Search Publications

Title  
Author  
Year  
   

All Publications

  • I. Shiri, Y. Salimi, N. Sirjani, B. Razeghi, S. Bagherieh, M. Pakbin, Z. Mansouri, G. Hajianfar, A. H. Avval, D. Askari, and others, "Differential privacy preserved federated learning for prognostic modeling in COVID-19 patients using large multi-institutional chest CT dataset," Medical Physics, 2024. [pdf|bib]
  • V. Kinakh, M. Drozdova, and S. Voloshynovskiy, "MV–MR: Multi-Views and Multi-Representations for Self-Supervised Learning and Knowledge Distillation," Entropy, vol. 26, iss. 6, 2024. [pdf|bib]
  • E. Lastufka, M. Drozdova, V. Kinakh, D. Piras, and S. Voloshynovskyy, "Vision foundation models: can they be applied to astrophysics data?," in Proc. Proceedings of the Conference on Astrophysics and Machine Learning (placeholder), 2024. [pdf|bib]
  • Y. Belousov, G. Quétant, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications with Copy Detection Patterns," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3395-3408, 2024. [pdf|bib]
  • I. Shiri, B. Razeghi, S. Ferdowsi, Y. Salimi, D. Gündüz, D. Teodoro, S. Voloshynovskiy, and H. Zaidi, "PRIMIS: Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscation," Journal of biomedical informatics, vol. 150, 2024. [pdf|bib]
  • J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, "Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3124-3134, 2024. [pdf|bib]
  • V. Kinakh, Y. Belousov, G. Quétant, M. Drozdova, T. Holotyak, D. Schaerer, and S. Voloshynovskiy, "Hubble Meets Webb: Image-to-Image Translation in Astronomy," Sensors, vol. 24, iss. 4, 2024. [pdf|bib]
  • V. Kinakh, B. Pulfer, Y. Belousov, P. Fernandez, T. Furon, and S. Voloshynovskiy, "Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks," in Proc. 16th IEEE International Workshop on Information Forensics and Security (WIFS), Roma, Italy, 2024. [pdf|bib]
  • R. Chaban, E. Icet, O. Taran, and S. Voloshynovskiy, "Comparative Analysis of Copy Detection Patterns and Physical Unclonable Functions in Authentication Systems: A Mobile Phone Perspective," , 2024. [pdf|bib]
  • R. Chaban, B. Pulfer, and S. Voloshynovskiy, "Assessing the Viability of Synthetic Physical Copy Detection Patterns on Different Imaging Systems," in Proc. 16th IEEE International Workshop on Information Forensics and Security (WIFS), Roma, Italy, 2024. [pdf|bib]
  • J. Tutt and S. Voloshynovskiy, "Provable Performance Guarantees of Copy Detection Patterns," in Proc. 16th IEEE International Workshop on Information Forensics and Security (WIFS), Roma, Italy, 2024. [pdf|bib]
  • I. Oleksiyuk, J. A. Raine, M. Krämer, S. Voloshynovskiy, and T. Golling, "Cluster Scanning: a novel approach to resonance searches," Journal of High Energy Physics, vol. 2024, iss. 6, p. 163, 2024. [pdf|bib]
  • B. Razeghi, M. Gheisari, A. Atashin, D. Kostadinov, S. Marcel, D. Gunduz, and S. Voloshynovskiy, "Group Membership Verification via Nonlinear Sparsifying Transform Learning," IEEE Access, vol. 12, pp. 86739-86751, 2024. [pdf|bib]
  • O. Taran, O. Bait, M. Dessauges-Zavadsky, T. Holotyak, D. Schaerer, and S. Voloshynovskiy, "Challenging interferometric imaging: Machine learning-based source localization from uv-plane observations," Astronomy & Astrophysics (A&A), vol. 674, 2023. [link|bib]
  • B. Razeghi, F. P. Calmon, D. Gündüz, and S. Voloshynovskiy, "Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility," IEEE Transactions on Information Forensics and Security (TIFS), 2023. [pdf|bib]
  • I. Shiri, A. Vafaei Sadr, A. Akhavan, Y. Salimi, A. Sanaat, M. Amini, B. Razeghi, A. Saberi, H. Arabi, S. Ferdowsi, and others, "Decentralized collaborative multi-institutional PET attenuation and scatter correction using federated deep learning," European Journal of Nuclear Medicine and Molecular Imaging, vol. 50, iss. 4, pp. 1034-1050, 2023. [pdf|bib]
  • I. Shiri, Y. Salimi, M. Maghsudi, E. Jenabi, S. Harsini, B. Razeghi, S. Mostafaei, G. Hajianfar, A. Sanaat, E. Jafari, and others, "Differential privacy preserved federated transfer learning for multi-institutional 68Ga-PET image artefact detection and disentanglement," European Journal of Nuclear Medicine and Molecular Imaging (EJNMMI), pp. 1-14, 2023. [pdf|bib]
  • D. Ullmann, O. Taran, and S. Voloshynovskiy, "Multivariate Time Series Information Bottleneck," Entropy, vol. 25, iss. 5, 2023. [link|bib]
  • Y. Belousov, O. Taran, V. Kinakh, and S. Voloshynovskiy, "Stochastic Digital Twin for Copy Detection Patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Nuremberg, Germany, 2023. [pdf|bib]
  • I. Shiri, B. Razeghi, A. Vafaei Sadr, M. Amini, Y. Salimi, S. Ferdowsi, P. Boor, D. Gündüz, S. Voloshynovskiy, and H. Zaidi, "Multi-Institutional PET/CT Image Segmentation Using Federated Deep Transformer Learning," Computer methods and programs in biomedicine, vol. 240, 2023. [pdf|bib]
  • J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, "Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • Y. Belousov, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Digital twins of physical printing-imaging channel," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • B. Pulfer, Y. Belousov, J. Tutt, R. Chaban, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Anomaly localization for copy detection patterns through print estimation," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • R. Chaban, O. Taran, J. Tutt, Y. Belousov, B. Pulfer, T. Holotyak, and S. Voloshynovskiy, "Printing variability of copy detection patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • B. Razeghi, S. Rezaeifar, S. Ferdowsi, T. Holotyak, and S. Voloshynovskiy, "Compressed Data Sharing based on Information Bottleneck Model," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. [pdf|bib]
  • S. Rezaeifar, S. Voloshynovskiy, M. Jirhandeh, and V. Kinakh, "Privacy-Preserving Image Template Sharing Using Contrastive Learning," in Proc. Entropy Journal special issue "Information-Theoretic Approach to Privacy and Security", 2022. [pdf|bib]
  • I. Shiri, A. V. Sadr, M. Amini, Y. Salimi, A. Sanaat, A. Akhavanallaf, B. Razeghi, S. Ferdowsi, A. Saberi, H. Arabi, and others, "Decentralized distributed multi-institutional PET image segmentation using a federated deep learning framework," Clinical Nuclear Medicine, vol. 47, iss. 7, pp. 606-617, 2022. [pdf|bib]
  • B. Pulfer, R. Chaban, Y. Belousov, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach," in Proc. IEEE International Conference on Image Processing (ICIP), Bordeaux, France, 2022. [pdf|bib]
  • I. Shiri, E. Showkatian, R. Mohammadi, B. Razeghi, S. Bagheri, G. Hajianfar, Y. Salimi, M. Amini, M. Ghelich Oghli, S. Ferdowsi, S. Voloshynovskiy, and H. Zaidi, "Collaborative Multi-Institutional Prostate Lesion Segmentation from MR images Using Deep Federated Learning Framework," in Proc. IEEE Nuclear Science Symposium, Medical Imaging Conference, 2022. [pdf|bib]
  • I. Shiri, M. Amini, Y. Salimi, A. Sanaat, A. Saberi, B. Razeghi, S. Ferdowsi, A. V. Sadr, S. Voloshynovskiy, D. Gündüz, A. Rahmim, and H. Zaidi, "Multi-Institutional PET/CT Image Segmentation Using a Decentralized Federated Deep Transformer Learning Algorithm," Journal of Nuclear Medicine, vol. 63, iss. supplement 2, pp. 3348-3348, 2022. [link|bib]
  • O. Taran, J. Tutt, T. Holotyak, R. Chaban, S. Bonev, and S. Voloshynovskiy, "Mobile authentication of copy detection patterns: how critical is to know fakes?," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, 2021. [pdf|bib]
  • V. Kinakh, M. Drozdova, G. Quétant, T. Golling, and S. Voloshynovskiy, "Information-theoretic stochastic contrastive conditional GAN: InfoSCC-GAN," in Proc. Bayesian Deep Learning NeurIPS workshop, 2021. [pdf|bib]
  • R. Chaban, O. Taran, J. Tutt, T. Holotyak, S. Bonev, and S. Voloshynovskiy, "Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, 2021. [pdf|bib]
  • S. Klein, J. A. Raine, S. Pina-Otey, S. Voloshynovskiy, and T. Golling, "Funnels: Exact maximum likelihood with dimensionality reduction." 2021. [pdf|bib]
  • A. A. Atashin, B. Razeghi, D. Gündüz, and S. Voloshynovskiy, "Variational Leakage: The Role of Information Complexity in Privacy Leakage," in Proc. Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021, pp. 91-96. [pdf|bib]
  • V. Kinakh, S. Voloshynovskiy, and O. Taran, "ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets," in Proc. 2nd Visual Inductive Priors for Data-Efficient Deep Learning Workshop, 2021. [pdf|bib]
  • G. Quétant, M. Drozdova, V. Kinakh, T. Golling, and S. Voloshynovskiy, "Turbo-Sim: a generalised generative model with a physical latent space." 2021. [pdf|bib]
  • B. Razeghi, S. Ferdowsi, D. Kostadinov, F. P. Calmon, and S. Voloshynovskiy, "Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, Ontario, Canada, 2021. [pdf|bib]
  • O. Taran, S. Bonev, T. Holotyak, and S. Voloshynovskiy, "Adversarial detection of counterfeited printable graphical codes: towards "adversarial games" in physical world," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020. [pdf|bib]
  • S. Ferdowsi, B. Razeghi, T. Holotyak, F. P. Calmon, and S. Voloshynovskiy, "Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020. [pdf|bib]
  • S. Rezaeifar, M. Diephuis, B. Razeghi, O. Taran, D. Ullmann, and S. Voloshynovskiy, "Distributed Semi-Private Image Classification Based on Information-Bottleneck Principle," in Proc. 28th European Signal Processing Conference (EUSIPCO), Amsterdam, Netherlands, 2020. [pdf|bib]
  • O. Taran, S. Rezaeifar, T. Holotyak, and S. Voloshynovskiy, "Machine learning through cryptographic glasses: combating adversarial attacks by key based diversified aggregation," in Proc. EURASIP Journal on Information Security, 2020. [link|bib]
  • D. Ullmann, S. Rezaeifar, O. Taran, T. Holotyak, B. Panos, and S. Voloshynovskiy, "Information Bottleneck Classification in Extremely Distributed Systems," in Proc. Information-Theoretic Methods for Deep Learning Based Data Acquisition, Analysis and Security, 2020. [link|bib]
  • B. Razeghi, F. P. Calmon, D. Gündüz, and S. Voloshynovskiy, "On Perfect Obfuscation: Local Information Geometry Analysis," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), New York, US, 2020. [pdf|bib]
  • S. Voloshynovskiy, O. Taran, M. Kondah, T. Holotyak, and D. Rezende, "Variational Information Bottleneck for Semi-Supervised Classification," in Proc. Entropy Journal special issue "Information Bottleneck: Theory and Applications in Deep Learning", 2020. [link|bib]
  • S. Voloshynovskiy, M. Kondah, S. Rezaeifar, O. Taran, T. Hotolyak, and D. J. Rezende, "Information bottleneck through variational glasses," in Proc. NeurIPS Workshop on Bayesian Deep Learning, Vancouver, Canada, 2019. [pdf|bib]
  • B. Razeghi, T. Stanko, B. Škoric´, and S. Voloshynovskiy, "Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Delft, Netherlands, 2019. [pdf|bib]
  • M. Gheisari, T. Furon, L. Amsaleg, B. Razeghi, and S. Voloshynovskiy, "Aggregation and Embedding for Group Membership Verification," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019. [pdf|bib]
  • O. Taran, S. Rezaeifar, T. Holotyak, and S. Voloshynovskiy, "Robustification of deep net classifiers by key based diversified aggregation with pre-filtering," in Proc. IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, 2019. [pdf|bib]
  • O. Taran, S. Rezaeifar, T. Holotyak, and S. Voloshynovskiy, "Defending against adversarial attacks by randomized diversification," in Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, USA, 2019. [pdf|bib]
  • S. Rezaeifar, B. Razeghi, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Reconstruction of privacy-sensitive data from protected templates," in Proc. IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan, 2019. [pdf|bib]
  • D. Kostadinov, B. Razeghi, S. Rezaeifar, and S. Voloshynovskiy, "Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features," in Proc. 53rd Annual Conference on Information Systems & Sciencese (CISS), Maryland, USA, 2019. [pdf|bib]
  • O. Taran, S. Bonev, and S. Voloshynovskiy, "Clonability of anti-counterfeiting printable graphical codes: a machine learning approach," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Vector compression for similarity search using multi-layer Sparse Ternary Codes," in Proc. 2018 IEEE Data Science Workshop (DSW2018), Lausanne, Switzerland, 2018. [pdf|bib]
  • D. Ullmann, S.Voloshynovskiy, L.Kleint, S.Krucker, M.Melchior, C.Huwyler, and B.Panos, "DCT-Tensor-Net for solar flares detection on IRIS data," in Proc. in Proc. 7-th European Workshop on Visual Information Processing (EUVIP), Tampere, Finland, 2018. [pdf|bib]
  • M. Ferrari, O. Taran, T. Holotyak, K. Egiazarian, and S. Voloshynovskiy, "Injecting Image Priors into Learnable Compressive Subsampling," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • B. Razeghi, S. Voloshynovskiy, S. Ferdowsi, and D. Kostadinov, "Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • D. Kostadinov, S.Voloshynovskiy, and S.Ferdowsi, "Learning Overcomplete and Sparsifying Transform with Approximate and Exact Closed Form Solutions," in Proc. 7-th European Workshop on Visual Information Processing (Best Student Paper Award), Tampere, Finland, 2018. [pdf|bib]
  • D. Kostadinov, B. Razeghi, S.Voloshynovskiy, and S.Ferdowsi, "Learning Discrimination Specific, Self-Collaborative and Nonlinear Model," in Proc. IEEE Internacial Conference on Big Knowlage (ICBK), Singapore, 2018. [pdf|bib]
  • J. Ramapuram, M. Diephuis, R. Webb, and A. Kalousis, "Variational Saccading: Efficient Inference for Large Resolution Images," in Proc. Neural Information Processing Systems (NeurIPS), Bayesian Deep Learning workshop, Montreal, Canada, 2018. [pdf|bib]
  • S. Bonev and S. Voloshynovskiy, "Secure printing for labels and packaging using industrial digital printers: authentication of printed matrix codes with smartphone cameras," in Proc. 45th Iarigai Conference Advances in Printing and Media Technology: From Printing to Manufacturing, Warsaw, Poland, 2018. [pdf|bib]
  • B. Razeghi and S. Voloshynovskiy, "Privacy-Preserving Outsourced Media Search Using Secure Sparse Ternary Codes," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, Alberta, Canada, 2018. [pdf|bib]
  • S. Rezaeifar, O. Taran, and S. Voloshynovskiy, "Classification by Re-generation: Towards Classification Based on Variational Inference," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • D. Kostadinov, S.Voloshynovskiy, and S.Ferdowsi, "Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor," in Proc. 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. [pdf|bib]
  • O. Taran, S. Rezaeifar, and S. Voloshynovskiy, "Bridging machine learning and cryptography in defence against adversarial attacks," in Proc. Workshop on Objectionable Content and Misinformation (WOCM), ECCV2018, Munich, Germany, 2018. [pdf|bib]
  • D. Kostadinov, S. Volshinovsky, and S. Ferdowsi, "Joint Learning of Local Fingerprint and Content Modulation," in Proc. EUSIPCO, Kos, Grece, 2017. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "A multi-layer image representation using Regularized Residual Quantization: application to compression and denoising," in Proc. ICIP, Beijing, China, 2017. [pdf|bib]
  • O. Taran, S. Rezaeifar, O. Dabrowski, J. Schlechten, T. Holotyak, and S. Voloshynovskiy, "PharmaPack: mobile fine-grained recognition of pharma packages," in Proc. European Signal Processing Conference (EUSIPCO), Kos, Grece, 2017. [pdf|bib]
  • D. Kostadinov, S. Volshinovsky, and S. Ferdowsi, "Learning non-structured, overcomplete and sparsifying transform," in Proc. Signal Processing with Adaptive Sparse Structured Representations (SPARS), Lisbon, Portugal, 2017. [pdf|bib]
  • S. Ferdowsi, S. Volshinovsky, and D. Kostadinov, "Regularized Residual Quantization: a multi-layer sparse dictionary learning approach," in Proc. Signal Processing with Adaptive Sparse Structured Representations (SPARS), Lisbon, Portugal, 2017. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, and T. Holotyak, "Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes," in Proc. 2017 IEEE International Symposium on Information Theory (ISIT) (ISIT'2017), Aachen, Germany, 2017. [pdf|bib]
  • C. Thomas, D. C. A, V. Sviatoslav, and W. J, "Replication of the principal component analyses of the human genome diversity panel [version 1; referees: awaiting peer review]," F1000Research, vol. 6, iss. 278, 2017. [link|bib]
  • B. Razeghi, S. Voloshynovskiy, D. Kostadinov, and O. Taran, "Privacy Preserving Identification Using Sparse Approximation with Ambiguization," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Rennes, France, 2017, pp. 1-6. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Local active content fingerprinting: optimal solution under linear modulation," in Proc. ICIP, Phoenix, USA, 2016. [pdf|bib]
