Follow
oleksiy koval
oleksiy koval
the father of an incredible boy suffering from a severe form of autism
No verified email - Homepage
Title
Cited by
Cited by
Year
Brand protection and product autentication using portable devices
S Voloshynovskyy, O Koval, T Pun
US Patent 8,249,350, 2012
962012
Secure item identification and authentication system and method based on unclonable features
S Voloshynovskiy, O Koval, T Pun
US Patent 8,705,873, 2014
862014
Multilevel 2-D bar codes: Toward high-capacity storage modules for multimedia security and management
R Villán, S Voloshynovskiy, O Koval, T Pun
IEEE Transactions on Information Forensics and Security 1 (4), 405-420, 2006
762006
Text data-hiding for digital and printed documents: Theoretical and practical considerations
R Villán, S Voloshynovskiy, O Koval, J Vila, E Topak, F Deguillaume, ...
Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006
632006
Information-theoretical analysis of private content identification
S Voloshynovskiy, O Koval, F Beekhof, F Farhadzadeh, T Holotyak
2010 IEEE Information Theory Workshop, 1-5, 2010
462010
Visual communications with side information via distributed printing channels: extended multimedia and security perspectives
SV Voloshynovskiy, O Koval, F Deguillaume, T Pun
Security, Steganography, and Watermarking of Multimedia Contents VI 5306 …, 2004
442004
Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
R Villán, S Voloshynovskiy, O Koval, F Deguillaume, T Pun
Security, Steganography, and Watermarking of Multimedia Contents IX 6505 …, 2007
422007
Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management
R Villan, S Voloshynovskiy, O Koval, T Pun
Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia …, 2005
392005
Information-theoretic data-hiding: Recent achievements and open problems
S Voloshynovskiy, F Deguillaume, O Koval, T Pun
International Journal of Image and Graphics 5 (01), 5-35, 2005
372005
Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (famos)
S Voloshynovskiy, M Diephuis, F Beekhof, O Koval, B Keel
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
342012
The impact of denoising on independent component analysis of functional magnetic resonance imaging data
JM Pignat, O Koval, D Van De Ville, S Voloshynovskiy, C Michel, T Pun
Journal of neuroscience methods 213 (1), 105-122, 2013
322013
Conception and limits of robust perceptual hashing: towards side information assisted hash functions
S Voloshynovskiy, O Koval, F Beekhof, T Pun
Media forensics and security 7254, 120-131, 2009
322009
Secure surface identification codes
F Beekhof, S Voloshynovskiy, O Koval, R Villán, T Pun
Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008
282008
Security analysis of robust perceptual hashing
O Koval, S Voloshynovskiy, F Beekhof, T Pun
Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008
272008
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations
S Voloshynovskiy, O Koval, F Beekhof, T Pun
2007 IEEE 9th Workshop on Multimedia Signal Processing, 345-348, 2007
262007
Performance analysis of content-based identification using constrained list-based decoding
F Farhadzadeh, S Voloshynovskiy, O Koval
IEEE Transactions on Information Forensics and Security 7 (5), 1652-1667, 2012
242012
Wavelet-based image denoising using nonstationary stochastic geometrical image priors
SV Voloshynovskiy, O Koval, T Pun
Image and Video Communications and Processing 2003 5022, 675-687, 2003
242003
Image denoising based on the edge-process model
S Voloshynovskiy, O Koval, T Pun
Signal Processing 85 (10), 1950-1969, 2005
232005
Active content fingerprinting: a marriage of digital watermarking and content fingerprinting
S Voloshynovskiy, F Farhadzadeh, O Koval, T Holotyak
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
182012
Fast identification algorithms for forensic applications
F Beekhof, S Voloshynovskiy, O Koval, T Holotyak
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
182009
The system can't perform the operation now. Try again later.
Articles 1–20