Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Iuliia Tkachenko"'
Publikováno v:
Multimedia Security 2. :31-58
Publikováno v:
Proceedings of the 18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications.
Publikováno v:
2022 IEEE International Workshop on Information Forensics and Security (WIFS 2022)
2022 IEEE International Workshop on Information Forensics and Security (WIFS 2022), Dec 2022, Shanghai (en ligne), China. ⟨10.1109/WIFS55849.2022.9975383⟩
2022 IEEE International Workshop on Information Forensics and Security (WIFS 2022), Dec 2022, Shanghai (en ligne), China. ⟨10.1109/WIFS55849.2022.9975383⟩
International audience; Nowadays, with the use of photo-editing software being mainstream, document integrity verification has become crucial. As we have seen during the pandemic, most administrative documents are printed and then scanned before bein
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a6587a98a2a08d11611c53119bff55ae
https://hal.science/hal-03788148
https://hal.science/hal-03788148
Publikováno v:
Procedia CIRP
Procedia CIRP, ELSEVIER, 2020, 94, pp.551-556. ⟨10.1016/j.procir.2020.09.181⟩
Procedia CIRP, ELSEVIER, 2020, 94, pp.551-556. ⟨10.1016/j.procir.2020.09.181⟩
Narrow gap arc welding is a common solution for the welding of thick structures. In this study, a defocused laser beam is used to pre-melt the narrow gap walls in front of an arc-welding bath. Such a welding configuration can be referred to a hybrid
Publikováno v:
Sécurité multimédia 2 : Biométrie, protection et chiffrement multimédia
Sécurité multimédia 2 : Biométrie, protection et chiffrement multimédia, 2021, ⟨10.51926/ISTE.9027.ch2⟩
Sécurité multimédia 2 : Biométrie, protection et chiffrement multimédia, 2021, ⟨10.51926/ISTE.9027.ch2⟩
International audience; Ce chapitre dresse un panorama des approches en authentification de documents matérialisés avant de traiter de la protection par anticopie. Il passe en revue les différents types de dispositifs anticopies de l'état de l'ar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f981904a80d07c66b81c444bf5f2021a
https://hal.archives-ouvertes.fr/hal-03326654
https://hal.archives-ouvertes.fr/hal-03326654
Publikováno v:
Journal of Information Security and Applications. 66:103133
Autor:
Pauline Puteaux, Iuliia Tkachenko
Publikováno v:
Document Analysis and Recognition – ICDAR 2021 Workshops ISBN: 9783030861971
ICDAR Workshops (1)
3rd International Workshop on Computational Document Forensics (IWCDF 2021)
3rd International Workshop on Computational Document Forensics (IWCDF 2021), Sep 2021, Lausanne, Switzerland
ICDAR Workshops (1)
3rd International Workshop on Computational Document Forensics (IWCDF 2021)
3rd International Workshop on Computational Document Forensics (IWCDF 2021), Sep 2021, Lausanne, Switzerland
International audience; Nowadays, the security of both digital and hardcopy documents has become a real issue. As a solution, numerous integrity check approaches have been designed. The challenge lies in finding features which are robust to print-and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d144b50c8d4c6b307d775b134af3c6f6
https://doi.org/10.1007/978-3-030-86198-8_31
https://doi.org/10.1007/978-3-030-86198-8_31
Publikováno v:
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
2020 IEEE International Workshop on Information Forensics and Security (WIFS), Dec 2020, New York (virtual ), United States. pp.1-6, ⟨10.1109/WIFS49906.2020.9360883⟩
WIFS
2020 IEEE International Workshop on Information Forensics and Security (WIFS), Dec 2020, New York (virtual ), United States. pp.1-6, ⟨10.1109/WIFS49906.2020.9360883⟩
WIFS
International audience; The number of medicine counterfeits increases significantly. This problem affects not only expensive medicines, but also some low cost ones. In this paper, we study the characteristics of medicine packages printed using rotogr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef84ebb33b51160bd18fb78e48d185c2
https://hal.archives-ouvertes.fr/hal-03154680/file/wifs2020_Press_forensics.pdf
https://hal.archives-ouvertes.fr/hal-03154680/file/wifs2020_Press_forensics.pdf
Publikováno v:
2019 IEEE International Workshop on Information Forensics and Security (WIFS)
2019 IEEE International Workshop on Information Forensics and Security (WIFS), Dec 2019, Delft, Netherlands. pp.1-6, ⟨10.1109/WIFS47025.2019.9035104⟩
WIFS
2019 IEEE International Workshop on Information Forensics and Security (WIFS), Dec 2019, Delft, Netherlands. pp.1-6, ⟨10.1109/WIFS47025.2019.9035104⟩
WIFS
International audience; Recent papers point out the vulnerability of Copy Sensitive Graphical Codes (CSGC) while an opponent uses a neural network approach to estimate a pattern then prints it as an original one: such a fake can successfully pass the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c513b94a59ccc91b21780d303821503e
https://hal.archives-ouvertes.fr/hal-02550569/file/2019_WIFS_SRGAN.pdf
https://hal.archives-ouvertes.fr/hal-02550569/file/2019_WIFS_SRGAN.pdf
Publikováno v:
IH&MMSec
7th ACM Workshop on Information Hiding and Multimedia Security
7th ACM Workshop on Information Hiding and Multimedia Security, Jul 2019, Paris, France. ⟨10.1145/3335203.3335718⟩
7th ACM Workshop on Information Hiding and Multimedia Security
7th ACM Workshop on Information Hiding and Multimedia Security, Jul 2019, Paris, France. ⟨10.1145/3335203.3335718⟩
International audience; Copy sensitive graphical codes are used as anti-counterfeiting solution in packaging and document protection. Their security is funded on a design hard-to-predict after print and scan. In practice there exist different designs