysteme für Business, Technologie und Web(BTW), Magdeburg, Germany, 2013. [pdf|bib]
  • S.Voloshynovskiy, F. Farhadzadeh, O. Koval, and T. Holotyak, "Active content fingerprinting: a marriage of digital watermarking and content fingerprinting," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, and F. Farhadzadeh, "Content Authentication and Identification under Informed Attacks," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Robust Message-Privacy Preserving Image Copy Detection for Cloud-based Systems," in Proc. CBMI 2012,10th Workshop on Content-Based Multimedia Indexing, 2012. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, F. Beekhof, O. Koval, and B. Keel, "Towards Reproducible results in authentication based on physical non-cloneable functions: The Forensic Authentication Microstructure Optical Set (FAMOS)," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. J. Koval, "Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding," IEEE Transactions on Information Forensics and Security, vol. 7, iss. 5, pp. 1652-1667, 2012. [pdf|bib]
  • S.Voloshynovskiy, T. Holotyak, O. Koval, and F. Farhadzadeh, "Physical-layer Security based on Gaussian Wiretap Channel with Collaborative Wiretappers," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • A. Harutyunyan, N. Grigoryan, S. Voloshynovskiy, and O. Koval, "A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects," in Proc. Biometrie - BIOSIG2011 CAST workshop, Darmstadt, Germany, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Information-theoretic analysis of content based identification for correlated data," in Proc. IEEE Information Theory Workshop (ITW), Paraty, Brazil, 2011, pp. 205-209. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, F. Farhadzadeh, O. Koval, and F. Beekhof, "Fast physical object identification based on unclonable features and soft fingerprinting," in Proc. International Conference on Acoustics, Speech and Signal Processing ICASSP2011, Prague, Czech Republic, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and F. Farhadzadeh, "Identification In Desynchronization Channels," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, O. Koval, F. Beekhof, and F. Farhadzadeh, "Private content identification based on soft fingerprinting," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, O. Koval, T. Holotyak, and F. Beekhof, "Statistical analysis of digital image fingerprinting based on random projections," in Proc. Image and Signal Processing and Analysis (ISPA), 2011 7th International Symposium, Dubrovnik, Croatia, 2011. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Trading-off privacy-complexity of identification problem," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Information-theoretic analysis of desynchronization invariant object identification," in Proc. International Conference on Acoustics, Speech and Signal Processing ICASSP2011, Prague, Czech Republic, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Farhadzadeh, T. Holotyak, and F. Beekhof, "Geometrically robust perceptual fingerprinting: an asymmetric case," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Statistical Analysis of Binarized SIFT Descriptors," in Proc. 7th International Symposium on Image and Signal Processing and Analysis, 2011. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Theoretic Multiclass Classification Based on Binary Classifiers," Signal Processing Systems, vol. 65, pp. 413-430, 2011. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, O. Koval, F. Beekhof, and F. Farhadzadeh, "Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • V. Balakirsky, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Information Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting," in Proc. CSIT 2011, Yerevan, Armenia, 2011. [pdf|bib]
  • N. Grigoryan, A. Harutyunyan, S. Voloshynovskiy, and O. Koval, "On Multiple Hypothesis Testing with Rejection Option," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, F. Farhadzadeh, and T. Holotyak, "Information-Theoretical Analysis of Private Content Identification," in Proc. IEEE Information Theory Workshop, ITW2010, Dublin, Ireland, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Performance Analysis of Identification System Based on Order Statistics List Decoder," in Proc. IEEE International Symposium on Information Theory, Austin, TX, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, T. Holotyak, F. Beekhof, and F. Farhadzadeh, "Privacy amplification of content identification based on fingerprint bit reliability," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Seattle, The USA, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Content-Identification: towards Capacity Based on Bounded Distance Decoder," in Proc. Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Content Identification Based on digital fingerprint: what can be done if ML decoding fails?," in Proc. IEEE International Workshop on Multimedia Signal Processing, Saint-Malo, France, 2010. [bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "On Accuracy, Privacy and Complexity in the Identification Problem," in Proc. Proceedings of SPIE / Multimedia Content Access: Algorithms and Systems IV, San Jose, USA, 2010. [pdf|bib]
  • O. Koval and S. Voloshynovskiy, "Multimodal object authentication with random projections: a worst-case approach," in Proc. Proceedings of SPIE / Media Forensics and Security XII, San Jose, USA, 2010. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, F. Beekhof, and O. Koval, "Fast identification of highly distorted images," in Proc. Proceedings of SPIE / Media Forensics and Security XII, San Jose, USA, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Privacy Preserving Identification: Order Statistics List Decoding Perspective," in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Random projections based item authentication," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Conception and limits of robust perceptual hashing: toward side information assisted hash functions," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Multi-class Classifiers based on Binary Classifiers: Performance, Efficiency, and Minimum Coding Matrix Distances," in Proc. Proceedings of the IEEE International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Grenoble, France, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. Vila-Forcén, and P. Comesana-Alfaro, "Partially reversible data hiding with pure message communications over state-dependent channels," Signal Processing, 2009. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, P. Bas, and F. Cayre, "On security threats for robust perceptual hashing," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Multi-class Classifiers based on Binary Classifiers: On Coding Matrix Design, Reliability and Maximum Number of Classes," in Proc. Proceedings of the IEEE International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Grenoble, France, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Binary Robust Hashing based on Probabilistic Bit Reliability," in Proc. Proceedings of the Workshop on Statistical Signal Processing, Cardiff, UK, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, Secure item identification and authentication system based on unclonable features, 2009. [bib]
  • S. Voloshynovskiy, F. Beekhof, O. Koval, and T. Holotyak, "On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption," in Proc. Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain, Lausanne, Switzerland, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, T. Holotyak, and F. Beekhof, "Privacy enhancement of common randomness based authentication: key rate maximized case," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, London, UK, 2009. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Fast identification algorithms for forensic applications," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, London, UK, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Perez-Gonzalez, and M. K. Mihcak, "Informed data-hiding with partial side information at the decoder," submitted to Signal Processing, 2009. [pdf|bib]
  • F. Beekhof, O. Koval, R. Villán, S. Voloshynovskiy, and E. Topak, "Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures," in Proc. Proceedings of eForensics, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Unclonable identification and authentication based on reference list decoding," in Proc. Proceedings of the conference on Secure Component and System Identification, Berlin, Germany, 2008. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Privacy-Preserving Biometric Person Identification," in Proc. Proceedings of the 16th European Signal Processing Conference, Lausanne, Switzerland, 2008. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Privacy-Preserving Multimodal Person and Object Identification," in Proc. Proceedings of the 10th ACM Workshop on Multimedia \& Security, Oxford, UK, 2008. [ps|bib]
  • R. Vill√°n Sebasti√°n, "Authentication of electronic and printed text documents," PhD Thesis , 2008. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Multimodal authentication based on random projections and distributed coding," in Proc. Proceedings of the 10th ACM Workshop on Multimedia \& Security, Oxford, UK, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, R. Villán, F. Beekhof, and T. Pun, "Authentication of Biometric Identification Documents via Mobile Devices," Journal of Electronic Imaging, 2008. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Beekhof, and T. Pun, "Security Analysis of Robust Perceptual Hashing," in Proc. Steganography, and Watermarking of Multimedia Contents X, (SPIE, Bellingham, WA 2008) 681906, 2008. [ps| link|bib]
  • T. Schürmann, Doppel-Herz: Parallelprogrammierung in C++ mit der OMPTL, 2008. [link| link|bib]
