Sviatoslav Voloshynovskiy
Orcid: 0000-0003-0416-9674Affiliations:
- University of Geneva, Stochastic Information Processing Group, Switzerland
According to our database1,
Sviatoslav Voloshynovskiy
authored at least 224 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on sip.unige.ch
On csauthors.net:
Bibliography
2024
MV-MR: Multi-Views and Multi-Representations for Self-Supervised Learning and Knowledge Distillation.
Entropy, June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns.
IEEE Trans. Inf. Forensics Secur., 2024
PRIMIS: Privacy-preserving medical image sharing via deep sparsifying transform learning with obfuscation.
J. Biomed. Informatics, 2024
Semi-Supervised Fine-Tuning of Vision Foundation Models with Content-Style Decomposition.
CoRR, 2024
Solar synthetic imaging: Introducing denoising diffusion probabilistic models on SDO/AIA data.
CoRR, 2024
CoRR, 2024
IEEE Access, 2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Assessing the Viability of Synthetic Physical Copy Detection Patterns on Different Imaging Systems.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Comparative Analysis of Copy Detection Patterns and Physical Unclonable Functions in Authentication Systems: A Mobile Phone Perspective.
Proceedings of the 32nd European Signal Processing Conference, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
EURASIP J. Inf. Secur., December, 2023
EURASIP J. Inf. Secur., December, 2023
Multi-institutional PET/CT image segmentation using federated deep transformer learning.
Comput. Methods Programs Biomed., October, 2023
Bottlenecks CLUB: Unifying Information-Theoretic Trade-Offs Among Complexity, Leakage, and Utility.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
2022
Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
CoRR, 2021
Generation of data on discontinuous manifolds via continuous stochastic non-invertible networks.
CoRR, 2021
CoRR, 2021
Solar activity classification based on Mg II spectra: Towards classification on compressed data.
Astron. Comput., 2021
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Machine learning attack on copy detection patterns: are $1\times 1$ patterns cloneable?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
Entropy, 2020
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
EURASIP J. Inf. Secur., 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns.
Proceedings of the Computational Science - ICCS 2020, 2020
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Distributed Semi-Private Image Classification Based on Information-Bottleneck Principle.
Proceedings of the 28th European Signal Processing Conference, 2020
2019
CoRR, 2019
Network Parameter Learning Using Nonlinear Transforms, Local Representation Goals and Local Propagation Constraints.
CoRR, 2019
Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment.
CoRR, 2019
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Robustification of Deep Net Classifiers by Key Based Diversified Aggregation with Pre-Filtering.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach.
Proceedings of the IEEE International Conference on Acoustics, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Supervised Joint Nonlinear Transform Learning with Discriminative-Ambiguous Prior for Generic Privacy-Preserved Features.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
2018
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the 7th European Workshop on Visual Information Processing, 2018
Learning Overcomplete and Sparsifying Transform With Approximate and Exact Closed Form Solutions.
Proceedings of the 7th European Workshop on Visual Information Processing, 2018
Classification by Re-generation: Towards Classification Based on Variational Inference.
Proceedings of the 26th European Signal Processing Conference, 2018
Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization.
Proceedings of the 26th European Signal Processing Conference, 2018
Active Content Fingerprinting Using Latent Data Representation, Extractor and Reconstructor.
Proceedings of the 26th European Signal Processing Conference, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018
Proceedings of the 2018 IEEE Data Science Workshop, 2018
2017
A multi-layer network based on Sparse Ternary Codes for universal vector compression.
CoRR, 2017
Regularized Residual Quantization: a multi-layer sparse dictionary learning approach.
CoRR, 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Sparse ternary codes for similarity search have higher coding gain than dense binary codes.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
A multi-layer image representation using regularized residual quantization: Application to compression and denoising.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
Proceedings of the Artificial Intelligence and Soft Computing, 2017
Proceedings of the 25th European Signal Processing Conference, 2017
Proceedings of the 25th European Signal Processing Conference, 2017
2016
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the Artificial Intelligence and Soft Computing, 2016
2015
Soft Content Fingerprinting With Bit Polarization Based on Sign-Magnitude Decomposition.
IEEE Trans. Inf. Forensics Secur., 2015
Information-theoretical limits of active content fingerprinting in content-based identification systems.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the Media Watermarking, 2015
Privacy preserving multimedia content identification for cloud based bag-of-feature architectures.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015
Proceedings of the Artificial Intelligence and Soft Computing, 2015
Proceedings of the Artificial Intelligence and Soft Computing, 2015
Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database.
