Follow
Paweł Korus
Title
Cited by
Cited by
Year
Multi-scale Analysis Strategies in PRNU-based Tampering Localization
P Korus, J Huang
IEEE Transactions on Information Forensics and Security 12 (4), 2017
2132017
Digital image integrity – a survey of protection and verification techniques
P Korus
Digital Signal Processing 71, 2017
1512017
Efficient Method for Content Reconstruction with Self-Embedding
P Korus, A Dziech
IEEE Transactions on Image Processing 22 (3), 1134 - 1147, 2013
1112013
Multi-scale fusion for improved localization of malicious tampering in digital images
P Korus, J Huang
IEEE Transactions on Image Processing 25 (3), 1312-1326, 2016
982016
Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization
P Korus, J Huang
IEEE International Workshop on Information Forensics and Security, 2016
632016
Band Energy Difference for Source Attribution in Audio Forensics
D Luo, P Korus, J Huang
IEEE Transactions on Information Forensics and Security, 2018
552018
FiFTy: large-scale file fragment type identification using convolutional neural networks
G Mittal, P Korus, N Memon
IEEE Transactions on Information Forensics and Security 16, 28-41, 2020
392020
Towards Practical Self-Embedding for JPEG-compressed Digital Images
P Korus, J Bialas, A Dziech
IEEE Transactions on Multimedia 17 (2), 157 - 170, 2015
392015
Adaptive Self-Embedding Scheme with Controlled Reconstruction Performance
P Korus, A Dziech
IEEE Transactions on Information Forensics and Security 9 (2), 169 - 181, 2014
362014
Hard-attention for scalable image classification
A Papadopoulos, P Korus, N Memon
Advances in Neural Information Processing Systems 34, 14694-14707, 2021
352021
Adversarial Optimization for Dictionary Attacks on Speaker Verification.
M Marras, P Korus, ND Memon, G Fenu
Interspeech, 2913-2917, 2019
332019
Improved tampering localization in digital image forensics based on maximal entropy random walk
P Korus, J Huang
IEEE Signal Processing Letters 23 (1), 169-173, 2015
242015
Content authentication for neural imaging pipelines: End-to-end optimization of photo provenance in complex distribution channels
P Korus, N Memon
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
202019
A new approach to high-capacity annotation watermarking based on digital fountain codes
P Korus, J Białas, A Dziech
Multimedia Tools and Applications 68, 59-77, 2014
182014
A scheme for censorship of sensitive image content with high-quality reconstruction ability
P Korus, W Szmuc, A Dziech
2010 IEEE International Conference on Multimedia and Expo, 1073-1078, 2010
162010
Every shred helps: Assembling evidence from orphaned JPEG fragments
E Durmus, P Korus, N Memon
IEEE Transactions on Information Forensics and Security 14 (9), 2372-2386, 2019
152019
A novel approach to adaptive image authentication
P Korus, A Dziech
2011 18th IEEE International Conference on Image Processing, 2765-2768, 2011
142011
Image-like 2d barcodes using generalizations of the Kuznetsov–Tsybakov problem
J Duda, P Korus, NJ Gadgil, K Tahboub, EJ Delp
IEEE Transactions on Information Forensics and Security 11 (4), 691-703, 2015
112015
Overview of recent advances in CCTV processing chain in the INDECT and INSIGMA projects
A Dziech, J Bialas, A Glowacz, P Korus, M Leszczuk, A Matiolalski, ...
2013 International Conference on Availability, Reliability and Security, 836-843, 2013
112013
Dictionary attacks on speaker verification
M Marras, P Korus, A Jain, N Memon
IEEE Transactions on Information Forensics and Security 18, 773-788, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20