Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (famos)

S Voloshynovskiy, M Diephuis… - … and Security (WIFS), 2012 - ieeexplore.ieee.org
Nowadays, the field of physical object security based on surface microstructures lacks
common and shared data for the development, testing and fair benchmarking of new …

Information-theoretical analysis of private content identification

S Voloshynovskiy, O Koval, F Beekhof… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
In recent years, content identification based on digital fingerprinting attracts a lot of attention
in different emerging applications. At the same time, the theoretical analysis of digital …

Performance analysis of content-based identification using constrained list-based decoding

F Farhadzadeh, S Voloshynovskiy… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
This paper is dedicated to the performance analysis of content-based identification using
binary fingerprints and constrained list-based decoding. We formulate content-based …

Content authentication and identification under informed attacks

F Beekhof, S Voloshynovskiy… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
We consider the problem of content identification and authentication based on digital
content fingerprinting. Contrary to existing work in which the performance of these systems …

Information-theoretic analysis of content based identification for correlated data

F Farhadzadeh, S Voloshynovskiy… - 2011 IEEE …, 2011 - ieeexplore.ieee.org
A number of different multimedia fingerprinting algorithms and identification techniques were
proposed and analyzed recently. This paper presents a content identification setup for a …

Physical object authentication with correlated camera noise

FP Beekhof, S Voloshynovskiy, M Diephuis… - … , Technologie und Web …, 2013 - dl.gi.de
In this paper, we address the problem of physical object authentication based on surface
microstructure images. The authentication is based on digital content fingerprints computed …

Trading-off performance and complexity in identification problem

T Holotyak, S Voloshynovskiy, O Koval… - … , and Forensics III, 2011 - spiedigitallibrary.org
In this paper, we consider an information-theoretic formulation of the content identification
under search complexity constrain. The proposed framework is based on soft fingerprinting …

[PDF][PDF] Physical Object Protection based on Micro-structure Fingerprinting

F Beekhof - fondationlatsis.org
Users and manufacturers of physical objects face problems due to uncertainty about the
origin of goods, which are physical objects. Counterfeit products may be confused with …

[PDF][PDF] Information-theoretic analysis of privacy-preserving identification

T Holotyak - 2012 - access.archive-ouverte.unige.ch
Digital content fingerprinting has emerged as a possible technique for fast, robust and
privacy-preserving identification, which is a highly demanded application due to the …

Private content identification: Performance-privacy-complexity trade-off

S Voloshynovskiy, O Koval, F Beekhof… - … on Multimedia Signal …, 2010 - ieeexplore.ieee.org
In light of the recent development of multimedia and networking technologies, an
exponentially increasing amount of content is available via various public services. That is …