  • M. Haroutunian, S. Tonoyan, O. Koval, and S. Voloshynovskiy, "On reversible information hiding system," in Proc. Proceedings of the IEEE International Symposium on Information Theory, Toronto, Ontario, Canada, 2008. [pdf|bib]
  • T. Schneider, Syst√®me de protection des marques bas√© sur l'identification d'un signal audio, 2007. [bib]
  • J. Kronegg, G. Chanel, S. Voloshynovskiy, and T. Pun, "EEG-based synchronized brain-computer interfaces: a model for optimizing the number of mental tasks," IEEE transactions on neural systems and rehabilitation engineering, vol. 15, iss. 1, 2007. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Error exponent analysis of person identification based on fusion of dependent/independent modalities," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007. [pdf|bib]
  • I. Sarikaya, Les codes √ barres multi-niveaux √ deux dimensions, 2007. [bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Quality Enhancement of printed-and-scanned Images using distributed coding," Signal Processing, vol. 87, iss. 6, pp. 1301-1313, 2007. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Beekhof, and T. Pun, "Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms," in Proc. WaCha2007, /Third WAVILA Challenge/, Saint Malo, France, 2007. [pdf|bib]
  • E. Topak, "Information-theoretic performance and security analysis of geometrically structured data-hiding codes," PhD Thesis , 2007. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Analysis of multimodal binary detection systems based on dependent/independent modalities," in Proc. Proceedings of the IEEE 2007 International Workshop on Multimedia Signal Processing, Chania, Crete, Greece, 2007. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Robust perceptual hashing as classification problem: decision-theoretic and practical considerations," in Proc. Proceedings of the IEEE 2007 International Workshop on Multimedia Signal Processing, Chania, Crete, Greece, 2007. [pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007. [pdf| ps.gz| pdf|bib]
  • J. -M. Pignat, O. Koval, S. Voloshynovskiy, and T. Pun, "From non-stationary Gaussian modelling to independent component analysis: an fMRI study," in Proc. Lemanic-Neuroscience Annual Meeting, Les Diablerets, Switzerland, 2007. [bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, V. J. E. Forcen, and T. Pun, "On reversibility of random binning based data-hiding techniques: security perspectives," in Proc. ACM Multimedia and Security Workshop 2006, Geneva, Switzerland, 2006. [ps|bib]
  • Y. Rytsar, S. Voloshynovskiy, O. Koval, F. Deguillaume, E. Topak, S. Startchik, and T. Pun, "Tangible interactive system for document browsing and visualisation of multimedia data," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122), San Jose, USA, 2006. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, M. E. Haroutunian, J. E. Vila-Forcén, and T. Pun, "E-capacity analysis of data-hiding channels with geometrical attacks," in Proc. Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [ps|bib]
  • J. Vila Forcen, "Digital data-hiding based identification systems," PhD Thesis , 2006. [bib]
  • S. Voloshynovskiy, O. Koval, and M. and Lozynska, "Novel interactive services for e-tourism and e-commerce," in Proc. Proceedings of International Conference on, Montreux, Switzerland, 2006. [bib]
  • J. Kronegg, G. Chanel, S. Voloshynovskiy, and T. Pun, Information-transfer rate based performance optimization for brain-computer interfacesHeraklion, Greece: , 2006. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "The Gaussian Transform of distributions: definition, computation and application," IEEE Transactions on Signal Processing, vol. 54, pp. 2976-2985, 2006. [pdf|bib]
  • L. Pérez-Freire, F. Pérez-González, and S. Voloshynovskiy, "An Accurate Analysis of Scalar Quantization-Based Data Hiding," IEEE Transactions on Information Forensics and Security, vol. 1, iss. 1, pp. 80-86, 2006. [pdf|bib]
  • J. E. Vila-Forcén, O. Koval, S. Voloshynovskiy, and T. Pun, "Asymmetric side information and non-noticable Costa data-hiding," in Proc. Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents, San Jose, CA, USA, 2006. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Facial Image Compression Based on Structured Codebooks in Overcomplete Domain," {EURASIP} Journal on Applied Signal Processing, Frames and overcomplete representations in signal processing, communications, and information theory special issue, vol. 2006, iss. Article {ID} 69042, pp. 1-11, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Costa problem under channel ambiguity," in Proc. Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Toulouse, France, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, and T. Pun, "Message Communications And Channel State Estimation For State Dependent Channels," in Proc. Proceedings of 27-th Symposium on information theory in the Benelux, Noordwijk, The Netherlands, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, K. M. Mihcak, and T. Pun, "The Edge Process Model and Its Application to Information Hiding Capacity Analysis," IEEE Trans. on Signal Processing, vol. 54, iss. 5, pp. 1813-1825, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, BRANDS PROTECTION AND PRODUCT AUTHENTICATION USING PORTABLE DEVICES, 2006. [bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, J. E. Vila-Forcén, E. Topak, F. Deguillaume, Y. Rytsar, and T. Pun, "Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, USA, 2006. [pdf| ps.gz| pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, "Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management," IEEE Transactions on Information Forensics and Security, vol. 1, iss. 4, pp. 405-420, 2006. [pdf| ps.gz|bib]
  • T. Pun, T. I. Alecu, G. Chanel, and S. Voloshynovskiy, "Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva," IEEE transactions on neural systems and rehabilitation engineering, Special Issue on Brain-Computer Interaction, vol. 14, iss. 2, 2006. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Performance analysis of non-uniform quantization-based data-hiding," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, E. Topak, and T. Pun, "Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, R. Villán, E. Topak, J. E. Vila-Forcén, F. Deguillaume, Y. Rytsar, and T. Pun, "Information-Theoretic Analysis of Electronic and Printed Document Authentication," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, USA, 2006. [pdf| pdf|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Host communications for non-Gaussian state-dependent channels: Laplacian case," in Proc. Proceedings of International Conference on Multimedia and Expo, Toronto, Canada, 2006. [bib]
  • O. Koval, S. Voloshinovskiy, and T. Pun, "Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: Summary of main results," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 06.12, 2006. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, J. E. Vila-Forcén, F. Pérez-González, F. Deguillaume, and T. Pun, "Robustness Improvement of Known-Host-State Watermarking Using Host Statistics," Elsevier Science, Signal Processing, vol. 86, iss. 5, pp. 1076-1088, 2006. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, T. Holotyak, and T. Pun, "Information-theoretic analysis of steganalysis in real images," in Proc. ACM Multimedia and Security Workshop 2006, Geneva, Switzerland, 2006. [ps|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Laplacian channel state estimation for state dependent channels," in Proc. Proceedings of 27-th Symposium on information theory in the Benelux, Noordwijk, The Netherlands, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Asymmetric spread spectrum data-hiding for Laplacian host data," in Proc. {IEEE} International Conference on Image Processing, Genova, Italy, 2005. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-González, and T. Pun, "Worst case additive attack against quantization-based data-hiding methods," in Proc. Proceedings of {SPIE} Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents {VII (EI120)}, San Jose, USA, 2005. [pdf| pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-Gonález, and T. Pun, "Practical Data-Hiding: Additive Attacks Performance Analysis," in Proc. International Workshop on Digital Watermarking, Siena, Italy, 2005, pp. 244-259. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, F. Pérez-Gonález, O. Koval, and T. Pun, "Quantization-Based Methods: Additive Attacks Performance Analysis," IEEE Transactions on Signal Processing, 2005. [bib]
  • J. -M. Pignat, S. Voloshynovskiy, O. Koval, V. Ibanez, and T. Pun, "Non-stationary Gaussian spatio-temporal modeling of fMRI data," in Proc. Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET, June 7-11, 2005, Vrije Universiteit Amsterdam, The Netherlands, 2005. [bib]
  • T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg, Austria, 2005. [bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 05.01, 2005. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, M. K. Mihcak, and T. Pun, "Security analysis of robust data hiding with geometrically structured codebooks," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, USA, 2005. [pdf| ps| pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, K. M. Mihcak, and T. Pun, "Towards geometrically robust data-hiding with structured codebooks," {ACM} Multimedia Systems Journal, Special Issue on Multimedia and Security, vol. 11, iss. 2, pp. 121-132, 2005. [pdf|bib]
