Joakim Tutt   

Biography

Joakim Tutt received MSc degree in Mathematics at University of Geneva in May 2015.

He currently works as a PhD student in Computer Sciences with the Stochastic Information Processing (SIP) Group, Departement of Computer Sciences, University of Geneva.

He joined the group in July 2019.

Research interests

Statistical studies of imaging devices, Divergence measures and metrics, Information Theory

Teaching

He is involved in the following courses :

  • Imagerie Numérique, 
  • Sécurité des Systèmes d’Information.

Miscellanous

Received the Master Excellence Fellowship in 2012.

Publications

Please refer to my Google Scholar for full list of publications.

  • Y. Belousov, G. Quétant, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications with Copy Detection Patterns," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3395-3408, 2024. [pdf|bib]
  • J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, "Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3124-3134, 2024. [pdf|bib]
  • Y. Belousov, B. Pulfer, R. Chaban, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Digital twins of physical printing-imaging channel," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • J. Tutt, O. Taran, R. Chaban, B. Pulfer, Y. Belousov, T. Holotyak, and S. Voloshynovskiy, "Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • B. Pulfer, Y. Belousov, J. Tutt, R. Chaban, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Anomaly localization for copy detection patterns through print estimation," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • R. Chaban, O. Taran, J. Tutt, Y. Belousov, B. Pulfer, T. Holotyak, and S. Voloshynovskiy, "Printing variability of copy detection patterns," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China, 2022. [pdf|bib]
  • B. Pulfer, R. Chaban, Y. Belousov, J. Tutt, O. Taran, T. Holotyak, and S. Voloshynovskiy, "Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach," in Proc. IEEE International Conference on Image Processing (ICIP), Bordeaux, France, 2022. [pdf|bib]
  • R. Chaban, O. Taran, J. Tutt, T. Holotyak, S. Bonev, and S. Voloshynovskiy, "Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, 2021. [pdf|bib]
  • O. Taran, J. Tutt, T. Holotyak, R. Chaban, S. Bonev, and S. Voloshynovskiy, "Mobile authentication of copy detection patterns: how critical is to know fakes?," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, 2021. [pdf|bib]