Follow
Taras Holotyak
Taras Holotyak
Reseacher at Department of Computer Sciences, University of Geneva
Verified email at unige.ch - Homepage
Title
Cited by
Cited by
Year
New blind steganalysis and its implications
M Goljan, J Fridrich, T Holotyak
Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006
3812006
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
T Holotyak, J Fridrich, S Voloshynovskiy
Communications and multimedia security 3677, 273-274, 2005
1762005
Forensic steganalysis: determining the stego key in spatial domain steganography
J Fridrich, M Goljan, D Soukal, T Holotyak
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
752005
Stochastic approach to secret message length estimation in±k embedding steganography
T Holotyak, J Fridrich, D Soukal
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
702005
Defending against adversarial attacks by randomized diversification
O Taran, S Rezaeifar, T Holotyak, S Voloshynovskiy
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
502019
Information-theoretical analysis of private content identification
S Voloshynovskiy, O Koval, F Beekhof, F Farhadzadeh, T Holotyak
2010 IEEE Information Theory Workshop, 1-5, 2010
472010
Information bottleneck through variational glasses
S Voloshynovskiy, M Kondah, S Rezaeifar, O Taran, T Holotyak, ...
arXiv preprint arXiv:1912.00830, 2019
432019
Fast content identification in high-dimensional feature spaces using sparse ternary codes
S Ferdowsi, S Voloshynovskiy, D Kostadinov, T Holotyak
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
322016
New blind steganalysis and its implications
J Fridrich, M Goljan, T Holotyak
Proc. SPIE Electronic Imaging 6072, 1-13, 2006
272006
Variational information bottleneck for semi-supervised classification
S Voloshynovskiy, O Taran, M Kondah, T Holotyak, D Rezende
Entropy 22 (9), 943, 2020
232020
A framework for fast and secure packaging identification on mobile phones
M Diephuis, S Voloshynovskiy, T Holotyak, N Stendardo, B Keel
Media Watermarking, Security, and Forensics 2014 9028, 296-305, 2014
222014
Machine learning attack on copy detection patterns: are patterns cloneable?
R Chaban, O Taran, J Tutt, T Holotyak, S Bonev, S Voloshynovskiy
2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021
202021
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
O Taran, S Rezaeifar, T Holotyak, S Voloshynovskiy
EURASIP journal on information security 2020, 1-18, 2020
192020
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness
S Voloshynovskiy, T Holotyak, P Bas
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
192016
Active content fingerprinting: a marriage of digital watermarking and content fingerprinting
S Voloshynovskiy, F Farhadzadeh, O Koval, T Holotyak
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
192012
Fast identification algorithms for forensic applications
F Beekhof, S Voloshynovskiy, O Koval, T Holotyak
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
182009
Image indexing and retrieval using GSOM algorithm
M Gabryel, R Grycuk, M Korytkowski, T Holotyak
Artificial Intelligence and Soft Computing: 14th International Conference …, 2015
172015
Privacy-preserving image sharing via sparsifying layers on convolutional groups
S Ferdowsi, B Razeghi, T Holotyak, FP Calmon, S Voloshynovskiy
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
132020
Fast physical object identification based on unclonable features and soft fingerprinting
T Holotyak, S Voloshynovskiy, O Koval, F Beekhof
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
122011
On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption
S Voloshynovskiy, F Beekhof, O Koval, T Holotyak
Proceedings of the International Workshop on Signal Processing in the …, 2009
122009
The system can't perform the operation now. Try again later.
Articles 1–20