A stochastic approach to content adaptive digital image watermarking S Voloshynovskiy, A Herrigel, N Baumgaertner, T Pun International workshop on information hiding, 211-236, 1999 | 514 | 1999 |
Attacks on digital watermarks: classification, estimation based attacks, and benchmarks S Voloshynovskiy, S Pereira, T Pun, JJ Eggers, JK Su IEEE communications Magazine 39 (8), 118-126, 2001 | 513 | 2001 |
Attack modelling: towards a second generation watermarking benchmark S Voloshynovskiy, S Pereira, V Iquise, T Pun Signal processing 81 (6), 1177-1214, 2001 | 452 | 2001 |
Watermark copy attack M Kutter, SV Voloshynovskiy, A Herrigel Security and Watermarking of Multimedia Contents II 3971, 371-380, 2000 | 420 | 2000 |
Second generation benchmarking and application oriented evaluation S Pereira, S Voloshynovskiy, M Madueño, S Marchand-Maillet, T Pun Information Hiding: 4th International Workshop, IH 2001 Pittsburgh, PA, USA …, 2001 | 264 | 2001 |
Secure hybrid robust watermarking resistant against tampering and copy attack F Deguillaume, S Voloshynovskiy, T Pun Signal Processing 83 (10), 2133-2170, 2003 | 192 | 2003 |
Generalized watermarking attack based on watermark estimation and perceptual remodulation SV Voloshynovskiy, S Pereira, A Herrigel, N Baumgartner, T Pun Security and Watermarking of Multimedia Contents II 3971, 358-370, 2000 | 180 | 2000 |
Blind statistical steganalysis of additive steganography using wavelet higher order statistics T Holotyak, J Fridrich, S Voloshynovskiy Communications and multimedia security 3677, 273-274, 2005 | 176 | 2005 |
Multibit digital watermarking robust against local nonlinear geometrical distortions S Voloshynovskiy, F Deguillaume, T Pun Proceedings 2001 International Conference on Image Processing (Cat. No …, 2001 | 172 | 2001 |
Watermark template attack A Herrigel, SV Voloshynovskiy, YB Rytsar Security and Watermarking of Multimedia Contents III 4314, 394-405, 2001 | 131 | 2001 |
Optimal transform domain watermark embedding via linear programming S Pereira, S Voloshynoskiy, T Pun Signal processing 81 (6), 1251-1260, 2001 | 128 | 2001 |
Method for the estimation and recovering from general affine transforms in digital watermarking applications F Deguillaume, SV Voloshynovskiy, T Pun Security and watermarking of multimedia contents IV 4675, 313-322, 2002 | 127 | 2002 |
Multilevel 2-D bar codes: Toward high-capacity storage modules for multimedia security and management R Villán, S Voloshynovskiy, O Koval, T Pun IEEE Transactions on Information Forensics and Security 1 (4), 405-420, 2006 | 112 | 2006 |
Content adaptive watermarking based on a stochastic multiresolution image modeling S Voloshynovskiy, F Deguillaume, T Pun 2000 10th European Signal Processing Conference, 1-4, 2000 | 106 | 2000 |
Brand protection and product autentication using portable devices S Voloshynovskyy, O Koval, T Pun US Patent 8,249,350, 2012 | 97 | 2012 |
Analysis of bit-rate definitions for Brain-Computer Interfaces. J Kronegg, S Voloshynovskiy, T Pun Csrea hci, 40-46, 2005 | 92 | 2005 |
Secure item identification and authentication system and method based on unclonable features S Voloshynovskiy, O Koval, T Pun US Patent 8,705,873, 2014 | 87 | 2014 |
EEG-based synchronized brain-computer interfaces: A model for optimizing the number of mental tasks J Kronegg, G Chanel, S Voloshynovskiy, T Pun IEEE Transactions on Neural Systems and Rehabilitation Engineering 15 (1), 50-58, 2007 | 84 | 2007 |
Character and vector graphics watermark for structured electronic documents security F Deguillaume, S Voloshynovskiy, T Pun US Patent 7,644,281, 2010 | 82 | 2010 |
Identifying typical Mg II flare spectra using machine learning B Panos, L Kleint, C Huwyler, S Krucker, M Melchior, D Ullmann, ... The Astrophysical Journal 861 (1), 62, 2018 | 77 | 2018 |