  • O. Koval, "Stochastic image modeling in data hiding applications," PhD Thesis , 2005. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, Turkey, 2005. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Deguillaume, F. Perez-Gonzalez, and T. Pun, "Robustness improvement of known-host-state watermarking using host statistics," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, USA, 2005. [pdf|bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva," in Proc. BCI 2005, Brain-Computer Interface Technology: Third International Meeting, Rensselaerville, NY, USA, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, F. Pérez-González, K. M. Mihcak, J. E. Vila-Forcén, and T. Pun, "Data-hiding with partially available side information," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, 2005. [pdf|bib]
  • J. Kronegg, T. Alecu, G. Chanel, S. Voloshynovskiy, and T. Pun, "Analyse des mesures de débit pour interfaces cerveau-ordinateur," in Proc. TAIMA'2005, Traitement et Analyse de l'Information : Méthodes et Applications, Hammamet, Tunisia, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. E. Vila-Forcén, P. Comesana, and T. Pun, "On reversibility of random binning techniques: multimedia perspectives," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg, Austria, 2005. [pdf| ps|bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Analysis of bit-rate definitions for Brain-Computer Interfaces," in Proc. Proceedings of the 2005 Int. Conf. on Human-computer Interaction {(HCI'05)}, Las Vegas, Nevada, USA, 2005. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Image denoising based on the edge-process model," Signal Processing, vol. 85, iss. 10, pp. 1950-1969, 2005. [pdf|bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Information-transfer rate modeling of EEG-based synchronized brain-computer interfaces," University of Geneva, Computer Vision and Multimedia Laboratory, Computing Centre, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 05.03, 2005. [pdf|bib]
  • R. Villán, S. Voloshynovskiy, F. Deguillaume, Y. Rytsar, O. Koval, E. Topak, E. Rivera, and T. Pun, "A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents," in Proc. Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 280-281. [pdf| ps.gz| pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, "Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, USA, 2005, pp. 453-464. [pdf| ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Information-theoretic data-hiding: Recent achievements and open problems," International Journal of Image and Graphics, vol. 5, iss. 1, pp. 1-31, 2005. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Multimedia Security: open problems and solutions," in Proc. In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program, Nork, Yerevan, Armenia, 1-12 October, 2005, Yerevan, Armenia, 2005. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, J. E. Vila-Forcén, and T. Pun, "On Security of Geometrically-Robust Data-Hiding," in Proc. WIAMIS 2005, 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland, 2005. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Perez-Gonzales, M. K. Michak, J. E. Vila-Forcén, and T. Pun, "Data-hiding with asymmetrically available side information at encoder and decoder," in Proc. Proceedings of European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • Y. Rytsar, F. Deguillaume, S. Voloshynovskiy, E. Rivera, and T. Pun, "Text document data-hiding: security and multimedia perspectives," in Proc. 5th International Conference on Computer Science and Information Technologies {CSIT 2005}, Yerevan, Armenia, 2005. [bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "The Gaussian transform," in Proc. 13th. European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Denoising with infinite mixture of Gaussians," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, Turkey, 2005. [pdf|bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva," Technical report TR0501, Computer Science Department, University of Geneva, 05.01, 2005. [bib]
  • F. Deguillaume, Y. Rytsar, S. Voloshynovskiy, and T. Pun, "Data-hiding based text document security and automatic processing," in Proc. IEEE International Conference on Multimedia \& Expo (ICME) 2005, Amsterdam, The Netherlands, 2005. [bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Denoising with infinite mixture of Gaussians," in Proc. Eusipco 2005, 13th. European Signal Processing Conference, Sept. 4-8, Antalya, Turkey, 2005. [bib]
  • S. Voloshynovskiy, Y. Rytsar, O. Koval, and T. Pun, "Document interactive navigation in multimodal databases," in Proc. SIMILAR NOE Workshop, Paris, France, 2005. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups," in Proc. Proceedings of European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. E. Vila-Forcén, P. Comesaña, and T. Pun, "On reversibility of random binning techniques," in Proc. Proceedings of 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 108-118. [bib]
  • S. Voloshynovskiy, O. Koval, F. Pérez-González, K. Mihcak, and T. Pun, "Data-hiding with host state at the encoder and partial side information at the decoder," , 2004. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Deguillaume, F. Perez-gonzalez, and T. Pun, "Spread spectrum watermarking for real images: is everything so hopeless?," in Proc. Proceedings of 12th European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria, 2004. [pdf|bib]