  • T. Charlon, M. Martínez-Bueno, L. Bossini-Castillo, D. F. Carmona, A. Di Cara, J. Wojcik, S. Voloshynovskiy, J. Martín, and M. E. Alarcón-Riquelme, "Single Nucleotide Polymorphism Clustering in Systemic Autoimmune Diseases," PloS one, vol. 11, iss. 8, 2016. [link|bib]
  • T. H. S. Thomas Dewaele Maurits Diephuis, "Forensic authentication of banknotes on mobile phones," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2016. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, S. Ferdowsi, and T. Holotyak, "On local active content fingerprinting: solutions for general linear feature maps," in Proc. ICPR, Cancun, Mexico, 2016. [pdf|bib]
  • S. Voloshynovskiy, P. Bas, and T. Holotyak, "Physical object authentication: detection-theoretic comparison of natural and artificial randomness," in Proc. Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on, Shanghai, China, 2016. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, and T. Holotyak, "Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes," in Proc. Information Forensics and Security (WIFS), 2016 IEEE International Workshop on, 2016, pp. 1-6. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, M. Diephuis, and S. Ferdowsi, "Vector quantization with constrained likelihood for face recognition," in Proc. European Signal Processing Conference (EUSIPCO), Nice, France, 2015. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, S. Ferdowsi, M. Diephuis, and R. Scherer, "Supervised Transform Learning for Face Recognition," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L. A., and Zurada, J. M., Eds., Springer International Publishing, 2015, vol. 9119, pp. 737-746. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, D. Kostadinov, M. Korytkowski, and R. Scherer, "Secure Representation of Images Using Multi-layer Compression," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L. A., and Zurada, J. M., Eds., Springer International Publishing, 2015, vol. 9119, pp. 696-705. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and T. Holotyak, "Sketchprint: Physical object micro-structure identification using mobile phones," in Proc. European Signal Processing Conference (EUSIPCO), Nice, France, 2015. [bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Sparse Multi-layer Image Approximation: Facial Image Compression," ArXiv e-prints, 2015. [pdf|bib]
  • F. Farhadzadeh, F. Willems, and S.Voloshynovskiy, "Information-Theoretical Limits of Active Content Fingerprinting in Content-based Identification Systems," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Rome, Italy, 2015. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Soft content fingerprinting with bit polarization based on sign-magnitude decomposition," Information Forensics and Security, IEEE Transactions on, vol. PP, iss. 99, pp. 1-1, 2015. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2015. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Privacy preserving multimedia content identification for cloud based bag-of-feature architectures," in Proc. Workshop on Cloud Based Media in conjunction with the 2015 IEEE International Conference on Multimedia and Expo (ICME 2015), Torino, Italy, 2015. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and T. Holotyak, "Fine-grained recognition of physical objects on mobile phones: from categorization to identification," in Proc. The Third Workshop on Fine-Grained Visual Categorization (FGVC^3) in conjunction with the CVPR2015 conference, Boston, United-States, 2015. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, D. Kostadinov, F. Farhadzadeh, and T. Holotyak, "On accuracy, robustness and security of bag-of-word search systems," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, and S. Ferdowsi, "Robust human face recognition based on locality preserving sparse over complete block approximation," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • M. Diephuis, F. Beekhof, S. Voloshynovskiy, T. Holotyak, N. Standardo, and B. Keel, "A framework for fast and secure packaging identification on mobile phones," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, and M. Diephuis, "Visual information encoding for face recognition: sparse coding vs vector quantization," in Proc. Symposium on Information Theory in the Benelux, 4th Joint WIC IEEE Symposium on Information Theory and Signal Processing in the Benelux, Eindhoven, Netherlands, 2014. [pdf|bib]
  • T. Nowak, P. Najgebauer, J. Romanowski, M. Gabryel, M. Korytkowski, R. Scherer, and D. Kostadinov, "Spatial Keypoint Representation for Visual Object Retrieval," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {II}, 2014, pp. 639-650. [link|bib]
  • S. Ferdowsi, S. Voloshynovskiy, M. Gabryel, and M. Korytkowski, "Multi-class Classification: {A} Coding Based Space Partitioning," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {II}, 2014, pp. 593-604. [pdf|bib]
  • F. Farhadzadeh, F. Willems, and S. Voloshynovskiy, "Information theoretical analysis of identification based on active content fingerprinting," in Proc. 35th WIC Symposium on Information Theory in the Benelux, Enschede, the Netherlands, 2014, pp. 134-139. [pdf|bib]
  • S. Ferdowsi and S. Voloshynovskiy, "Content identification: machine learning meets coding," in Proc. 35th WIC Symposium on Information Theory in the Benelux, Enschede, the Netherlands, 2014, pp. 113-120. [pdf|bib]
  • S. Ferdowsi, S. Voloshynovskiy, and D. Kostadinov, "Content identification: binary content fingerprinting versus binary content encoding," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V, San Francisco, USA, 2014. [pdf|bib]
  • J. Rygal, J. Romanowski, R. Scherer, and S. Ferdowsi, "Novel Algorithm for Translation from Image Content to Semantic Form," in Proc. Artificial Intelligence and Soft Computing - 13th International Conference, {ICAISC} 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part {I}, 2014, pp. 783-792. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, and T. Holotyak, "Performance analysis of bag-of-features based content identification systems," in Proc. Proceedings of 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. [pdf|bib]
  • D. Kostadinov, S. Voloshynovskiy, S. Ferdowsi, M. Diephuis, and R. Scherer, "Robust Face Recognition by Group Sparse Representation That Uses Samples from List of Subjects," , Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., and Zurada, J., Eds., Springer International Publishing, 2014, vol. 8468, pp. 616-626. [link|bib]
  • F. Farhadzadeh and S. Voloshynovskiy, "Active Content Fingerpriting," Information Forensics and Security, IEEE Transactions on, vol. 9, iss. 6, pp. 905-920, 2014. [pdf|bib]
  • F. Farhadzadeh, F. M. J. Willems, and S. Voloshynovskiy, "Fundamental Limits of Identification: Identification rate, search and memory complexity trade--off," in Proc. IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 2013. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, and F. Beekhof, "Physical object identification based on FAMOS microstructure fingerprinting: comparison of templates versus invariant features," in Proc. 8th International Symposium on Image and Signal Processing and Analysis, Trieste, Italy, 2013. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Active content fingerprinting: Shrinkage and lattice based modulations," in Proc. Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, 2013, pp. 3073-3077. [bib]
  • S. Voloshynovskiy, M. Diephuis, F. Beekhof, and F. Farhadzadeh, "Physical object authentication with correlated camera noise.," in Proc. 15. GI-Fachtagung Datenbanksysteme für Business, Technologie und Web(BTW), Magdeburg, Germany, 2013. [pdf|bib]
  • S.Voloshynovskiy, T. Holotyak, O. Koval, and F. Farhadzadeh, "Physical-layer Security based on Gaussian Wiretap Channel with Collaborative Wiretappers," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. J. Koval, "Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding," IEEE Transactions on Information Forensics and Security, vol. 7, iss. 5, pp. 1652-1667, 2012. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, and F. Farhadzadeh, "Content Authentication and Identification under Informed Attacks," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • S.Voloshynovskiy, F. Farhadzadeh, O. Koval, and T. Holotyak, "Active content fingerprinting: a marriage of digital watermarking and content fingerprinting," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • S. Voloshynovskiy, M. Diephuis, F. Beekhof, O. Koval, and B. Keel, "Towards Reproducible results in authentication based on physical non-cloneable functions: The Forensic Authentication Microstructure Optical Set (FAMOS)," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Robust Message-Privacy Preserving Image Copy Detection for Cloud-based Systems," in Proc. CBMI 2012,10th Workshop on Content-Based Multimedia Indexing, 2012. [pdf|bib]
