Brand protection and product autentication using portable devices S Voloshynovskyy, O Koval, T Pun US Patent 8,249,350, 2012 | 98 | 2012 |
Secure item identification and authentication system and method based on unclonable features S Voloshynovskiy, O Koval, T Pun US Patent 8,705,873, 2014 | 88 | 2014 |
Multilevel 2-D bar codes: Toward high-capacity storage modules for multimedia security and management R Villán, S Voloshynovskiy, O Koval, T Pun IEEE Transactions on Information Forensics and Security 1 (4), 405-420, 2006 | 75 | 2006 |
Text data-hiding for digital and printed documents: Theoretical and practical considerations R Villán, S Voloshynovskiy, O Koval, J Vila, E Topak, F Deguillaume, ... Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006 | 63 | 2006 |
Information-theoretical analysis of private content identification S Voloshynovskiy, O Koval, F Beekhof, F Farhadzadeh, T Holotyak 2010 IEEE Information Theory Workshop, 1-5, 2010 | 47 | 2010 |
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives SV Voloshynovskiy, O Koval, F Deguillaume, T Pun Security, Steganography, and Watermarking of Multimedia Contents VI 5306 …, 2004 | 43 | 2004 |
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding R Villán, S Voloshynovskiy, O Koval, F Deguillaume, T Pun Security, Steganography, and Watermarking of Multimedia Contents IX 6505 …, 2007 | 42 | 2007 |
Information-theoretic data-hiding: Recent achievements and open problems S Voloshynovskiy, F Deguillaume, O Koval, T Pun International Journal of Image and Graphics 5 (01), 5-35, 2005 | 38 | 2005 |
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management R Villan, S Voloshynovskiy, O Koval, T Pun Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia …, 2005 | 37 | 2005 |
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (famos) S Voloshynovskiy, M Diephuis, F Beekhof, O Koval, B Keel 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 36 | 2012 |
The impact of denoising on independent component analysis of functional magnetic resonance imaging data JM Pignat, O Koval, D Van De Ville, S Voloshynovskiy, C Michel, T Pun Journal of neuroscience methods 213 (1), 105-122, 2013 | 34 | 2013 |
Conception and limits of robust perceptual hashing: towards side information assisted hash functions S Voloshynovskiy, O Koval, F Beekhof, T Pun Media forensics and security 7254, 120-131, 2009 | 32 | 2009 |
Secure surface identification codes F Beekhof, S Voloshynovskiy, O Koval, R Villán, T Pun Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008 | 30 | 2008 |
Security analysis of robust perceptual hashing O Koval, S Voloshynovskiy, F Beekhof, T Pun Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008 | 28 | 2008 |
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations S Voloshynovskiy, O Koval, F Beekhof, T Pun 2007 IEEE 9th Workshop on Multimedia Signal Processing, 345-348, 2007 | 26 | 2007 |
Performance analysis of content-based identification using constrained list-based decoding F Farhadzadeh, S Voloshynovskiy, O Koval IEEE Transactions on Information Forensics and Security 7 (5), 1652-1667, 2012 | 24 | 2012 |
Wavelet-based image denoising using nonstationary stochastic geometrical image priors SV Voloshynovskiy, O Koval, T Pun Image and Video Communications and Processing 2003 5022, 675-687, 2003 | 24 | 2003 |
Image denoising based on the edge-process model S Voloshynovskiy, O Koval, T Pun Signal Processing 85 (10), 1950-1969, 2005 | 23 | 2005 |
Information-theoretic analysis of electronic and printed document authentication S Voloshynovskiy, O Koval, R Villan, E Topak, JEV Forcén, F Deguillaume, ... Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006 | 20 | 2006 |
Active content fingerprinting: a marriage of digital watermarking and content fingerprinting S Voloshynovskiy, F Farhadzadeh, O Koval, T Holotyak 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 19 | 2012 |