|
Search the dblp DataBase
Sviatoslav Voloshynovskiy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:273-274 [Conf]
- Alexander Herrigel, Sviatoslav Voloshynovskiy
Counterfeit Attacks against a new Currency Protection Scheme. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2001, pp:- [Conf]
- Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:280-281 [Conf]
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun
On Reversibility of Random Binning Techniques: Multimedia Perspectives. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:108-118 [Conf]
- Julien Kronegg, Sviatoslav Voloshynovskiy, Thierry Pun
Analysis of bit-rate definitions for Brain-Computer Interfaces. [Citation Graph (0, 0)][DBLP] CSREA HCI, 2005, pp:40-46 [Conf]
- Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun
Multibit digital watermarking robust against local nonlinear geometrical distortions. [Citation Graph (0, 0)][DBLP] ICIP (3), 2001, pp:999-1002 [Conf]
- Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry Pun
Effective Channel Coding for DCT Watermarks. [Citation Graph (0, 0)][DBLP] ICIP, 2000, pp:- [Conf]
- José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun
Asymmetric spread spectrum data-hiding for Laplacian host data. [Citation Graph (0, 0)][DBLP] ICIP (1), 2005, pp:217-220 [Conf]
- Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueno, Stéphane Marchand-Maillet, Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:340-353 [Conf]
- Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun
A Stochastic Approach to Content Adaptive Digital Image Watermarking. [Citation Graph (0, 0)][DBLP] Information Hiding, 1999, pp:211-236 [Conf]
- Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:330-339 [Conf]
- Teodor Alecu, Sviatoslav Voloshynovskiy, Thierry Pun
EEG Cortical Imaging: A Vector Field Approach for Laplacian Denoising and Missing Data Estimation. [Citation Graph (0, 0)][DBLP] ISBI, 2004, pp:1335-1338 [Conf]
- José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
Practical Data-Hiding: Additive Attacks Performance Analysis. [Citation Graph (0, 0)][DBLP] IWDW, 2005, pp:244-259 [Conf]
- Yuriy Rytsar, Sviatoslav Voloshynovskiy, Thierry Pun
Metadata Representation for Semantic-Based Multimedia Security and Management. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2003, pp:769-778 [Conf]
- Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun
Security analysis of robust data-hiding with geometrically structured codebooks. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:709-720 [Conf]
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun
Robustness improvement of known-host-state watermarking using host statistics. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:569-577 [Conf]
- José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
Worst-case additive attack against quantization-based data-hiding methods. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:136-146 [Conf]
- Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:453-464 [Conf]
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:428-445 [Conf]
- Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Oleksiy J. Koval, Thierry Pun
Information-Theoretic Data-Hiding: Recent Achievements And Open Problems. [Citation Graph (0, 0)][DBLP] Int. J. Image Graphics, 2005, v:5, n:1, pp:5-36 [Journal]
- Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun
Towards geometrically robust data-hiding with structured codebooks. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2005, v:11, n:2, pp:121-132 [Journal]
- Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry Pun
Optimal transform domain watermark embedding via linear programming. [Citation Graph (0, 0)][DBLP] Signal Processing, 2001, v:81, n:6, pp:1251-1260 [Journal]
- Sviatoslav Voloshynovskiy, Shelby Pereira, V. Iquise, Thierry Pun
Attack modelling: towards a second generation watermarking benchmark. [Citation Graph (0, 0)][DBLP] Signal Processing, 2001, v:81, n:6, pp:1177-1214 [Journal]
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, José-Emilio Vila-Forcén, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
Robustness improvement of known-host-state data-hiding using host statistics. [Citation Graph (0, 0)][DBLP] Signal Processing, 2006, v:86, n:5, pp:1076-1088 [Journal]
- Sviatoslav Voloshynovskiy, Thierry Pun, Jessica J. Fridrich, Fernando Pérez-González, N. Memon
Security of data hiding technologies. [Citation Graph (0, 0)][DBLP] Signal Processing, 2003, v:83, n:10, pp:2065-2067 [Journal]
- Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun
Secure hybrid robust watermarking resistant against tampering and copy attack. [Citation Graph (0, 0)][DBLP] Signal Processing, 2003, v:83, n:10, pp:2133-2170 [Journal]
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun
Image denoising based on the edge-process model. [Citation Graph (0, 0)][DBLP] Signal Processing, 2005, v:85, n:10, pp:1950-1969 [Journal]
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun
Quality enhancement of printed-and-scanned images using distributed coding. [Citation Graph (0, 0)][DBLP] Signal Processing, 2007, v:87, n:6, pp:1301-1313 [Journal]
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun
On reversibility of random binning based data-hiding techniques: security perspectives. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:89-96 [Conf]
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun
Information-theoretic analysis of steganalysis in real images. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:11-16 [Conf]
- Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
Quantization-based watermarking performance improvement using host statistics: AWGN attack case. [Citation Graph (0, 0)][DBLP] MM&Sec, 2004, pp:35-39 [Conf]
Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case. [Citation Graph (, )][DBLP]
Protocols for data-hiding based text document security and automatic processing. [Citation Graph (, )][DBLP]
Interactive segmentation with hidden object-based annotations: toward smart media. [Citation Graph (, )][DBLP]
Privacy-preserving multimodal person and object identification. [Citation Graph (, )][DBLP]
Multimodal authentication based on random projections and source coding. [Citation Graph (, )][DBLP]
Conception and limits of robust perceptual hashing: towards side information assisted hash functions. [Citation Graph (, )][DBLP]
Random projections based item authentication. [Citation Graph (, )][DBLP]
Multimodal object authentication with random projections: a worst-case approach. [Citation Graph (, )][DBLP]
Fast identification of highly distorted images. [Citation Graph (, )][DBLP]
On security threats for robust perceptual hashing. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.005secs
|