Proceedings of the Artificial Intelligence and Soft Computing, 2015
Proceedings of the Artificial Intelligence and Soft Computing, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
2014
Information Theoretical Analysis of Identification based on Active Content Fingerprinting.
CoRR, 2014
Proceedings of the Media Watermarking, 2014
Robust human face recognition based on locality preserving sparse over complete block approximation.
Proceedings of the Media Watermarking, 2014
Content identification: binary content fingerprinting versus binary content encoding.
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Robust Face Recognition by Group Sparse Representation That Uses Samples from List of Subjects.
Proceedings of the Artificial Intelligence and Soft Computing, 2014
Proceedings of the Artificial Intelligence and Soft Computing, 2014
Proceedings of the Artificial Intelligence and Soft Computing, 2014
2013
Fundamental limits of identification: Identification rate, search and memory complexity trade-off.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Physical object identification based on FAMOS microstructure fingerprinting: Comparison of templates versus invariant features.
Proceedings of the 8th International Symposium on Image and Signal Processing and Analysis, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013
2012
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding.
IEEE Trans. Inf. Forensics Secur., 2012
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS).
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
DCT sign based robust privacy preserving image copy detection for cloud-based systems.
Proceedings of the 10th International Workshop on Content-Based Multimedia Indexing, 2012
2011
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes.
J. Signal Process. Syst., 2011
Proceedings of the Media Watermarking, 2011
Proceedings of the Media Watermarking, 2011
Proceedings of the Media Watermarking, 2011
Sign-magnitude decomposition of mutual information with polarization effect in digital identification.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Fast physical object identification based on unclonable features and soft fingerprinting.
Proceedings of the IEEE International Conference on Acoustics, 2011
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects.
Proceedings of the BIOSIG 2011, 2011
2010
Privacy amplification of content identification systems based on fingerprint bit reliability.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Content identification based on digital fingerprint: What can be done if ML decoding fails?
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Performance analysis of identification system based on order statistics list decoder.
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Privacy enhancement of common randomness based authentication: Key rate maximized case.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Media Forensics and Security I, 2009
Conception and limits of robust perceptual hashing: towards side information assisted hash functions.
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Media Forensics and Security I, 2009
2008
Trans. Data Hiding Multim. Secur., 2008
J. Electronic Imaging, 2008
Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case.
Proceedings of the Security, 2008
Proceedings of the Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
2007
Signal Process., 2007
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Error exponent analysis of person identification based on fusion of dependent/independent modalities.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007
Analysis of multimodal binary detection systems based on dependent/independent modalities.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007
2006
IEEE Trans. Signal Process., 2006
IEEE Trans. Signal Process., 2006
Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management.
IEEE Trans. Inf. Forensics Secur., 2006
IEEE Trans. Inf. Forensics Secur., 2006
Signal Process., 2006
EURASIP J. Adv. Signal Process., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Text data-hiding for digital and printed documents: theoretical and practical considerations.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
On reversibility of random binning based data-hiding techniques: security perspectives.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
2005
Multim. Syst., 2005
Int. J. Image Graph., 2005
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups.
Proceedings of the 13th European Signal Processing Conference, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Analysis of bit-rate definitions for Brain-Computer Interfaces.
Proceedings of The 2005 International Conference on Human-Computer Interaction, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Proceedings of the Communications and Multimedia Security, 2005
2004
Proceedings of the Visual Communications and Image Processing 2004, 2004
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2004, 2004
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Quantization-based watermarking performance improvement using host statistics: AWGN attack case.
Proceedings of the 6th workshop on Multimedia & Security, 2004
EEG Cortical Imaging: A Vector Field Approach for Laplacian Denoising and Missing Data Estimation.
Proceedings of the 2004 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
2003
Signal Process., 2003
Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Method for the estimation and recovering from general affine transforms in digital watermarking applications.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the 11th European Signal Processing Conference, 2002
2001
Signal Process., 2001
Signal Process., 2001
Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks.
IEEE Commun. Mag., 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking.
Proceedings of the Information Hiding, 4th International Workshop, 2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
Multibit digital watermarking robust against local nonlinear geometrical distortions.
Proceedings of the 2001 International Conference on Image Processing, 2001
Counterfeit Attacks against a new Currency Protection Scheme.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
Generalized watermarking attack based on watermark estimation and perceptual remodulation.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the 2000 International Conference on Image Processing, 2000
Proceedings of the 10th European Signal Processing Conference, 2000
1999
Proceedings of the Information Hiding, Third International Workshop, 1999
1998
Robust image restoration matched with adaptive aperture formation in radar imaging systems with sparse antenna arrays.
Proceedings of the 9th European Signal Processing Conference, 1998