New blind steganalysis and its implications M Goljan, J Fridrich, T Holotyak Security, steganography, and watermarking of multimedia contents VIII 6072 …, 2006 | 390 | 2006 |
Blind statistical steganalysis of additive steganography using wavelet higher order statistics T Holotyak, J Fridrich, S Voloshynovskyy 9th IFIP TC-6 TC-11 conference on communications and multimedia security …, 2005 | 170 | 2005 |
Forensic steganalysis: determining the stego key in spatial domain steganography J Fridrich, M Goljan, D Soukal, T Holotyak Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005 | 72 | 2005 |
Stochastic approach to secret message length estimation in±k embedding steganography T Holotyak, J Fridrich, D Soukal Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005 | 68 | 2005 |
Information-theoretical analysis of private content identification S Voloshynovskiy, O Koval, F Beekhof, F Farhadzadeh, T Holotyak 2010 IEEE Information Theory Workshop, 1-5, 2010 | 47 | 2010 |
Defending against adversarial attacks by randomized diversification O Taran, S Rezaeifar, T Holotyak, S Voloshynovskiy Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019 | 33 | 2019 |
Fast content identification in high-dimensional feature spaces using sparse ternary codes S Ferdowsi, S Voloshynovskiy, D Kostadinov, T Holotyak 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 30 | 2016 |
Information bottleneck through variational glasses S Voloshynovskiy, M Kondah, S Rezaeifar, O Taran, T Holotyak, ... arXiv preprint arXiv:1912.00830, 2019 | 25 | 2019 |
A framework for fast and secure packaging identification on mobile phones M Diephuis, S Voloshynovskiy, T Holotyak, N Stendardo, B Keel Media Watermarking, Security, and Forensics 2014 9028, 296-305, 2014 | 19 | 2014 |
Fast identification algorithms for forensic applications F Beekhof, S Voloshynovskiy, O Koval, T Holotyak 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 18 | 2009 |
Image indexing and retrieval using GSOM algorithm M Gabryel, R Grycuk, M Korytkowski, T Holotyak Artificial Intelligence and Soft Computing: 14th International Conference …, 2015 | 17 | 2015 |
Active content fingerprinting: a marriage of digital watermarking and content fingerprinting S Voloshynovskiy, F Farhadzadeh, O Koval, T Holotyak 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 17 | 2012 |
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness S Voloshynovskiy, T Holotyak, P Bas 2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016 | 15 | 2016 |
On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption S Voloshynovskyy, FP Beekhof, O Koval, T Holotyak Proceedings of the International Workshop on Signal Processing in the …, 2009 | 13 | 2009 |
Sparse ternary codes for similarity search have higher coding gain than dense binary codes S Ferdowsi, S Voloshynovskiy, D Kostadinov, T Holotyak 2017 IEEE International Symposium on Information Theory (ISIT), 2653-2657, 2017 | 11 | 2017 |
Feature extraction of palm vein patterns based on two-dimensional density function M Kubanek, D Smorawa, T Holotyak Artificial Intelligence and Soft Computing: 14th International Conference …, 2015 | 11 | 2015 |
PharmaPack: mobile fine-grained recognition of pharma packages O Taran, S Rezaeifar, O Dabrowski, J Schlechten, T Holotyak, ... 2017 25th European Signal Processing Conference (EUSIPCO), 1917-1921, 2017 | 10 | 2017 |
Fast physical object identification based on unclonable features and soft fingerprinting T Holotyak, S Voloshynovskiy, O Koval, F Beekhof 2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011 | 10 | 2011 |
Sparse antenna array in radar imaging systems I Prudyus, S Voloshynovskiy, T Holotyak Proc. of 3rd Int. Conf. on Telecommunications in Modern Satellite, Cable …, 1997 | 10 | 1997 |
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation O Taran, S Rezaeifar, T Holotyak, S Voloshynovskiy EURASIP journal on information security 2020 (1), 1-18, 2020 | 9 | 2020 |