  • N. Grigoryan, A. Harutyunyan, S. Voloshynovskiy, and O. Koval, "On Multiple Hypothesis Testing with Rejection Option," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • V. Balakirsky, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Information Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting," in Proc. CSIT 2011, Yerevan, Armenia, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and F. Farhadzadeh, "Identification In Desynchronization Channels," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • A. Harutyunyan, N. Grigoryan, S. Voloshynovskiy, and O. Koval, "A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects," in Proc. Biometrie - BIOSIG2011 CAST workshop, Darmstadt, Germany, 2011. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, O. Koval, F. Beekhof, and F. Farhadzadeh, "Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital Identification," in Proc. IEEE ITW, Paraty, Brazil, 2011. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Theoretic Multiclass Classification Based on Binary Classifiers," Signal Processing Systems, vol. 65, pp. 413-430, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, T. Holotyak, and F. Beekhof, "Information-theoretic analysis of desynchronization invariant object identification," in Proc. International Conference on Acoustics, Speech and Signal Processing ICASSP2011, Prague, Czech Republic, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Information-theoretic analysis of content based identification for correlated data," in Proc. IEEE Information Theory Workshop (ITW), Paraty, Brazil, 2011, pp. 205-209. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, O. Koval, T. Holotyak, and F. Beekhof, "Statistical analysis of digital image fingerprinting based on random projections," in Proc. Image and Signal Processing and Analysis (ISPA), 2011 7th International Symposium, Dubrovnik, Croatia, 2011. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Trading-off privacy-complexity of identification problem," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Farhadzadeh, T. Holotyak, and F. Beekhof, "Geometrically robust perceptual fingerprinting: an asymmetric case," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Statistical Analysis of Binarized SIFT Descriptors," in Proc. 7th International Symposium on Image and Signal Processing and Analysis, 2011. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, F. Farhadzadeh, O. Koval, and F. Beekhof, "Fast physical object identification based on unclonable features and soft fingerprinting," in Proc. International Conference on Acoustics, Speech and Signal Processing ICASSP2011, Prague, Czech Republic, 2011. [pdf|bib]
  • S. Voloshynovskiy, T. Holotyak, O. Koval, F. Beekhof, and F. Farhadzadeh, "Private content identification based on soft fingerprinting," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII, San Francisco, USA, 2011. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Privacy Preserving Identification: Order Statistics List Decoding Perspective," in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "On Accuracy, Privacy and Complexity in the Identification Problem," in Proc. Proceedings of SPIE / Multimedia Content Access: Algorithms and Systems IV, San Jose, USA, 2010. [pdf|bib]
  • T. Holotyak, S. Voloshynovskiy, F. Beekhof, and O. Koval, "Fast identification of highly distorted images," in Proc. Proceedings of SPIE / Media Forensics and Security XII, San Jose, USA, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, T. Holotyak, F. Beekhof, and F. Farhadzadeh, "Privacy amplification of content identification based on fingerprint bit reliability," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, Seattle, The USA, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Content Identification Based on digital fingerprint: what can be done if ML decoding fails?," in Proc. IEEE International Workshop on Multimedia Signal Processing, Saint-Malo, France, 2010. [bib]
  • O. Koval and S. Voloshynovskiy, "Multimodal object authentication with random projections: a worst-case approach," in Proc. Proceedings of SPIE / Media Forensics and Security XII, San Jose, USA, 2010-1-21-24 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Content-Identification: towards Capacity Based on Bounded Distance Decoder," in Proc. Applications of Information Theory, Coding and Security, Yerevan, Armenia, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, F. Farhadzadeh, and T. Holotyak, "Information-Theoretical Analysis of Private Content Identification," in Proc. IEEE Information Theory Workshop, ITW2010, Dublin, Ireland, 2010. [pdf|bib]
  • F. Farhadzadeh, S. Voloshynovskiy, and O. Koval, "Performance Analysis of Identification System Based on Order Statistics List Decoder," in Proc. IEEE International Symposium on Information Theory, Austin, TX, 2010. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Perez-Gonzalez, and M. K. Mihcak, "Informed data-hiding with partial side information at the decoder," submitted to Signal Processing, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Conception and limits of robust perceptual hashing: toward side information assisted hash functions," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Random projections based item authentication," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. Vila-Forcén, and P. Comesana-Alfaro, "Partially reversible data hiding with pure message communications over state-dependent channels," Signal Processing, 2009. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Multi-class Classifiers based on Binary Classifiers: Performance, Efficiency, and Minimum Coding Matrix Distances," in Proc. Proceedings of the IEEE International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Grenoble, France, 2009. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, P. Bas, and F. Cayre, "On security threats for robust perceptual hashing," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging / Media Forensics and Security XI, San Jose, USA, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Multi-class Classifiers based on Binary Classifiers: On Coding Matrix Design, Reliability and Maximum Number of Classes," in Proc. Proceedings of the IEEE International Workshop on MACHINE LEARNING FOR SIGNAL PROCESSING, Grenoble, France, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, Secure item identification and authentication system based on unclonable features, 2009. [bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Holotyak, "Binary Robust Hashing based on Probabilistic Bit Reliability," in Proc. Proceedings of the Workshop on Statistical Signal Processing, Cardiff, UK, 2009. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, T. Holotyak, and F. Beekhof, "Privacy enhancement of common randomness based authentication: key rate maximized case," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, London, UK, 2009. [pdf|bib]
  • S. Voloshynovskiy, F. Beekhof, O. Koval, and T. Holotyak, "On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption," in Proc. Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain, Lausanne, Switzerland, 2009. [pdf|bib]
  • F. Beekhof, S. Voloshynovskiy, O. Koval, and T. Holotyak, "Fast identification algorithms for forensic applications," in Proc. Proceedings of IEEE International Workshop on Information Forensics and Security, London, UK, 2009. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Beekhof, and T. Pun, "Security Analysis of Robust Perceptual Hashing," in Proc. Steganography, and Watermarking of Multimedia Contents X, (SPIE, Bellingham, WA 2008) 681906, 2008. [ps| link|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Multimodal authentication based on random projections and distributed coding," in Proc. Proceedings of the 10th ACM Workshop on Multimedia \& Security, Oxford, UK, 2008. [pdf|bib]
