Multi-scale Analysis Strategies in PRNU-based Tampering Localization P Korus, J Huang IEEE Transactions on Information Forensics and Security 12 (4), 2017 | 209 | 2017 |
Digital image integrity – a survey of protection and verification techniques P Korus Digital Signal Processing 71, 2017 | 147 | 2017 |
Efficient Method for Content Reconstruction with Self-Embedding P Korus, A Dziech IEEE Transactions on Image Processing 22 (3), 1134 - 1147, 2013 | 111 | 2013 |
Multi-scale fusion for improved localization of malicious tampering in digital images P Korus, J Huang IEEE Transactions on Image Processing 25 (3), 1312-1326, 2016 | 95 | 2016 |
Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization P Korus, J Huang IEEE International Workshop on Information Forensics and Security, 2016 | 63 | 2016 |
Band Energy Difference for Source Attribution in Audio Forensics D Luo, P Korus, J Huang IEEE Transactions on Information Forensics and Security, 2018 | 53 | 2018 |
Towards Practical Self-Embedding for JPEG-compressed Digital Images P Korus, J Bialas, A Dziech IEEE Transactions on Multimedia 17 (2), 157 - 170, 2015 | 37 | 2015 |
FiFTy: large-scale file fragment type identification using convolutional neural networks G Mittal, P Korus, N Memon IEEE Transactions on Information Forensics and Security 16, 28-41, 2020 | 36 | 2020 |
Adaptive Self-Embedding Scheme with Controlled Reconstruction Performance P Korus, A Dziech IEEE Transactions on Information Forensics and Security 9 (2), 169 - 181, 2014 | 36 | 2014 |
Adversarial Optimization for Dictionary Attacks on Speaker Verification. M Marras, P Korus, ND Memon, G Fenu Interspeech, 2913-2917, 2019 | 32 | 2019 |
Hard-attention for scalable image classification A Papadopoulos, P Korus, N Memon Advances in Neural Information Processing Systems 34, 14694-14707, 2021 | 31 | 2021 |
Improved tampering localization in digital image forensics based on maximal entropy random walk P Korus, J Huang IEEE Signal Processing Letters 23 (1), 169-173, 2015 | 24 | 2015 |
Content authentication for neural imaging pipelines: End-to-end optimization of photo provenance in complex distribution channels P Korus, N Memon Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 18 | 2019 |
A new approach to high-capacity annotation watermarking based on digital fountain codes P Korus, J Białas, A Dziech Multimedia Tools and Applications 68, 59-77, 2014 | 18 | 2014 |
Every shred helps: Assembling evidence from orphaned JPEG fragments E Durmus, P Korus, N Memon IEEE Transactions on Information Forensics and Security 14 (9), 2372-2386, 2019 | 15 | 2019 |
A scheme for censorship of sensitive image content with high-quality reconstruction ability P Korus, W Szmuc, A Dziech 2010 IEEE International Conference on Multimedia and Expo, 1073-1078, 2010 | 15 | 2010 |
A novel approach to adaptive image authentication P Korus, A Dziech 2011 18th IEEE International Conference on Image Processing, 2765-2768, 2011 | 14 | 2011 |
Overview of recent advances in CCTV processing chain in the INDECT and INSIGMA projects A Dziech, J Bialas, A Glowacz, P Korus, M Leszczuk, A Matiolalski, ... 2013 International Conference on Availability, Reliability and Security, 836-843, 2013 | 11 | 2013 |
Image-like 2d barcodes using generalizations of the Kuznetsov–Tsybakov problem J Duda, P Korus, NJ Gadgil, K Tahboub, EJ Delp IEEE Transactions on Information Forensics and Security 11 (4), 691-703, 2015 | 9 | 2015 |
Reconfigurable self-embedding with high quality restoration under extensive tampering P Korus, A Dziech 2012 19th IEEE International Conference on Image Processing, 2193-2196, 2012 | 7 | 2012 |