Taras Holotyak
Taras Holotyak
Reseacher at Department of Computer Sciences, University of Geneva
Verified email at unige.ch - Homepage
Title
Cited by
Cited by
Year
New blind steganalysis and its implications
M Goljan, J Fridrich, T Holotyak
Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006
3382006
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
G Xuan, YQ Shi, J Gao, D Zou, C Yang, Z Zhang, P Chai, C Chen, ...
International Workshop on Information Hiding, 262-277, 2005
2582005
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
T Holotyak, J Fridrich, S Voloshynovskyy
9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security …, 2005
1572005
Forensic steganalysis: determining the stego key in spatial domain steganography
J Fridrich, M Goljan, D Soukal, T Holotyak
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
632005
Stochastic approach to secret message length estimation in±k embedding steganography
T Holotyak, J Fridrich, D Soukal
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
622005
Information-theoretical analysis of private content identification
S Voloshynovskiy, O Koval, F Beekhof, F Farhadzadeh, T Holotyak
2010 IEEE Information Theory Workshop, 1-5, 2010
462010
Fast content identification in high-dimensional feature spaces using sparse ternary codes
S Ferdowsi, S Voloshynovskiy, D Kostadinov, T Holotyak
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
272016
New blind steganalysis and its implications
J Fridrich, M Goljan, T Holotyak
Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents …, 2006
252006
Image indexing and retrieval using GSOM algorithm
M Gabryel, R Grycuk, M Korytkowski, T Holotyak
International Conference on Artificial Intelligence and Soft Computing, 706-714, 2015
182015
Fast identification algorithms for forensic applications
F Beekhof, S Voloshynovskiy, O Koval, T Holotyak
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
182009
Active content fingerprinting: a marriage of digital watermarking and content fingerprinting
S Voloshynovskiy, F Farhadzadeh, O Koval, T Holotyak
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
162012
A framework for fast and secure packaging identification on mobile phones
M Diephuis, S Voloshynovskiy, T Holotyak, N Stendardo, B Keel
Media Watermarking, Security, and Forensics 2014 9028, 90280T, 2014
152014
On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption
S Voloshynovskyy, FP Beekhof, O Koval, T Holotyak
Proceedings of the International Workshop on Signal Processing in the …, 2009
132009
Defending against adversarial attacks by randomized diversification
O Taran, S Rezaeifar, T Holotyak, S Voloshynovskiy
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
122019
Feature extraction of palm vein patterns based on two-dimensional density function
M Kubanek, D Smorawa, T Holotyak
International Conference on Artificial Intelligence and Soft Computing, 101-111, 2015
102015
Fast physical object identification based on unclonable features and soft fingerprinting
T Holotyak, S Voloshynovskiy, O Koval, F Beekhof
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
102011
Sparse ternary codes for similarity search have higher coding gain than dense binary codes
S Ferdowsi, S Voloshynovskiy, D Kostadinov, T Holotyak
2017 IEEE International Symposium on Information Theory (ISIT), 2653-2657, 2017
92017
Forensic authentication of banknotes on mobile phones
T Dewaele, M Diephuis, T Holotyak, S Voloshynovskiy
Electronic Imaging 2016 (8), 1-8, 2016
92016
Active content fingerprinting: Shrinkage and lattice based modulations
F Farhadzadeh, S Voloshynovskiy, T Holotyak, F Beekhof
2013 IEEE International Conference on Acoustics, Speech and Signal …, 2013
92013
Information-theoretic analysis of steganalysis in real images
O Koval, S Voloshynovskiy, T Holotyak, T Pun
Proceedings of the 8th workshop on Multimedia and security, 11-16, 2006
92006
The system can't perform the operation now. Try again later.
Articles 1–20