  • J. -M. Pignat, S. Voloshynovskiy, O. Koval, V. Ibanez, and T. Pun, "Non-stationary Gaussian spatio-temporal modeling of fMRI data," in Proc. First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program, Les Diablerets, Switzerland, 2004. [bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Regularized two-step brain activity reconstruction from spatio-temporal EEG data," in Proc. Image Reconstruction from Incomplete Data III, SPIE International Symposium on Optical Science and Technology, Denver, Colorado, USA, 2004. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Perez-Gonzalez, F. Deguillame, and T. Pun, "Quantization-based watermarking performance improvement using host statistics: AWGN attack case," in Proc. ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, 2004. [pdf|bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Brain-computer interface model: Upper-capacity bound, signal-to-noise ratio estimation, and optimal number of symbols," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 04.03, 2004. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system: lower bounds and optimality," in Proc. EUSIPCO 2004, 12th European Signal Processing Conference, Vienna, Austria, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Visual communications with side information via distributed printing channels: extended multimedia and security perspectives," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications, San Jose, USA, 2004. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "EEG Cortical Imaging: A Vector Field Approach For Laplacian Denoising And Missing Data Estimation," in Proc. IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'04), Arlington, VA, 2004. [pdf|bib]
  • L. Perez-Freire, F. Perez-Gonzalez, and S. Voloshynovskiy, "Revealing the true achievable rates of scalar Costa scheme," in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Perez-gonzalez, and T. Pun, "Worst Case Additive Attack against Quantization-Based Watermarking Techniques," in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [pdf|bib]
  • Y. Rytsar, S. Voloshynovskiy, F. Ehrler, and T. Pun, "Interactive segmentation with hidden object based annotations: towards smart media," in Proc. Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, 2004. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, Character and vector graphics watermark for structured electronic documents security, 2004. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Capacity analysis of periodical watermarking," in Proc. EUSIPCO-2004, 12th European Signal Processing Conference, Vienna, Austria, 2004. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Capacity-security analysis of repetitive watermarking," in Proc. Proceedings of European Signal Processing Conference, Vienna, Austria, 2004. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Distributed single source coding framework for passport photo images," in Proc. Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms, Martigny, Switzerland, 2004. [bib]
  • J. E. Vila-Forcén, O. Koval, and S. Voloshynovskiy, "Distributed single source coding with side information," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing, San Jose, USA, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Joint compression of independent modalities in smart meeting rooms applications," in Proc. SIMILAR NOE Workshop, Lausanne, Switzerland, 2004. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Secure hybrid robust watermarking resistant against tampering and copy-attack," Signal Processing, vol. 83, iss. 10, pp. 2133-2170, 2003. [pdf|bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system : electrode misplacement sensitivity," in Proc. NCCR (IM)2 Interactive Multimodal Information Management Workshop, MartignyCrans-Montana, Switzerland, October 6-8, 2003, 2003. [bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models," in Proc. SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, 2003. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, T. Pun, J. Fridrich, F. Perez-Gonzales, and N. Memon, "Special issue on Security of Digital Data Hiding Technologies," Signal Processing, vol. 83, iss. 10, 2003. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Wavelet-based image denoising using non-stationary stochastic geometrical image priors," in Proc. SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V, Santa Clara, CA, USA, 2003. [ps.gz| pdf|bib]
  • Y.Rytsar, S.Voloshynovskiy, and T.Pun, "Metadata Representation for Semantic-Based Multimedia Security and Management," in Proc. On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, Catania, Italy, 2003, pp. 769-778. [pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications," in Proc. 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003, Nis, Yugoslavia, 2003. [ps| pdf|bib]
  • F. Ehrler, Segmentation interactive pour la cr√©ation d'images intelligentes bas√©es sur les informations cach√©es, 2003. [bib]
  • S. Voloshynovskiy, Y. Rytsar, O. Koval, and T. Pun, "Information-theoretic visual communications in human-computer interfaces: Interactive segmentation," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system: electrode misplacement sensitivity," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Low bit rate image compression using a non-stationary geometrical image priors," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Robust digital watermarking with channel state estimation: part I Approaching theoretical capacity," Signal Processing, 2003. [link| link|bib]
  • Y. Rytsar, S. Voloshynovskiy, O. Koval, F. Deguillaume, J. E. Vila-Forcén, and T. Pun, "Smart Media: from basic concepts to applications," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Robust digital watermarking with channel state estimation: part II Applied robust watermarking," Signal Processing, 2003. [link| link|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, A method for the estimation and recovering of general affine transform, 2002. [bib]
  • S. Voloshynovskiy and T. Pun, "Capacity-security analysis of data hiding technologies," in Proc. Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002), Lausanne, Switzerland, 2002. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Wavelet-based denoising using stochastic geometrical priors," in Proc. IM2 Interactive Information Management Workshop, Martigny, Switzerland, 2002. [bib]
  • S. Voloshynovskiy, A. Herrigel, Y. Rytsar, and T. Pun, "{StegoWall}: Blind Statistical Detection of Hidden Data," in Proc. Proceedings of {SPIE} Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents {IV}, San Jose, USA, 2002. [pdf|bib]
  • S. Voloshynovskiy and A. Herrigel, Robustness of Watermarks and Intentional Attacks, 2002. [bib]
  • S. Voloshynovskiy, Robust digital watermarking: state-of-the-art and benchmarking, 2002. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Hybrid robust watermarking resistant against copy attack," in Proc. Proceedings of the European Signal Processing Conference {(EUSIPCO2002)}, Toulouse, France, 2002. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, A method for hybrid robust watermarking and tamper proofing, 2002. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking Applications," in Proc. SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, 2002. [ps.gz| pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, S. Pereira, M. Madueño, and T. Pun, Filigranage D'images Digitales, 2001. [bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, "Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical Distortions," in Proc. {IEEE} International Conference on Image Processing, {ICIP2001}, Thessaloniki, Greece, 2001, pp. 999-1002. [ps.gz| pdf|bib]
  • A. Herrigel and S. Voloshynovskiy, "Counterfeit Attacks against a new Currency Protection Scheme," in Proc. Int. Conf. on Communications and Multimedia Security CMS2001, Darmstadt, Germany, 2001. [bib]
  • I. Prudyus, S. Voloshynovskiy, A. Synyavskyy, T. Holotyak, and L. Lazko, "Generalized radar/radiometry imaging problems," Journal of Telecommunications and Information Technology, vol. 4, pp. 15-20, 2001. [pdf|bib]
  • A. Synyavskyy, S. Voloshynovskiy, and I. Prudyus, "Wavelet-Based {MAP} Image Denoising Using Provably Better Class of Stochastic I.I.D. Image Models," Facta Universitatis (Nis), vol. 14, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, "Optimal adaptive diversity watermarking with channel state estimation," in Proc. SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, Method for Digital Watermarking Robust Against Local and Global Geometrical Distortions and Projective Transforms, 2001. [bib]
  • S. Voloshynovskiy, A. Herrigel, and T. Pun, "Blur/deblur attack against document protection systems based on digital watermarking," in Proc. Information Hiding Workshop, Pittsburgh, PA, USA, 2001. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, S. Pereira, T. Pun, J. Eggers, and J. Su, "Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks," IEEE Communications Magazine (Special Issue on Digital watermarking for copyright protection: a communications perspective), vol. 39, iss. 8, pp. 118-127, 2001. [pdf| ps.gz|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, 2001. [pdf| ps.gz|bib]
  • A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, "The Watermark Template Attack," in Proc. SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack modelling: Towards a second generation benchmark," Signal Processing, vol. 81, iss. 6, pp. 1177-1214, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy and T. Pun, "Stochastic Digital Image Watermarking," in Proc. {IEEE/ISSPA} {ISSPA} 2001, 6th Int. Symposium on Signal Processing and its Applications, Kuala-Lumpur, Malaysia, 2001. [bib]
