default search action
Oleksiy J. Koval
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j12]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Performance Analysis of Content-Based Identification Using Constrained List-Based Decoding. IEEE Trans. Inf. Forensics Secur. 7(5): 1652-1667 (2012) - [c67]Maurits Diephuis, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
DCT sign based robust privacy preserving image copy detection for cloud-based systems. CBMI 2012: 1-6 - [c66]Sviatoslav Voloshynovskiy, Maurits Diephuis, Fokko Beekhof, Oleksiy J. Koval, Bruno Keel:
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS). WIFS 2012: 43-48 - [c65]Sviatoslav Voloshynovskiy, Farzad Farhadzadeh, Oleksiy J. Koval, Taras Holotyak:
Active content fingerprinting: A marriage of digital watermarking and content fingerprinting. WIFS 2012: 175-180 - 2011
- [j11]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Taras Holotyak:
Information-Theoretic Multiclass Classification Based on Binary Classifiers - On Coding Matrix Design, Reliability and Maximum Number of Classes. J. Signal Process. Syst. 65(3): 413-430 (2011) - [c64]Ashot N. Harutyunyan, Naira Grigoryan, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
A New Biometric Identification Model and the Multiple Hypothesis Testing for Arbitrarily Varying Objects. BIOSIG 2011: 305-312 - [c63]Taras Holotyak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
Fast physical object identification based on unclonable features and soft fingerprinting. ICASSP 2011: 1713-1716 - [c62]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof:
Information-theoretic analysis of desynchronization invariant object identification. ICASSP 2011: 4168-4171 - [c61]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof:
Statistical analysis of digital image fingerprinting based on random projections. ISPA 2011: 200-205 - [c60]Maurits Diephuis, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
Statistical analysis of binarized SIFT descriptors. ISPA 2011: 460-465 - [c59]Naira Grigoryan, Ashot N. Harutyunyan, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
On multiple hypothesis testing with rejection option. ITW 2011: 75-79 - [c58]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
Information-theoretic analysis of content based identification for correlated data. ITW 2011: 205-209 - [c57]Oleksiy J. Koval, Svyatoslav Voloshynovskiy, Farzad Farhadzadeh:
Identification in desynchronization channels. ITW 2011: 297-301 - [c56]Svyatoslav Voloshynovskiy, Taras Holotyak, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh:
Sign-magnitude decomposition of mutual information with polarization effect in digital identification. ITW 2011: 385-389 - [c55]Taras Holotyak, Svyatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof:
Trading-off performance and complexity in identification problem. Media Forensics and Security 2011: 78800O - [c54]Oleksiy J. Koval, Svyatoslav Voloshynovskiy, Farzad Farhadzadeh, Taras Holotyak, Fokko Beekhof:
Geometrically robust perceptual fingerprinting: an asymmetric case. Media Forensics and Security 2011: 78800N - [c53]Sviatoslav Voloshynovskiy, Taras Holotyak, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh:
Private content identification based on soft fingerprinting. Media Forensics and Security 2011: 78800M - [i1]Naira Grigoryan, Ashot N. Harutyunyan, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
On Multiple Hypothesis Testing with Rejection Option. CoRR abs/1102.3520 (2011) - 2010
- [c52]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Privacy Preserving Identification: Order Statistics List Decoding Perspective. IIH-MSP 2010: 352-355 - [c51]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Performance analysis of identification system based on order statistics list decoder. ISIT 2010: 2652-2656 - [c50]Svyatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak:
Information-theoretical analysis of private content identification. ITW 2010: 1-5 - [c49]Oleksiy J. Koval, Sviatoslav Voloshynovskiy:
Multimodal object authentication with random projections: a worst-case approach. Media Forensics and Security 2010: 75410D - [c48]Taras Holotyak, Sviatoslav Voloshynovskiy, Fokko Beekhof, Oleksiy J. Koval:
Fast identification of highly distorted images. Media Forensics and Security 2010: 754116 - [c47]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Farzad Farhadzadeh, Taras Holotyak:
Private content identification: Performance-privacy-complexity trade-off. MMSP 2010: 58-63 - [c46]Farzad Farhadzadeh, Sviatoslav Voloshynovskiy, Oleksiy J. Koval:
Content identification based on digital fingerprint: What can be done if ML decoding fails? MMSP 2010: 64-68 - [c45]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof, Farzad Farhadzadeh:
Privacy amplification of content identification systems based on fingerprint bit reliability. WIFS 2010: 1-6
2000 – 2009
- 2009
- [c44]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Patrick Bas, François Cayre:
On security threats for robust perceptual hashing. Media Forensics and Security 2009: 72540H - [c43]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Thierry Pun:
Conception and limits of robust perceptual hashing: towards side information assisted hash functions. Media Forensics and Security 2009: 72540D - [c42]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Thierry Pun:
Random projections based item authentication. Media Forensics and Security 2009: 725413 - [c41]Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak:
Fast identification algorithms for forensic applications. WIFS 2009: 76-80 - [c40]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Taras Holotyak, Fokko Beekhof:
Privacy enhancement of common randomness based authentication: Key rate maximized case. WIFS 2009: 86-90 - 2008
- [j10]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Fokko Beekhof, Thierry Pun:
Authentication of biometric identification documents via mobile devices. J. Electronic Imaging 17(1): 011014 (2008) - [j9]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Quantization-Based Methods: Additive Attacks Performance Analysis. Trans. Data Hiding Multim. Secur. 3: 70-90 (2008) - [c39]Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Emre Topak:
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures. e-Forensics 2008: 28 - [c38]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Privacy-preserving biometric person identification. EUSIPCO 2008: 1-5 - [c37]Mariam E. Haroutunian, Smbat Tonoyan, Oleksiy J. Koval, Sviatoslav Voloshynovskiy:
On reversible information hiding system. ISIT 2008: 940-944 - [c36]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Privacy-preserving multimodal person and object identification. MM&Sec 2008: 177-184 - [c35]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Multimodal authentication based on random projections and source coding. MM&Sec 2008: 195-204 - [c34]Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Thierry Pun:
Secure surface identification codes. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190D - [c33]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun:
Analysis of physical unclonable identification based on reference list decoding. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190B - [c32]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Renato Villán, Thierry Pun:
Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190P - [c31]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun:
Security analysis of robust perceptual hashing. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681906 - 2007
- [j8]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Quality enhancement of printed-and-scanned images using distributed coding. Signal Process. 87(6): 1301-1313 (2007) - [c30]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Analysis of multimodal binary detection systems based on dependent/independent modalities. MMSP 2007: 70-73 - [c29]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fokko Beekhof, Thierry Pun:
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations. MMSP 2007: 345-348 - [c28]Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051T - [c27]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Error exponent analysis of person identification based on fusion of dependent/independent modalities. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650515 - 2006
- [j7]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Facial Image Compression Based on Structured Codebooks in Overcomplete Domain. EURASIP J. Adv. Signal Process. 2006 (2006) - [j6]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, José-Emilio Vila-Forcén, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Robustness improvement of known-host-state data-hiding using host statistics. Signal Process. 86(5): 1076-1088 (2006) - [j5]Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management. IEEE Trans. Inf. Forensics Secur. 1(4): 405-420 (2006) - [j4]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
The edge process model and its application to information-hiding capacity analysis. IEEE Trans. Signal Process. 54(5): 1813-1825 (2006) - [c26]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Costa Problem Under Channel Ambiguity. ICASSP (2) 2006: 289-292 - [c25]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Self-Embedding Data Hiding for Non-Gaussian State-Dependent Channels: Laplacian Case. ICME 2006: 845-848 - [c24]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun:
Information-theoretic analysis of steganalysis in real images. MM&Sec 2006: 11-16 - [c23]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun:
On reversibility of random binning based data-hiding techniques: security perspectives. MM&Sec 2006: 89-96 - [c22]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Performance analysis of nonuniform quantization-based data hiding. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720X - [c21]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, Thierry Pun:
Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721F - [c20]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Emre Topak, José-Emilio Vila-Forcén, Frédéric Deguillaume, Yuriy B. Rytsar, Thierry Pun:
Information-theoretic analysis of electronic and printed document authentication. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721D - [c19]Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, José-Emilio Vila-Forcén, Emre Topak, Frédéric Deguillaume, Yuriy B. Rytsar, Thierry Pun:
Text data-hiding for digital and printed documents: theoretical and practical considerations. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607212 - [c18]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mariam E. Haroutunian, José-Emilio Vila-Forcén, Thierry Pun:
E-capacity analysis of data-hiding channels with geometrical attacks. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607213 - 2005
- [j3]Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Oleksiy J. Koval, Thierry Pun:
Information-Theoretic Data-Hiding: Recent Achievements And Open Problems. Int. J. Image Graph. 5(1): 5-36 (2005) - [j2]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
Towards geometrically robust data-hiding with structured codebooks. Multim. Syst. 11(2): 121-132 (2005) - [j1]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Image denoising based on the edge-process model. Signal Process. 85(10): 1950-1969 (2005) - [c17]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun:
On Reversibility of Random Binning Techniques: Multimedia Perspectives. Communications and Multimedia Security 2005: 108-118 - [c16]Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy B. Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun:
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. Communications and Multimedia Security 2005: 280-281 - [c15]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups. EUSIPCO 2005: 1-4 - [c14]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Mehmet Kivanç Mihçak, José-Emilio Vila-Forcén, Thierry Pun:
Data-hiding with partially available side information. EUSIPCO 2005: 1-4 - [c13]José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Thierry Pun:
Asymmetric spread spectrum data-hiding for Laplacian host data. ICIP (1) 2005: 217-220 - [c12]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Practical Data-Hiding: Additive Attacks Performance Analysis. IWDW 2005: 244-259 - [c11]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Worst-case additive attack against quantization-based data-hiding methods. Security, Steganography, and Watermarking of Multimedia Contents 2005: 136-146 - [c10]Renato Villán, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management. Security, Steganography, and Watermarking of Multimedia Contents 2005: 453-464 - [c9]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun:
Robustness improvement of known-host-state watermarking using host statistics. Security, Steganography, and Watermarking of Multimedia Contents 2005: 569-577 - [c8]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun:
Security analysis of robust data-hiding with geometrically structured codebooks. Security, Steganography, and Watermarking of Multimedia Contents 2005: 709-720 - 2004
- [c7]Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun:
Capacity analysis of periodical watermarking. EUSIPCO 2004: 265-268 - [c6]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Spread spectrum watermarking for real images: Is everything so hopeless? EUSIPCO 2004: 1477-1480 - [c5]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Quantization-based watermarking performance improvement using host statistics: AWGN attack case. MM&Sec 2004: 35-39 - [c4]José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Thierry Pun, Fernando Pérez-González:
Worst case additive attack against quantization-based watermarking techniques. MMSP 2004: 135-138 - [c3]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. Security, Steganography, and Watermarking of Multimedia Contents 2004: 428-445 - [c2]José-Emilio Vila-Forcén, Oleksiy J. Koval, Sviatoslav Voloshynovskiy:
Distributed single source coding with side information. VCIP 2004 - 2003
- [c1]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Frédéric Deguillaume, Thierry Pun:
Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models. Security and Watermarking of Multimedia Contents 2003: 580-593
Coauthor Index
aka: Svyatoslav Voloshynovskiy
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint