Image processing

 

Image Restoration

Key words: iterative methods, POCs, robust estimation, sparsity

Our research interests in inverse problems cover recovery from:

  • highly distorted images that include blur and mixture noise originating from several distributions
  • missed samples (non-uniform or sparse sampling) in both coordinate and Fourier domains
  • quantized sparse sampling
  • optimisation techniques suitable for high dimensional data machine-learning based methods
Link

Image denoising

Key words: robust estimation, sparsity, edge process model

Gaussian noise

Misssed samples

Robust estimators 

POCS

PDFLinkBibtex
@article { Svolos:SP2005:IDEP,
    author = { Sviatoslav Voloshynovskiy and Oleksiy Koval and Thierry Pun },
    title = { Image denoising based on the edge-process model },
    journal = { Signal Processing },
    year = { 2005 },
    volume = { 85 },
    pages = { 1950--1969 },
    vgclass = { refpap },
    vgproject = { watermarking },
    number = { 10 },
    month = { October }
}


Face image compression

Key words: codebook learning, successive refinement, rate-distortion, polynomial complexity

We study several schemes  for multi-layer representation of images. The problem is first treated from an information-theoretic viewpoint where we analyze the behavior of different sources of information under a multi-layer data compression framework and compare it with a single-stage (shallow) structure. We then consider the image data as the source of information and link the proposed representation scheme to the problem of multi-layer dictionary learning for visual data. For the current work we focus on the problem of image compression for a special class of images where we report a considerable performance boost in terms of PSNR at high compression ratios in comparison with the JPEG2000 codec.

Link


Sparse antenna arrays and radio interferometry imaging

Key words: sparse antenna array, visibility, uv-plane, inverse problem, sparsity, PSF

The Swiss SKA day at EPFL

In this project, we intestigate the possibility of image recovery from sparsely sampled data in spatial frequency domain. We study different geomentry of antenna arrays coupled with the non-liner properties of reconstruction algorithms.

PDFData


Multimedia security

 

Steganography and steganalysis

Key words: steganalysis, theoretical limits, moments, stegowall

Description

PDF


Robust watermarking for copyright protection

Robust watermarking, Stirmark score, random banding attack, benchmarking

Link


Content authentication and tamper proofing based data hiding

PDF


Watermarking attacks and benchmarking

PDF


Text watermarking

Key words: text shape modulation, vector graphics, position modulation

PDFBibtex
@inproceedings { Villan:SPIE2007:RH,
    author = { Renato Vill{\'a}n and Sviatoslav Voloshynovskiy and Oleksiy Koval and Fr\'{e}d\'{e}ric Deguillaume and Thierry Pun },
    title = { Tamper-proofing of Electronic and Printed Text Documents via Robust Hashing and Data-Hiding },
    booktitle = { Proceedings of {SPIE-IS{\&}T} Electronic Imaging 2007, Security, Steganography, and Watermarking of Multimedia Contents IX },
    year = { 2007 },
    vgclass = { refpap },
    vgproject = { watermarking },
    address = { San Jose, USA },
    month = { 28 Jan. -- 1 Feb. },
    abstract = { In this paper, we deal with the problem of authentication and tamper-proofing of text documents that can be distributed in electronic or printed forms. We advocate the combination of robust text hashing and text data-hiding technologies as an efficient solution to this problem. First, we consider the problem of text data-hiding in the scope of the Gel'fand-Pinsker data-hiding framework. For illustration, two modern text data-hiding methods, namely color index modulation (CIM) and location index modulation (LIM), are explained. Second, we study two approaches to robust text hashing that are well suited for the considered problem. In particular, both approaches are compatible with CIM and LIM. The first approach makes use of optical character recognition (OCR) and a classical cryptographic message authentication code (MAC). The second approach is new and can be used in some scenarios where OCR does not produce consistent results. The experimental work compares both approaches and shows their robustness against typical intentional/unintentional document distortions including electronic format conversion, printing, scanning, photocopying, and faxing. }
}


Content fingerprinting

Key words: information-theoretic limits, performance, random projections, reliable bits, fast decoding

Link


Active Content Fingerprinting

Link


Privacy preserving search and authentication

Link


Visual scrambling robust to distortions

PDFLinkBibtex
@article { ,
    grytskiv:1998:facta title = { Cryptography and steganography of video information in modern communications },
    author = { Z. Grytskiv and Sviatoslav Voloshynovskiy and Yuriy Rytsar },
    journal = { Facta Universitatis },
    year = { 1998 },
    volume = { 11 },
    number = { 1 },
    pages = { 115--125 },
    vgclass = { refpap },
    vgproject = { watermarking }
}


Physical object security

 

Physical object security

Description

Link


FAMOS

S. Voloshynovskiy, M. Diephuis and F. Beekhof

WIFS 2002

The forensic authentication microstructure optical set (FAMOS) is a dataset with 5000 unique microstructures from consumer packages for the development, testing and benchmarking of forensic identification and authentication technologies.  All samples have been acquired 3 times with two different cameras giving 30.000 images in total.

LinkBibtex
@INPROCEEDINGS{Diephuis:2012:WIFS,
  author = {Sviatoslav Voloshynovskiy and Maurits Diephuis and Fokko Beekhof and Oleksiy
    Koval and Bruno Keel},
  title = {Towards Reproducible results in authentication based on physical
    non-cloneable functions: The Forensic Authentication Microstructure
    Optical Set (FAMOS)},
  year = {2012},
  address = {Tenerife, Spain},
  month = {December 2--5},
  booktitle = {Proceedings of IEEE International Workshop on Information Forensics
    and Security}
}


Security with printed bar codes

Link


Banknote protection

PDFBibtex
@inproceedings { Dewaele:2016:SPIE,
    author = { Thomas Dewaele, Maurits Diephuis, Taras Holotyak, Sviatoslav~Voloshynovskiy },
    title = { Forensic authentication of banknotes on mobile phones },
    booktitle = { Proceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security V },
    year = { 2016 },
    month = { January, 14-18 },
    address = { San Francisco, USA }
}


Physical object security on mobile phones

PDFLink


Machine learning

 

Multiclass classification

Description

PDFBibtex
@article { Voloshynovskiy:2011:theoretic,
    title = { Theoretic Multiclass Classification Based on Binary Classifiers },
    author = { Sviatoslav Voloshynovskiy and Oleksiy Koval and Fokko Beekhof and Taras Holotyak },
    journal = { Signal Processing Systems },
    year = { 2011 },
    volume = { 65 },
    pages = { 413-430 },
    note = { (accepted) }
}


Face recognition

Key words: sparse coding, codebook learning, aggregation, Yale database

Link


Computer vision

 


Object recognition on mobile phones

Robust descriptors


Database of real objects acquired by mobile phones

Ongoing project


Feature extraction for computer vision

Universal features, real images, text descriptors, random textures, quantization, compact descriptor

Link


Real time multi-language text detection

Text detection, projective transforms, real time, mobile app