Oleksiy J. Koval
According to our database1,
Oleksiy J. Koval
authored at least 79 papers
between 2003 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2012
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding.
IEEE Trans. Inf. Forensics Secur., 2012
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS).
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
DCT sign based robust privacy preserving image copy detection for cloud-based systems.
Proceedings of the 10th International Workshop on Content-Based Multimedia Indexing, 2012
2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Media Forensics and Security III, 2011
Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects.
Proceedings of the BIOSIG 2011, 2011
2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Content identification based on digital fingerprint: What can be done if ML decoding fails?
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Performance analysis of identification system based on order statistics list decoder.
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Media Forensics and Security I, 2009
Conception and limits of robust perceptual hashing: towards side information assisted hash functions.
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Media Forensics and Security I, 2009
2008
Trans. Data Hiding Multim. Secur., 2008
J. Electronic Imaging, 2008
Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case.
Proceedings of the Security, 2008
Proceedings of the Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
2007
Signal Process., 2007
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Error exponent analysis of person identification based on fusion of dependent/independent modalities.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007
Analysis of multimodal binary detection systems based on dependent/independent modalities.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007
2006
IEEE Trans. Signal Process., 2006
Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management.
IEEE Trans. Inf. Forensics Secur., 2006
Signal Process., 2006
EURASIP J. Adv. Signal Process., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Text data-hiding for digital and printed documents: theoretical and practical considerations.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
On reversibility of random binning based data-hiding techniques: security perspectives.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
2005
Multim. Syst., 2005
Int. J. Image Graph., 2005
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups.
Proceedings of the 13th European Signal Processing Conference, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
2004
Proceedings of the Visual Communications and Image Processing 2004, 2004
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Quantization-based watermarking performance improvement using host statistics: AWGN attack case.
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
2003
Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003