Soft content fingerprinting with bit polarization based on sign-magnitude decomposition | 0 | 0.34 | 2015 |
Active content fingerprinting: Shrinkage and lattice based modulations | 5 | 0.59 | 2013 |
Physical object authentication with correlated camera noise. | 0 | 0.34 | 2013 |
DCT sign based robust privacy preserving image copy detection for cloud-based systems. | 3 | 0.42 | 2012 |
Fast physical object identification based on unclonable features and soft fingerprinting | 5 | 0.47 | 2011 |
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes. | 0 | 0.34 | 2011 |
Sign-Magnitude Decomposition Of Mutual Information With Polarization Effect In Digital Identification | 2 | 0.36 | 2011 |
Private content identification based on soft fingerprinting | 2 | 0.38 | 2011 |
Geometrically robust perceptual fingerprinting : an asymmetric case | 1 | 0.37 | 2011 |
Trading-off performance and complexity in identification problem | 0 | 0.34 | 2011 |
Information-theoretic analysis of content based identification for correlated data | 2 | 0.51 | 2011 |
Fast identification of highly distorted images | 3 | 0.52 | 2010 |
Private content identification: Performance-privacy-complexity trade-off. | 0 | 0.34 | 2010 |
Information-Theoretical Analysis Of Private Content Identification | 22 | 1.86 | 2010 |
Conception and limits of robust perceptual hashing: towards side information assisted hash functions | 12 | 1.80 | 2009 |
Random projections based item authentication | 4 | 0.54 | 2009 |
Analysis of physical unclonable identification based on reference list decoding | 2 | 0.41 | 2008 |
Security Analysis of Robust Perceptual Hashing | 11 | 0.69 | 2008 |
Authentication of biometric identification documents via mobile devices | 0 | 0.34 | 2008 |
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures | 1 | 0.35 | 2008 |