  • S. Pereira, S. Voloshynovskiy, M. Madueño, S. Marchand-Maillet, and T. Pun, "Second generation benchmarking and application oriented evaluation," in Proc. Information Hiding Workshop, Pittsburgh, PA, USA, 2001. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, "Content adaptive watermarking based on a stochastic multiresolution image modeling," in Proc. Tenth European Signal Processing Conference (EUSIPCO'2000), Tampere, Finland, 2000. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun, "Generalized watermark attack based on watermark estimation and perceptual remodulation," in Proc. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, California USA, 2000. [pdf| pdf|bib]
  • S. Voloshynovskiy, A. Allen, and Z. Hrytskiv, "Robust edge-preserving image restoration in the presence of non-Gaussian noise," Electronics Letters, 2000. [bib]
  • S. Voloshynovskiy, F. Deguillaume, S. Pereira, A. Herrigel, and T. Pun, Method for adaptive digital watermarking robust against geometric transforms, 2000. [bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Optimized wavelet domain watermark embedding strategy using linear programming," in Proc. Wavelet Applications VII (part of SPIE AeroSense 2000), Orlando, Florida USA, 2000. [pdf| ps.gz|bib]
  • M. Kutter, S. Voloshynovskiy, and A. Herrigel, "Watermark copy attack," in Proc. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, California USA, 2000. [ps.gz| pdf|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Effective channel coding for DCT watermarks," in Proc. IEEE International Conference on Image Processing ICIP 2000, Vancouver, Canada, 2000. [pdf| ps.gz|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, A method for generating and decoding image dependant watermarks, 2000. [bib]
  • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack Modelling: Towards a Second Generation Watermarking Benchmark," Computer Vision Group, Computing Centre, University of Geneva, rue Général Dufour, 24, CH-1211 Genève, Switzerland, 00.05, 2000. [bib]
  • S. Voloshynovskiy, S. Pereira, and T. Pun, "Watermark attacks," in Proc. Erlangen Watermarking Workshop, Erlangen, Germany, 1999. [pdf|bib]
  • S. Voloshynovskiy, A. Herrigel, F. Jordan, N. Baumgärtner, and T. Pun, "A noise removal attack for watermarked images," in Proc. Multimedia and Security Workshop, Orlando, Florida, USA, 1999. [bib]
  • S. Voloshynovskiy, A. Herrigel, N. Baumgärtner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. International Workshop on Information Hiding, Dresden, Germany, 1999, pp. 212-236. [ps.gz| pdf|bib]
  • A. Herrigel, S. Voloshynovskiy, and Z. Hrytskiv, "Optical/digital identification/verification system based on digital watermarking technology," in Proc. SPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS'99, Lviv, Ukraine, 1999. [pdf|bib]
  • I. Prudyus, S. Voloshynovskiy, and T. Holotyak, "Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays," in Proc. Signal Processing Conference (EUSIPCO 1998), 9th European, 1998, pp. 1-4. [pdf|bib]
  • Z. Hrytskiv, S. Voloshynovskiy, and A. Allen, "High resolution radar imaging systems with robust image restoration," in Proc. IEEE International Microwave and Radar Conference, Krakow, Poland, 1998. [pdf|bib]
  • S. Voloshynovskiy, "Iterative image restoration with adaptive regularization and parametric constraints," Journal of Image Processing and Communications, vol. 3, iss. 3--4, pp. 73-88, 1998. [pdf|bib]
  • S. Voloshynovskiy, "Robust Image Restoration Based on Concept of M-Estimation and Parametric Model of Image Spectrum," in Proc. IEEE, EURASIP 5th International Workshop on Systems, Signals and Image Processing, Zagreb, Croatia, 1998. [pdf|bib]
  • I. Prudyus, S. Voloshynovskiy, and T. Holotyak, "Adaptive aperture formation matched with radiometry image spatial spectrum," in Proc. IEEE International Microwave and Radar Conference, Krakow, Poland, 1998. [pdf|bib]
  • A. Herrigel and S. Voloshynovskiy, "Copyright and content protection for digital images based on asymmetric cryptographic techniques," in Proc. Multimedia and Security Workshop, Sixth ACM International Multimedia Conference, Bristol, U.K., 1998, pp. 99-112. [bib]
  • T. Holotyak, I. Prudyus, and S. Voloshynovskiy, "Surface image formation based on sparse arrays with nonlinear signal processing," in Proc. IEEE Second International Conference ``The detection of abandoned land mines'', Edinburgh, UK, 1998. [pdf|bib]
  • Z. Grytskiv, S. Voloshynovskiy, and Y. Rytsar, ," Facta Universitatis, vol. 11, iss. 1, pp. 115-125, 1998. [pdf|bib]
  • Z. Hrytskiv, S. Voloshynovskiy, and A. Allen, "Radiometry imager with robust nonlinear adaptive image restoration," in Proc. IEEE Second International Conference ``The detection of abandoned land mines'', Edinburgh, UK, 1998. [pdf|bib]
  • Z. Grytskiv and S. Voloshynovskiy, ," Facta Universitatis, vol. 8, iss. 2, pp. 263-269, 1995. [pdf|bib]