Iuliia Tkachenko
Iuliia Tkachenko
LIRIS, CNRS, Université Lumière Lyon 2
Verified email at liris.cnrs.fr - Homepage
Title
Cited by
Cited by
Year
Two-level QR code for private message sharing and document authentication
I Tkachenko, W Puech, C Destruel, O Strauss, JM Gaudin, C Guichard
IEEE Transactions on Information Forensics and Security 11 (3), 571-583, 2015
982015
Printed document authentication using two level QR code
I Tkachenko, W Puech, O Strauss, C Destruel, JM Gaudin
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
222016
Centrality bias measure for high density QR code module recognition
I Tkachenko, W Puech, O Strauss, JM Gaudin, C Destruel, C Guichard
Signal Processing: Image Communication 41, 46-60, 2016
132016
Rich QR code for multimedia management applications
I Tkachenko, W Puech, O Strauss, C Destruel, JM Gaudin, C Guichard
International Conference on Image Analysis and Processing, 383-393, 2015
112015
Fighting against forged documents by using textured image
I Tkachenko, W Puech, O Strauss, JM Gaudin, C Destruel, C Guichard
2014 22nd European Signal Processing Conference (EUSIPCO), 790-794, 2014
112014
Sensitivity of different correlation measures to print-and-scan process
I Tkachenko, C Destruel, O Strauss, W Puech
Electronic Imaging 2017 (7), 121-127, 2017
82017
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code
I Tkachenko, C Destruel
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
72018
Improving the module recognition rate of high density QR codes (Version 40) by using centrality bias
I Tkachenko, W Puech, O Strauss, JM Gaudin, C Destruel, C Guichard
2014 4th International Conference on Image Processing Theory, Tools and …, 2014
62014
Estimation of copy-sensitive codes using a neural approach
R Yadav, I Tkachenko, A Trémeau, T Fournel
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
52019
Use of linear error-correcting subcodes in flow watermarking for channels with substitution and deletion errors
B Assanovich, W Puech, I Tkachenko
IFIP International Conference on Communications and Multimedia Security, 105-112, 2013
52013
Robustness of character recognition techniques to double print-and-scan process
I Tkachenko, P Gomez-Krämer
2017 14th IAPR International Conference on Document Analysis and Recognition …, 2017
42017
Generation and analysis of graphical codes using textured patterns for printed document authentication
I Tkachenko
Université Montpellier, 2015
42015
Authentication of Medicine Blister Foils: Characterization of the Rotogravure Printing Process
I Tkachenko, A Trémeau, T Fournel
VISAPP'2019, 2019
22019
Copy Sensitive Graphical Code Quality Improvement Using a Super-Resolution Technique
I Tkachenko, F Kucharczak, C Destruel, O Strauss, W Puech
2018 25th IEEE International Conference on Image Processing (ICIP), 3808-3812, 2018
22018
Crossing number features: from biometrics to printed character matching
P Puteaux, I Tkachenko
International Conference on Document Analysis and Recognition, 437-450, 2021
2021
Protection de documents par impression d’éléments anticopies
I Tkachenko, A Trémeau, T Fournel
Sécurité multimédia 2: Biométrie, protection et chiffrement multimédia, 41, 2021
2021
Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures
I Tkachenko, A Trémeau, T Fournel
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
2020
Copy Sensitive Graphical Code Estimation: Physical vs Numerical Resolution
R Yadav, I Tkachenko, A Trémeau, T Fournel
2019 IEEE International Workshop on Information Forensics and Security (WIFS …, 2019
2019
Experimental study of Print-and-Scan impact as random process
I Tkachenko, W Puech, O Strauss, C Destruel
Electronic Imaging 2016 (8), 1-11, 2016
2016
Code visuel graphique à deux niveaux d’information et sensible à la copie, procédés de génération et de lecture d’un tel code visuel
I Tkachenko, C Destruel, JM Gaudin, W Puech, O Strauss
FR Patent FR3027430A1, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20