  • R. Vill√°n Sebasti√°n, "Authentication of electronic and printed text documents," PhD Thesis , 2008. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Privacy-Preserving Biometric Person Identification," in Proc. Proceedings of the 16th European Signal Processing Conference, Lausanne, Switzerland, 2008. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Privacy-Preserving Multimodal Person and Object Identification," in Proc. Proceedings of the 10th ACM Workshop on Multimedia \& Security, Oxford, UK, 2008. [ps|bib]
  • F. Beekhof, O. Koval, R. Villán, S. Voloshynovskiy, and E. Topak, "Document Forensics based on Steganographic Anti-Counterfeiting Markings and Mobile Architectures," in Proc. Proceedings of eForensics, 2008. [pdf|bib]
  • M. Haroutunian, S. Tonoyan, O. Koval, and S. Voloshynovskiy, "On reversible information hiding system," in Proc. Proceedings of the IEEE International Symposium on Information Theory, Toronto, Ontario, Canada, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, R. Villán, F. Beekhof, and T. Pun, "Authentication of Biometric Identification Documents via Mobile Devices," Journal of Electronic Imaging, 2008. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Unclonable identification and authentication based on reference list decoding," in Proc. Proceedings of the conference on Secure Component and System Identification, Berlin, Germany, 2008. [pdf|bib]
  • T. Schürmann, Doppel-Herz: Parallelprogrammierung in C++ mit der OMPTL, 2008. [link| link|bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Error exponent analysis of person identification based on fusion of dependent/independent modalities," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007. [pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007. [pdf| ps.gz| pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, "Robust perceptual hashing as classification problem: decision-theoretic and practical considerations," in Proc. Proceedings of the IEEE 2007 International Workshop on Multimedia Signal Processing, Chania, Crete, Greece, 2007. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Beekhof, and T. Pun, "Decision-theoretic consideration of robust perceptual hashing: link to practical algorithms," in Proc. WaCha2007, /Third WAVILA Challenge/, Saint Malo, France, 2007. [pdf|bib]
  • J. Kronegg, G. Chanel, S. Voloshynovskiy, and T. Pun, "EEG-based synchronized brain-computer interfaces: a model for optimizing the number of mental tasks," IEEE transactions on neural systems and rehabilitation engineering, vol. 15, iss. 1, 2007. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Analysis of multimodal binary detection systems based on dependent/independent modalities," in Proc. Proceedings of the IEEE 2007 International Workshop on Multimedia Signal Processing, Chania, Crete, Greece, 2007. [pdf|bib]
  • T. Schneider, Syst√®me de protection des marques bas√© sur l'identification d'un signal audio, 2007. [bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Quality Enhancement of printed-and-scanned Images using distributed coding," Signal Processing, vol. 87, iss. 6, pp. 1301-1313, 2007. [pdf|bib]
  • I. Sarikaya, Les codes √ barres multi-niveaux √ deux dimensions, 2007. [bib]
  • E. Topak, "Information-theoretic performance and security analysis of geometrically structured data-hiding codes," PhD Thesis , 2007. [bib]
  • J. -M. Pignat, O. Koval, S. Voloshynovskiy, and T. Pun, "From non-stationary Gaussian modelling to independent component analysis: an fMRI study," in Proc. Lemanic-Neuroscience Annual Meeting, Les Diablerets, Switzerland, 2007. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Costa problem under channel ambiguity," in Proc. Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Toulouse, France, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Performance analysis of non-uniform quantization-based data-hiding," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, E. Topak, and T. Pun, "Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Security,Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, J. E. Vila-Forcén, E. Topak, F. Deguillaume, Y. Rytsar, and T. Pun, "Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, USA, 2006. [pdf| ps.gz| pdf|bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, "Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management," IEEE Transactions on Information Forensics and Security, vol. 1, iss. 4, pp. 405-420, 2006. [pdf| ps.gz|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, and T. Pun, "Message Communications And Channel State Estimation For State Dependent Channels," in Proc. Proceedings of 27-th Symposium on information theory in the Benelux, Noordwijk, The Netherlands, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, R. Villán, E. Topak, J. E. Vila-Forcén, F. Deguillaume, Y. Rytsar, and T. Pun, "Information-Theoretic Analysis of Electronic and Printed Document Authentication," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, USA, 2006. [pdf| pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, V. J. E. Forcen, and T. Pun, "On reversibility of random binning based data-hiding techniques: security perspectives," in Proc. ACM Multimedia and Security Workshop 2006, Geneva, Switzerland, 2006. [ps|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, BRANDS PROTECTION AND PRODUCT AUTHENTICATION USING PORTABLE DEVICES, 2006. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Facial Image Compression Based on Structured Codebooks in Overcomplete Domain," {EURASIP} Journal on Applied Signal Processing, Frames and overcomplete representations in signal processing, communications, and information theory special issue, vol. 2006, iss. Article {ID} 69042, pp. 1-11, 2006. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, K. M. Mihcak, and T. Pun, "The Edge Process Model and Its Application to Information Hiding Capacity Analysis," IEEE Trans. on Signal Processing, vol. 54, iss. 5, pp. 1813-1825, 2006. [pdf|bib]
  • T. Pun, T. I. Alecu, G. Chanel, and S. Voloshynovskiy, "Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva," IEEE transactions on neural systems and rehabilitation engineering, Special Issue on Brain-Computer Interaction, vol. 14, iss. 2, 2006. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, M. E. Haroutunian, J. E. Vila-Forcén, and T. Pun, "E-capacity analysis of data-hiding channels with geometrical attacks," in Proc. Proceedings of SPIE Electronic Imaging 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII (EI121), San Jose, USA, 2006. [ps|bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "The Gaussian Transform of distributions: definition, computation and application," IEEE Transactions on Signal Processing, vol. 54, pp. 2976-2985, 2006. [pdf|bib]
  • J. E. Vila-Forcén, O. Koval, S. Voloshynovskiy, and T. Pun, "Asymmetric side information and non-noticable Costa data-hiding," in Proc. Proceedings of SPIE Photonics West, Security and watermarking of multimedia contents, San Jose, CA, USA, 2006. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Host communications for non-Gaussian state-dependent channels: Laplacian case," in Proc. Proceedings of International Conference on Multimedia and Expo, Toronto, Canada, 2006. [bib]
  • J. Vila Forcen, "Digital data-hiding based identification systems," PhD Thesis , 2006. [bib]
  • S. Voloshynovskiy, O. Koval, and M. and Lozynska, "Novel interactive services for e-tourism and e-commerce," in Proc. Proceedings of International Conference on, Montreux, Switzerland, 2006. [bib]
  • O. Koval, S. Voloshinovskiy, and T. Pun, "Analysis of modality dependence/independence impact on the performance of multimodal fusion systems: Summary of main results," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 06.12, 2006. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, T. Holotyak, and T. Pun, "Information-theoretic analysis of steganalysis in real images," in Proc. ACM Multimedia and Security Workshop 2006, Geneva, Switzerland, 2006. [ps|bib]
  • Y. Rytsar, S. Voloshynovskiy, O. Koval, F. Deguillaume, E. Topak, S. Startchik, and T. Pun, "Tangible interactive system for document browsing and visualisation of multimedia data," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2006, Multimedia Content Analysis, Management, and Retrieval 2006 (EI122), San Jose, USA, 2006. [bib]
