default search action
Iuliia Tkachenko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c21]Tetiana Yemelianenko, Iuliia Tkachenko, Tess Masclef, Mihaela Scuturici, Serge Miguet:
Learning to rank approach for refining image retrieval in visual arts. ICCV (Workshops) 2023: 1615-1623 - [c20]Mehdi Atamna, Iuliia Tkachenko, Serge Miguet:
Improving Generalization in Facial Manipulation Detection Using Image Noise Residuals and Temporal Features. ICIP 2023: 3424-3428 - [c19]Tetiana Yemelianenko, Alain Trémeau, Iuliia Tkachenko:
Printed Packaging Authentication: Similarity Metric Learning for Rotogravure Manufacture Process Identification. VISIGRAPP (4: VISAPP) 2023: 905-911 - [c18]Hédi Zeghidi, Carlos Fernando Crispim Junior, Iuliia Tkachenko:
CDP-Sim: Similarity Metric Learning to Identify the Fake Copy Detection Patterns. WIFS 2023: 1-6 - 2022
- [j3]Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Authentication of rotogravure print-outs using a regular test pattern. J. Inf. Secur. Appl. 66: 103133 (2022) - [c17]Felix Yriarte, Pauline Puteaux, Iuliia Tkachenko:
A Two-Step Method for Ensuring Printed Document Integrity using Crossing Number Distances. WIFS 2022: 1-6 - 2021
- [c16]Pauline Puteaux, Iuliia Tkachenko:
Crossing Number Features: From Biometrics to Printed Character Matching. ICDAR Workshops (1) 2021: 437-450 - [c15]Elyes Khermaza, Iuliia Tkachenko, Justin Picard:
Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detector. WIFS 2021: 1-6 - 2020
- [c14]Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures. WIFS 2020: 1-6
2010 – 2019
- 2019
- [c13]Rohit Yadav, Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Estimation of Copy-sensitive Codes Using a Neural Approach. IH&MMSec 2019: 77-82 - [c12]Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Authentication of Medicine Blister Foils: Characterization of the Rotogravure Printing Process. VISIGRAPP (4: VISAPP) 2019: 577-583 - [c11]Rohit Yadav, Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution. WIFS 2019: 1-6 - 2018
- [c10]Iuliia Tkachenko, Florentin Kucharczak, Christophe Destruel, Olivier Strauss, William Puech:
Copy Sensitive Graphical Code Quality Improvement Using a Super-Resolution Technique. ICIP 2018: 3808-3812 - [c9]Iuliia Tkachenko, Christophe Destruel:
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code. WIFS 2018: 1-6 - 2017
- [c8]Iuliia Tkachenko, Petra Gomez-Krämer:
Robustness of Character Recognition Techniques to Double Print-and-Scan Process. IWCDF@ICDAR 2017: 27-32 - [c7]Iuliia Tkachenko, Christophe Destruel, Olivier Strauss, William Puech:
Sensitivity of different correlation measures to print-and-scan process. Media Watermarking, Security, and Forensics 2017: 121-127 - 2016
- [j2]Iuliia Tkachenko, William Puech, Olivier Strauss, Jean-Marc Gaudin, Christophe Destruel, Christian Guichard:
Centrality bias measure for high density QR code module recognition. Signal Process. Image Commun. 41: 46-60 (2016) - [j1]Iuliia Tkachenko, William Puech, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, Christian Guichard:
Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Trans. Inf. Forensics Secur. 11(3): 571-583 (2016) - [c6]Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel, Jean-Marc Gaudin:
Printed document authentication using two level or code. ICASSP 2016: 2149-2153 - [c5]Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel:
Experimental study of Print-and-Scan impact as random process. Media Watermarking, Security, and Forensics 2016: 1-11 - 2015
- [b1]Iuliia Tkachenko:
Generation and analysis of graphical codes using textured patterns for printed document authentication. (Génération et analyse des codes graphiques utilisant des motifs texturés pour l'authentification de documents imprimés). University of Montpellier, France, 2015 - [c4]Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel, Jean-Marc Gaudin, Christian Guichard:
Rich QR Code for Multimedia Management Applications. ICIAP (2) 2015: 383-393 - 2014
- [c3]Iuliia Tkachenko, William Puech, Olivier Strauss, Jean-Marc Gaudin, Christophe Destruel, Christian Guichard:
Fighting against forged documents by using textured image. EUSIPCO 2014: 790-794 - [c2]Iuliia Tkachenko, William Puech, Olivier Strauss, Jean-Marc Gaudin, Christophe Destruel, Christian Guichard:
Improving the module recognition rate of high density QR codes (Version 40) by using centrality bias. IPTA 2014: 155-160 - 2013
- [c1]Boris Assanovich, William Puech, Iuliia Tkachenko:
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors. Communications and Multimedia Security 2013: 105-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint