关注
Paweł Korus
Paweł Korus
在 amazon.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Multi-scale Analysis Strategies in PRNU-based Tampering Localization
P Korus, J Huang
IEEE Transactions on Information Forensics and Security 12 (4), 2017
2092017
Digital image integrity – a survey of protection and verification techniques
P Korus
Digital Signal Processing 71, 2017
1472017
Efficient Method for Content Reconstruction with Self-Embedding
P Korus, A Dziech
IEEE Transactions on Image Processing 22 (3), 1134 - 1147, 2013
1112013
Multi-scale fusion for improved localization of malicious tampering in digital images
P Korus, J Huang
IEEE Transactions on Image Processing 25 (3), 1312-1326, 2016
952016
Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization
P Korus, J Huang
IEEE International Workshop on Information Forensics and Security, 2016
632016
Band Energy Difference for Source Attribution in Audio Forensics
D Luo, P Korus, J Huang
IEEE Transactions on Information Forensics and Security, 2018
532018
Towards Practical Self-Embedding for JPEG-compressed Digital Images
P Korus, J Bialas, A Dziech
IEEE Transactions on Multimedia 17 (2), 157 - 170, 2015
372015
FiFTy: large-scale file fragment type identification using convolutional neural networks
G Mittal, P Korus, N Memon
IEEE Transactions on Information Forensics and Security 16, 28-41, 2020
362020
Adaptive Self-Embedding Scheme with Controlled Reconstruction Performance
P Korus, A Dziech
IEEE Transactions on Information Forensics and Security 9 (2), 169 - 181, 2014
362014
Adversarial Optimization for Dictionary Attacks on Speaker Verification.
M Marras, P Korus, ND Memon, G Fenu
Interspeech, 2913-2917, 2019
322019
Hard-attention for scalable image classification
A Papadopoulos, P Korus, N Memon
Advances in Neural Information Processing Systems 34, 14694-14707, 2021
312021
Improved tampering localization in digital image forensics based on maximal entropy random walk
P Korus, J Huang
IEEE Signal Processing Letters 23 (1), 169-173, 2015
242015
Content authentication for neural imaging pipelines: End-to-end optimization of photo provenance in complex distribution channels
P Korus, N Memon
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
182019
A new approach to high-capacity annotation watermarking based on digital fountain codes
P Korus, J Białas, A Dziech
Multimedia Tools and Applications 68, 59-77, 2014
182014
Every shred helps: Assembling evidence from orphaned JPEG fragments
E Durmus, P Korus, N Memon
IEEE Transactions on Information Forensics and Security 14 (9), 2372-2386, 2019
152019
A scheme for censorship of sensitive image content with high-quality reconstruction ability
P Korus, W Szmuc, A Dziech
2010 IEEE International Conference on Multimedia and Expo, 1073-1078, 2010
152010
A novel approach to adaptive image authentication
P Korus, A Dziech
2011 18th IEEE International Conference on Image Processing, 2765-2768, 2011
142011
Overview of recent advances in CCTV processing chain in the INDECT and INSIGMA projects
A Dziech, J Bialas, A Glowacz, P Korus, M Leszczuk, A Matiolalski, ...
2013 International Conference on Availability, Reliability and Security, 836-843, 2013
112013
Image-like 2d barcodes using generalizations of the Kuznetsov–Tsybakov problem
J Duda, P Korus, NJ Gadgil, K Tahboub, EJ Delp
IEEE Transactions on Information Forensics and Security 11 (4), 691-703, 2015
92015
Reconfigurable self-embedding with high quality restoration under extensive tampering
P Korus, A Dziech
2012 19th IEEE International Conference on Image Processing, 2193-2196, 2012
72012
系统目前无法执行此操作,请稍后再试。
文章 1–20