  • L. Pérez-Freire, F. Pérez-González, and S. Voloshynovskiy, "An Accurate Analysis of Scalar Quantization-Based Data Hiding," IEEE Transactions on Information Forensics and Security, vol. 1, iss. 1, pp. 80-86, 2006. [pdf|bib]
  • J. Kronegg, G. Chanel, S. Voloshynovskiy, and T. Pun, Information-transfer rate based performance optimization for brain-computer interfacesHeraklion, Greece: , 2006. [bib]
  • O. Koval, S. Voloshynovskiy, and T. Pun, "Laplacian channel state estimation for state dependent channels," in Proc. Proceedings of 27-th Symposium on information theory in the Benelux, Noordwijk, The Netherlands, 2006. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, J. E. Vila-Forcén, F. Pérez-González, F. Deguillaume, and T. Pun, "Robustness Improvement of Known-Host-State Watermarking Using Host Statistics," Elsevier Science, Signal Processing, vol. 86, iss. 5, pp. 1076-1088, 2006. [pdf|bib]
  • O. Koval, "Stochastic image modeling in data hiding applications," PhD Thesis , 2005. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-González, and T. Pun, "Worst case additive attack against quantization-based data-hiding methods," in Proc. Proceedings of {SPIE} Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents {VII (EI120)}, San Jose, USA, 2005. [pdf| pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, K. M. Mihcak, and T. Pun, "Towards geometrically robust data-hiding with structured codebooks," {ACM} Multimedia Systems Journal, Special Issue on Multimedia and Security, vol. 11, iss. 2, pp. 121-132, 2005. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, M. K. Mihcak, and T. Pun, "Security analysis of robust data hiding with geometrically structured codebooks," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, USA, 2005. [pdf| ps| pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Achievable Rate Analysis of Geometrically Robust Data-Hiding Codes In Asymptotic Set-ups," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, Turkey, 2005. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, J. E. Vila-Forcén, and T. Pun, "On Security of Geometrically-Robust Data-Hiding," in Proc. WIAMIS 2005, 6th International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland, 2005. [pdf|bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Denoising with infinite mixture of Gaussians," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, Turkey, 2005. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Asymmetric spread spectrum data-hiding for Laplacian host data," in Proc. {IEEE} International Conference on Image Processing, Genova, Italy, 2005. [pdf|bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Information-transfer rate modeling of EEG-based synchronized brain-computer interfaces," University of Geneva, Computer Vision and Multimedia Laboratory, Computing Centre, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 05.03, 2005. [pdf|bib]
  • Y. Rytsar, F. Deguillaume, S. Voloshynovskiy, E. Rivera, and T. Pun, "Text document data-hiding: security and multimedia perspectives," in Proc. 5th International Conference on Computer Science and Information Technologies {CSIT 2005}, Yerevan, Armenia, 2005. [bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva," Technical report TR0501, Computer Science Department, University of Geneva, 05.01, 2005. [bib]
  • J. Kronegg, T. Alecu, G. Chanel, S. Voloshynovskiy, and T. Pun, "Analyse des mesures de débit pour interfaces cerveau-ordinateur," in Proc. TAIMA'2005, Traitement et Analyse de l'Information : Méthodes et Applications, Hammamet, Tunisia, 2005. [bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Analysis of bit-rate definitions for Brain-Computer Interfaces," in Proc. Proceedings of the 2005 Int. Conf. on Human-computer Interaction {(HCI'05)}, Las Vegas, Nevada, USA, 2005. [pdf|bib]
  • J. -M. Pignat, S. Voloshynovskiy, O. Koval, V. Ibanez, and T. Pun, "Non-stationary Gaussian spatio-temporal modeling of fMRI data," in Proc. Brain'05 & BrainPET'05, XXIInd International Symposium on Cerebral Blood Flow, Metabolism, and Function and VIIth International Conference on Quantification of Brain Function with PET, June 7-11, 2005, Vrije Universiteit Amsterdam, The Netherlands, 2005. [bib]
  • O. Koval, S. Voloshynovskiy, F. Deguillaume, F. Perez-Gonzalez, and T. Pun, "Robustness improvement of known-host-state watermarking using host statistics," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, USA, 2005. [pdf|bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Research in Brain-computer interaction, Multimodal Interaction Group, Computer Vision and Multimedia Laboratory, University of Geneva," in Proc. BCI 2005, Brain-Computer Interface Technology: Third International Meeting, Rensselaerville, NY, USA, 2005. [bib]
  • T. Pun, T. I. Alecu, G. Chanel, J. Kronegg, and S. Voloshynovskiy, "Brain-computer interaction research at the Computer Vision and Multimedia Laboratory, University of Geneva," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 05.01, 2005. [bib]
  • T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg, Austria, 2005. [bib]
  • F. Deguillaume, Y. Rytsar, S. Voloshynovskiy, and T. Pun, "Data-hiding based text document security and automatic processing," in Proc. IEEE International Conference on Multimedia \& Expo (ICME) 2005, Amsterdam, The Netherlands, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Multimedia Security: open problems and solutions," in Proc. In Proceedings of NATO - Advanced Study Institute: Securitty Through Science Program, Nork, Yerevan, Armenia, 1-12 October, 2005, Yerevan, Armenia, 2005. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Pérez-González, K. M. Mihcak, J. E. Vila-Forcén, and T. Pun, "Data-hiding with partially available side information," in Proc. {EUSIPCO} 2005, 13th European Signal Processing Conference, Antalya, 2005. [pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Pérez-Gonález, and T. Pun, "Practical Data-Hiding: Additive Attacks Performance Analysis," in Proc. International Workshop on Digital Watermarking, Siena, Italy, 2005, pp. 244-259. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. E. Vila-Forcén, P. Comesana, and T. Pun, "On reversibility of random binning techniques: multimedia perspectives," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg, Austria, 2005. [pdf| ps|bib]
  • S. Voloshynovskiy, O. Koval, F. Perez-Gonzales, M. K. Michak, J. E. Vila-Forcén, and T. Pun, "Data-hiding with asymmetrically available side information at encoder and decoder," in Proc. Proceedings of European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • S. Voloshynovskiy, Y. Rytsar, O. Koval, and T. Pun, "Document interactive navigation in multimodal databases," in Proc. SIMILAR NOE Workshop, Paris, France, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, E. Topak, J. E. Vila-Forcén, P. Comesaña, and T. Pun, "On reversibility of random binning techniques," in Proc. Proceedings of 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 108-118. [bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Joint Achievable Rate-Complexity Analysis of Geometrically Robust Data-hiding Codes in Asymptotic Set-ups," in Proc. Proceedings of European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Image denoising based on the edge-process model," Signal Processing, vol. 85, iss. 10, pp. 1950-1969, 2005. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Denoising with infinite mixture of Gaussians," in Proc. Eusipco 2005, 13th. European Signal Processing Conference, Sept. 4-8, Antalya, Turkey, 2005. [bib]
  • R. Villán, S. Voloshynovskiy, F. Deguillaume, Y. Rytsar, O. Koval, E. Topak, E. Rivera, and T. Pun, "A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents," in Proc. Proceedings of 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, Salzburg, Austria, 2005, pp. 280-281. [pdf| ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Information-theoretic data-hiding: Recent achievements and open problems," International Journal of Image and Graphics, vol. 5, iss. 1, pp. 1-31, 2005. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "The Gaussian transform," in Proc. 13th. European Signal Processing Conference, Antalya, Turkey, 2005. [bib]
  • R. Villán, S. Voloshynovskiy, O. Koval, and T. Pun, "Multilevel 2D Bar Codes: Towards High Capacity Storage Modules for Multimedia Security and Management," in Proc. Proceedings of {SPIE-IS&T} Electronic Imaging 2005, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, USA, 2005, pp. 453-464. [pdf| ps.gz| pdf|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, F. Pérez-Gonález, O. Koval, and T. Pun, "Quantization-Based Methods: Additive Attacks Performance Analysis," IEEE Transactions on Signal Processing, 2005. [bib]
  • L. Perez-Freire, F. Perez-Gonzalez, and S. Voloshynovskiy, "Revealing the true achievable rates of scalar Costa scheme," in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [pdf|bib]
  • J. -M. Pignat, S. Voloshynovskiy, O. Koval, V. Ibanez, and T. Pun, "Non-stationary Gaussian spatio-temporal modeling of fMRI data," in Proc. First Meeting of the Lemanic Neuroscience Programs, UniGe/UNIL Doctoral School in Neuroscience and the EPFL Doctoral Program, Les Diablerets, Switzerland, 2004. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, F. Perez-gonzalez, and T. Pun, "Worst Case Additive Attack against Quantization-Based Watermarking Techniques," in Proc. IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Visual communications with side information via distributed printing channels: extended multimedia and security perspectives," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2004, Multimedia Processing and Applications, San Jose, USA, 2004. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Capacity analysis of periodical watermarking," in Proc. EUSIPCO-2004, 12th European Signal Processing Conference, Vienna, Austria, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Pérez-González, K. Mihcak, and T. Pun, "Data-hiding with host state at the encoder and partial side information at the decoder," , 2004. [pdf|bib]
  • J. E. Vila-Forcén, O. Koval, and S. Voloshynovskiy, "Distributed single source coding with side information," in Proc. Proceedings of SPIE Photonics West, Electronic Imaging 2004, Image Processing, San Jose, USA, 2004. [pdf|bib]
  • Y. Rytsar, S. Voloshynovskiy, F. Ehrler, and T. Pun, "Interactive segmentation with hidden object based annotations: towards smart media," in Proc. Proceedings of SPIE Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, 2004. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, Character and vector graphics watermark for structured electronic documents security, 2004. [bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system: lower bounds and optimality," in Proc. EUSIPCO 2004, 12th European Signal Processing Conference, Vienna, Austria, 2004. [pdf|bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "EEG Cortical Imaging: A Vector Field Approach For Laplacian Denoising And Missing Data Estimation," in Proc. IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'04), Arlington, VA, 2004. [pdf|bib]
  • E. Topak, S. Voloshynovskiy, O. Koval, and T. Pun, "Capacity-security analysis of repetitive watermarking," in Proc. Proceedings of European Signal Processing Conference, Vienna, Austria, 2004. [bib]
  • J. Kronegg, S. Voloshynovskiy, and T. Pun, "Brain-computer interface model: Upper-capacity bound, signal-to-noise ratio estimation, and optimal number of symbols," Computer Vision and Multimedia Laboratory, Computing Centre, University of Geneva, Rue Général Dufour, 24, CH-1211, Geneva, Switzerland, 04.03, 2004. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Joint compression of independent modalities in smart meeting rooms applications," in Proc. SIMILAR NOE Workshop, Lausanne, Switzerland, 2004. [bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Distributed single source coding framework for passport photo images," in Proc. Joint AMI-PASCAL-IM2-M4 Workshop on Multimodal Interaction and Related Machine Learning Algoritms, Martigny, Switzerland, 2004. [bib]
  • T. Alecu, S. Voloshynovskiy, and T. Pun, "Regularized two-step brain activity reconstruction from spatio-temporal EEG data," in Proc. Image Reconstruction from Incomplete Data III, SPIE International Symposium on Optical Science and Technology, Denver, Colorado, USA, 2004. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Perez-Gonzalez, F. Deguillame, and T. Pun, "Quantization-based watermarking performance improvement using host statistics: AWGN attack case," in Proc. ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, 2004. [pdf|bib]
  • O. Koval, S. Voloshynovskiy, F. Deguillaume, F. Perez-gonzalez, and T. Pun, "Spread spectrum watermarking for real images: is everything so hopeless?," in Proc. Proceedings of 12th European Signal Processing Conference, EUSIPCO 2004, Vienna, Austria, 2004. [pdf|bib]
  • S. Voloshynovskiy, Y. Rytsar, O. Koval, and T. Pun, "Information-theoretic visual communications in human-computer interfaces: Interactive segmentation," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications," in Proc. 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS) 2003, Nis, Yugoslavia, 2003. [ps| pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Secure hybrid robust watermarking resistant against tampering and copy-attack," Signal Processing, vol. 83, iss. 10, pp. 2133-2170, 2003. [pdf|bib]
  • F. Ehrler, Segmentation interactive pour la cr√©ation d'images intelligentes bas√©es sur les informations cach√©es, 2003. [bib]
  • Y. Rytsar, S. Voloshynovskiy, O. Koval, F. Deguillaume, J. E. Vila-Forcén, and T. Pun, "Smart Media: from basic concepts to applications," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system : electrode misplacement sensitivity," in Proc. NCCR (IM)2 Interactive Multimodal Information Management Workshop, MartignyCrans-Montana, Switzerland, October 6-8, 2003, 2003. [bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Robust digital watermarking with channel state estimation: part I Approaching theoretical capacity," Signal Processing, 2003. [link| link|bib]
  • J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, and T. Pun, "Low bit rate image compression using a non-stationary geometrical image priors," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • T. I. Alecu, S. Voloshynovskiy, and T. Pun, "Localization properties of an EEG sensor system: electrode misplacement sensitivity," in Proc. IM2 Interactive Information Management Workshop, Martigny Crans-Montana, Switzerland, 2003. [bib]
  • S. Voloshynovskiy, F. Deguillaume, O. Koval, and T. Pun, "Robust digital watermarking with channel state estimation: part II Applied robust watermarking," Signal Processing, 2003. [link| link|bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Wavelet-based image denoising using non-stationary stochastic geometrical image priors," in Proc. SPIE Photonics West, Electronic Imaging 2003, Image and Video Communications and Processing V, Santa Clara, CA, USA, 2003. [ps.gz| pdf|bib]
  • Y.Rytsar, S.Voloshynovskiy, and T.Pun, "Metadata Representation for Semantic-Based Multimedia Security and Management," in Proc. On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, Catania, Italy, 2003, pp. 769-778. [pdf|bib]
  • S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, "Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models," in Proc. SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, 2003. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, T. Pun, J. Fridrich, F. Perez-Gonzales, and N. Memon, "Special issue on Security of Digital Data Hiding Technologies," Signal Processing, vol. 83, iss. 10, 2003. [bib]
  • S. Voloshynovskiy, Robust digital watermarking: state-of-the-art and benchmarking, 2002. [bib]
  • S. Voloshynovskiy, A. Herrigel, Y. Rytsar, and T. Pun, "{StegoWall}: Blind Statistical Detection of Hidden Data," in Proc. Proceedings of {SPIE} Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents {IV}, San Jose, USA, 2002. [pdf|bib]
  • S. Voloshynovskiy and A. Herrigel, Robustness of Watermarks and Intentional Attacks, 2002. [bib]
  • S. Voloshynovskiy, O. Koval, and T. Pun, "Wavelet-based denoising using stochastic geometrical priors," in Proc. IM2 Interactive Information Management Workshop, Martigny, Switzerland, 2002. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, A method for hybrid robust watermarking and tamper proofing, 2002. [bib]
