Two-level QR code for private message sharing and document authentication I Tkachenko, W Puech, C Destruel, O Strauss, JM Gaudin, C Guichard IEEE Transactions on Information Forensics and Security 11 (3), 571-583, 2015 | 164 | 2015 |
Printed document authentication using two level QR code I Tkachenko, W Puech, O Strauss, C Destruel, JM Gaudin 2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016 | 32 | 2016 |
Centrality bias measure for high density QR code module recognition I Tkachenko, W Puech, O Strauss, JM Gaudin, C Destruel, C Guichard Signal Processing: Image Communication 41, 46-60, 2016 | 17 | 2016 |
Rich QR code for multimedia management applications I Tkachenko, W Puech, O Strauss, C Destruel, JM Gaudin, C Guichard Image Analysis and Processing—ICIAP 2015: 18th International Conference …, 2015 | 17 | 2015 |
Can copy detection patterns be copied? evaluating the performance of attacks and highlighting the role of the detector E Khermaza, I Tkachenko, J Picard 2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021 | 16 | 2021 |
Fighting against forged documents by using textured image I Tkachenko, W Puech, O Strauss, JM Gaudin, C Destruel, C Guichard 2014 22nd European Signal Processing Conference (EUSIPCO), 790-794, 2014 | 14 | 2014 |
Estimation of copy-sensitive codes using a neural approach R Yadav, I Tkachenko, A Trémeau, T Fournel Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 13 | 2019 |
Sensitivity of different correlation measures to print-and-scan process I Tkachenko, C Destruel, O Strauss, W Puech Electronic Imaging 29, 121-127, 2017 | 11 | 2017 |
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code I Tkachenko, C Destruel 2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018 | 9 | 2018 |
Generation and analysis of graphical codes using textured patterns for printed document authentication I Tkachenko Université Montpellier, 2015 | 9 | 2015 |
Improving the module recognition rate of high density QR codes (Version 40) by using centrality bias I Tkachenko, W Puech, O Strauss, JM Gaudin, C Destruel, C Guichard 2014 4th International Conference on Image Processing Theory, Tools and …, 2014 | 8 | 2014 |
Copy sensitive graphical code estimation: Physical vs numerical resolution R Yadav, I Tkachenko, A Trémeau, T Fournel 2019 IEEE International Workshop on Information Forensics and Security (WIFS …, 2019 | 6 | 2019 |
Authentication of Medicine Blister Foils: Characterization of the Rotogravure Printing Process I Tkachenko, A Trémeau, T Fournel VISAPP'2019, 2019 | 6 | 2019 |
Robustness of character recognition techniques to double print-and-scan process I Tkachenko, P Gomez-Krämer 2017 14th IAPR International Conference on Document Analysis and Recognition …, 2017 | 6 | 2017 |
Use of linear error-correcting subcodes in flow watermarking for channels with substitution and deletion errors B Assanovich, W Puech, I Tkachenko Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International …, 2013 | 6 | 2013 |
Copy Sensitive Graphical Code Quality Improvement Using a Super-Resolution Technique I Tkachenko, F Kucharczak, C Destruel, O Strauss, W Puech 2018 25th IEEE International Conference on Image Processing (ICIP), 3808-3812, 2018 | 5 | 2018 |
Senior Member, IEEE, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, and Christian Guichard,“Two-Level QR Code for Private Message Sharing and Document Authentication,” I Tkachenko, W Puech IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 11 (3), 2016 | 5 | 2016 |
Authentication of rotogravure print-outs using a regular test pattern I Tkachenko, A Trémeau, T Fournel Journal of information security and applications 66, 103133, 2022 | 3 | 2022 |
Improving Generalization in Facial Manipulation Detection Using Image Noise Residuals and Temporal Features M Atamna, I Tkachenko, S Miguet 2023 IEEE International Conference on Image Processing (ICIP), 3424-3428, 2023 | 1 | 2023 |
Protecting documents using printed anticopy elements I Tkachenko, A Tremeau, T Fournel Wiley Data and Cybersecurity, 2022 | 1 | 2022 |