The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sviatoslav Voloshynovskiy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
    Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:273-274 [Conf]
  2. Alexander Herrigel, Sviatoslav Voloshynovskiy
    Counterfeit Attacks against a new Currency Protection Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  3. Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun
    A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:280-281 [Conf]
  4. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun
    On Reversibility of Random Binning Techniques: Multimedia Perspectives. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:108-118 [Conf]
  5. Julien Kronegg, Sviatoslav Voloshynovskiy, Thierry Pun
    Analysis of bit-rate definitions for Brain-Computer Interfaces. [Citation Graph (0, 0)][DBLP]
    CSREA HCI, 2005, pp:40-46 [Conf]
  6. Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun
    Multibit digital watermarking robust against local nonlinear geometrical distortions. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:999-1002 [Conf]
  7. Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry Pun
    Effective Channel Coding for DCT Watermarks. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  8. José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun
    Asymmetric spread spectrum data-hiding for Laplacian host data. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:217-220 [Conf]
  9. Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueno, Stéphane Marchand-Maillet, Thierry Pun
    Second Generation Benchmarking and Application Oriented Evaluation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:340-353 [Conf]
  10. Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun
    A Stochastic Approach to Content Adaptive Digital Image Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:211-236 [Conf]
  11. Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun
    Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:330-339 [Conf]
  12. Teodor Alecu, Sviatoslav Voloshynovskiy, Thierry Pun
    EEG Cortical Imaging: A Vector Field Approach for Laplacian Denoising and Missing Data Estimation. [Citation Graph (0, 0)][DBLP]
    ISBI, 2004, pp:1335-1338 [Conf]
  13. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
    Practical Data-Hiding: Additive Attacks Performance Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:244-259 [Conf]
  14. Yuriy Rytsar, Sviatoslav Voloshynovskiy, Thierry Pun
    Metadata Representation for Semantic-Based Multimedia Security and Management. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:769-778 [Conf]
  15. Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun
    Security analysis of robust data-hiding with geometrically structured codebooks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:709-720 [Conf]
  16. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun
    Robustness improvement of known-host-state watermarking using host statistics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:569-577 [Conf]
  17. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
    Worst-case additive attack against quantization-based data-hiding methods. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:136-146 [Conf]
  18. Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun
    Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:453-464 [Conf]
  19. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun
    Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:428-445 [Conf]
  20. Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Oleksiy J. Koval, Thierry Pun
    Information-Theoretic Data-Hiding: Recent Achievements And Open Problems. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:5-36 [Journal]
  21. Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun
    Towards geometrically robust data-hiding with structured codebooks. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:121-132 [Journal]
  22. Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry Pun
    Optimal transform domain watermark embedding via linear programming. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:6, pp:1251-1260 [Journal]
  23. Sviatoslav Voloshynovskiy, Shelby Pereira, V. Iquise, Thierry Pun
    Attack modelling: towards a second generation watermarking benchmark. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:6, pp:1177-1214 [Journal]
  24. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, José-Emilio Vila-Forcén, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
    Robustness improvement of known-host-state data-hiding using host statistics. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2006, v:86, n:5, pp:1076-1088 [Journal]
  25. Sviatoslav Voloshynovskiy, Thierry Pun, Jessica J. Fridrich, Fernando Pérez-González, N. Memon
    Security of data hiding technologies. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2003, v:83, n:10, pp:2065-2067 [Journal]
  26. Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun
    Secure hybrid robust watermarking resistant against tampering and copy attack. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2003, v:83, n:10, pp:2133-2170 [Journal]
  27. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun
    Image denoising based on the edge-process model. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2005, v:85, n:10, pp:1950-1969 [Journal]
  28. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun
    Quality enhancement of printed-and-scanned images using distributed coding. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2007, v:87, n:6, pp:1301-1313 [Journal]
  29. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun
    On reversibility of random binning based data-hiding techniques: security perspectives. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:89-96 [Conf]
  30. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun
    Information-theoretic analysis of steganalysis in real images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:11-16 [Conf]
  31. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
    Quantization-based watermarking performance improvement using host statistics: AWGN attack case. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:35-39 [Conf]

  32. Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case. [Citation Graph (, )][DBLP]


  33. Protocols for data-hiding based text document security and automatic processing. [Citation Graph (, )][DBLP]


  34. Interactive segmentation with hidden object-based annotations: toward smart media. [Citation Graph (, )][DBLP]


  35. Privacy-preserving multimodal person and object identification. [Citation Graph (, )][DBLP]


  36. Multimodal authentication based on random projections and source coding. [Citation Graph (, )][DBLP]


  37. Conception and limits of robust perceptual hashing: towards side information assisted hash functions. [Citation Graph (, )][DBLP]


  38. Random projections based item authentication. [Citation Graph (, )][DBLP]


  39. Multimodal object authentication with random projections: a worst-case approach. [Citation Graph (, )][DBLP]


  40. Fast identification of highly distorted images. [Citation Graph (, )][DBLP]


  41. On security threats for robust perceptual hashing. [Citation Graph (, )][DBLP]


Search in 0.038secs, Finished in 0.040secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002