  • S. Voloshynovskiy and T. Pun, "Capacity-security analysis of data hiding technologies," in Proc. Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002), Lausanne, Switzerland, 2002. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Hybrid robust watermarking resistant against copy attack," in Proc. Proceedings of the European Signal Processing Conference {(EUSIPCO2002)}, Toulouse, France, 2002. [pdf|bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, A method for the estimation and recovering of general affine transform, 2002. [bib]
  • F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Method for the Estimation and Recovering from General Affine Transforms in Digital Watermarking Applications," in Proc. SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, 2002. [ps.gz| pdf|bib]
  • A. Herrigel and S. Voloshynovskiy, "Counterfeit Attacks against a new Currency Protection Scheme," in Proc. Int. Conf. on Communications and Multimedia Security CMS2001, Darmstadt, Germany, 2001. [bib]
  • A. Synyavskyy, S. Voloshynovskiy, and I. Prudyus, "Wavelet-Based {MAP} Image Denoising Using Provably Better Class of Stochastic I.I.D. Image Models," Facta Universitatis (Nis), vol. 14, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, A. Herrigel, and T. Pun, "Blur/deblur attack against document protection systems based on digital watermarking," in Proc. Information Hiding Workshop, Pittsburgh, PA, USA, 2001. [pdf| ps.gz|bib]
  • I. Prudyus, S. Voloshynovskiy, A. Synyavskyy, T. Holotyak, and L. Lazko, "Generalized radar/radiometry imaging problems," Journal of Telecommunications and Information Technology, vol. 4, pp. 15-20, 2001. [pdf|bib]
  • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack modelling: Towards a second generation benchmark," Signal Processing, vol. 81, iss. 6, pp. 1177-1214, 2001. [ps.gz| pdf|bib]
  • A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, "The Watermark Template Attack," in Proc. SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, Method for Digital Watermarking Robust Against Local and Global Geometrical Distortions and Projective Transforms, 2001. [bib]
  • S. Pereira, S. Voloshynovskiy, M. Madueño, S. Marchand-Maillet, and T. Pun, "Second generation benchmarking and application oriented evaluation," in Proc. Information Hiding Workshop, Pittsburgh, PA, USA, 2001. [pdf| ps.gz|bib]
  • F. Deguillaume, S. Voloshynovskiy, S. Pereira, M. Madueño, and T. Pun, Filigranage D'images Digitales, 2001. [bib]
  • S. Voloshynovskiy, S. Pereira, T. Pun, J. Eggers, and J. Su, "Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks," IEEE Communications Magazine (Special Issue on Digital watermarking for copyright protection: a communications perspective), vol. 39, iss. 8, pp. 118-127, 2001. [pdf| ps.gz|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Optimal transform domain watermark embedding via linear programming," Signal Processing, Special Issue: Information Theoretic Issues in Digital Watermarking, 2001. [pdf| ps.gz|bib]
  • S. Voloshynovskiy and T. Pun, "Stochastic Digital Image Watermarking," in Proc. {IEEE/ISSPA} {ISSPA} 2001, 6th Int. Symposium on Signal Processing and its Applications, Kuala-Lumpur, Malaysia, 2001. [bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, "Multibit Digital Watermarking Robust Against Local Nonlinear Geometrical Distortions," in Proc. {IEEE} International Conference on Image Processing, {ICIP2001}, Thessaloniki, Greece, 2001, pp. 999-1002. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, "Optimal adaptive diversity watermarking with channel state estimation," in Proc. SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 2001. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack Modelling: Towards a Second Generation Watermarking Benchmark," Computer Vision Group, Computing Centre, University of Geneva, rue Général Dufour, 24, CH-1211 Genève, Switzerland, 00.05, 2000. [bib]
  • S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun, "Generalized watermark attack based on watermark estimation and perceptual remodulation," in Proc. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, California USA, 2000. [pdf| pdf|bib]
  • S. Voloshynovskiy, F. Deguillaume, S. Pereira, A. Herrigel, and T. Pun, Method for adaptive digital watermarking robust against geometric transforms, 2000. [bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, A method for generating and decoding image dependant watermarks, 2000. [bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Effective channel coding for DCT watermarks," in Proc. IEEE International Conference on Image Processing ICIP 2000, Vancouver, Canada, 2000. [pdf| ps.gz|bib]
  • S. Pereira, S. Voloshynovskiy, and T. Pun, "Optimized wavelet domain watermark embedding strategy using linear programming," in Proc. Wavelet Applications VII (part of SPIE AeroSense 2000), Orlando, Florida USA, 2000. [pdf| ps.gz|bib]
  • M. Kutter, S. Voloshynovskiy, and A. Herrigel, "Watermark copy attack," in Proc. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, California USA, 2000. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, A. Allen, and Z. Hrytskiv, "Robust edge-preserving image restoration in the presence of non-Gaussian noise," Electronics Letters, 2000. [bib]
  • S. Voloshynovskiy, F. Deguillaume, and T. Pun, "Content adaptive watermarking based on a stochastic multiresolution image modeling," in Proc. Tenth European Signal Processing Conference (EUSIPCO'2000), Tampere, Finland, 2000. [ps.gz| pdf|bib]
  • S. Voloshynovskiy, A. Herrigel, F. Jordan, N. Baumgärtner, and T. Pun, "A noise removal attack for watermarked images," in Proc. Multimedia and Security Workshop, Orlando, Florida, USA, 1999. [bib]
  • S. Voloshynovskiy, A. Herrigel, N. Baumgärtner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Proc. International Workshop on Information Hiding, Dresden, Germany, 1999, pp. 212-236. [ps.gz| pdf|bib]
  • A. Herrigel, S. Voloshynovskiy, and Z. Hrytskiv, "Optical/digital identification/verification system based on digital watermarking technology," in Proc. SPIE International Workshop on Optoelectronic and Hybrid Optical/Digital Systems for Image/Signal Processing ODS'99, Lviv, Ukraine, 1999. [pdf|bib]
  • S. Voloshynovskiy, S. Pereira, and T. Pun, "Watermark attacks," in Proc. Erlangen Watermarking Workshop, Erlangen, Germany, 1999. [pdf|bib]
  • Z. Hrytskiv, S. Voloshynovskiy, and A. Allen, "High resolution radar imaging systems with robust image restoration," in Proc. IEEE International Microwave and Radar Conference, Krakow, Poland, 1998. [pdf|bib]
  • S. Voloshynovskiy, "Iterative image restoration with adaptive regularization and parametric constraints," Journal of Image Processing and Communications, vol. 3, iss. 3--4, pp. 73-88, 1998. [pdf|bib]
  • I. Prudyus, S. Voloshynovskiy, and T. Holotyak, "Adaptive aperture formation matched with radiometry image spatial spectrum," in Proc. IEEE International Microwave and Radar Conference, Krakow, Poland, 1998. [pdf|bib]
  • S. Voloshynovskiy, "Robust Image Restoration Based on Concept of M-Estimation and Parametric Model of Image Spectrum," in Proc. IEEE, EURASIP 5th International Workshop on Systems, Signals and Image Processing, Zagreb, Croatia, 1998. [pdf|bib]
  • Z. Grytskiv, S. Voloshynovskiy, and Y. Rytsar, ," Facta Universitatis, vol. 11, iss. 1, pp. 115-125, 1998. [pdf|bib]
  • I. Prudyus, S. Voloshynovskiy, and T. Holotyak, "Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays," in Proc. Signal Processing Conference (EUSIPCO 1998), 9th European, 1998, pp. 1-4. [pdf|bib]
  • T. Holotyak, I. Prudyus, and S. Voloshynovskiy, "Surface image formation based on sparse arrays with nonlinear signal processing," in Proc. IEEE Second International Conference ``The detection of abandoned land mines'', Edinburgh, UK, 1998. [pdf|bib]
  • A. Herrigel and S. Voloshynovskiy, "Copyright and content protection for digital images based on asymmetric cryptographic techniques," in Proc. Multimedia and Security Workshop, Sixth ACM International Multimedia Conference, Bristol, U.K., 1998, pp. 99-112. [bib]
  • Z. Hrytskiv, S. Voloshynovskiy, and A. Allen, "Radiometry imager with robust nonlinear adaptive image restoration," in Proc. IEEE Second International Conference ``The detection of abandoned land mines'', Edinburgh, UK, 1998. [pdf|bib]
  • Z. Grytskiv and S. Voloshynovskiy, ," Facta Universitatis, vol. 8, iss. 2, pp. 263-269, 1995. [pdf|bib]