Skip to main content

Showing 1–16 of 16 results for author: Holotyak, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.10204  [pdf, other

    astro-ph.IM cs.AI cs.CV

    Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model

    Authors: Mariia Drozdova, Vitaliy Kinakh, Omkar Bait, Olga Taran, Erica Lastufka, Miroslava Dessauges-Zavadsky, Taras Holotyak, Daniel Schaerer, Slava Voloshynovskiy

    Abstract: Reconstructing sky models from dirty radio images for accurate source localization and flux estimation is crucial for studying galaxy evolution at high redshift, especially in deep fields using instruments like the Atacama Large Millimetre Array (ALMA). With new projects like the Square Kilometre Array (SKA), there's a growing need for better source extraction methods. Current techniques, such as… ▽ More

    Submitted 20 February, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: In production in Astronomy&Astrophyics

  2. arXiv:2212.07326  [pdf, other

    cs.CV cs.CR

    Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

    Authors: Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Nowadays, copy detection patterns (CDP) appear as a very promising anti-counterfeiting technology for physical object protection. However, the advent of deep learning as a powerful attacking tool has shown that the general authentication schemes are unable to compete and fail against such attacks. In this paper, we propose a new mathematical model of printing-imaging channel for the authentication… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2022

  3. arXiv:2210.17420  [pdf, other

    cs.CV cs.LG

    Digital twins of physical printing-imaging channel

    Authors: Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of modeling a printing-imaging channel built on a machine learning approach a.k.a. digital twin for anti-counterfeiting applications based on copy detection patterns (CDP). The digital twin is formulated on an information-theoretic framework called Turbo that uses variational approximations of mutual information developed for both encoder and decoder in a two-… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2022

  4. arXiv:2210.05343  [pdf, other

    cs.CR cs.CV

    Printing variability of copy detection patterns

    Authors: Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection pattern (CDP) is a novel solution for products' protection against counterfeiting, which gains its popularity in recent years. CDP attracts the anti-counterfeiting industry due to its numerous benefits in comparison to alternative protection techniques. Besides its attractiveness, there is an essential gap in the fundamental analysis of CDP authentication performance in large-scale… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  5. arXiv:2209.15625  [pdf, other

    cs.CV cs.CR cs.LG

    Anomaly localization for copy detection patterns through print estimations

    Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) are recent technologies for protecting products from counterfeiting. However, in contrast to traditional copy fakes, deep learning-based fakes have shown to be hardly distinguishable from originals by traditional authentication systems. Systems based on classical supervised learning and digital templates assume knowledge of fake CDP at training time and cannot general… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

  6. arXiv:2206.11793  [pdf, other

    cs.CR cs.LG

    Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

    Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) are an attractive technology that allows manufacturers to defend their products against counterfeiting. The main assumption behind the protection mechanism of CDP is that these codes printed with the smallest symbol size (1x1) on an industrial printer cannot be copied or cloned with sufficient accuracy due to data processing inequality. However, previous works have sh… ▽ More

    Submitted 25 June, 2022; v1 submitted 23 June, 2022; originally announced June 2022.

    Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)

  7. arXiv:2203.02397  [pdf, other

    cs.CR cs.CV

    Mobile authentication of copy detection patterns

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

    Abstract: In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect this paper addresses a problem… ▽ More

    Submitted 18 May, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

  8. arXiv:2110.02176  [pdf, other

    cs.CR cs.CV cs.LG

    Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

    Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy

    Abstract: Nowadays, the modern economy critically requires reliable yet cheap protection solutions against product counterfeiting for the mass market. Copy detection patterns (CDP) are considered as such solution in several applications. It is assumed that being printed at the maximum achievable limit of a printing resolution of an industrial printer with the smallest symbol size 1x1 elements, the CDP canno… ▽ More

    Submitted 6 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

  9. arXiv:2110.01864  [pdf, other

    cs.CR cs.DB

    Mobile authentication of copy detection patterns: how critical is to know fakes?

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

    Abstract: Protection of physical objects against counterfeiting is an important task for the modern economies. In recent years, the high-quality counterfeits appear to be closer to originals thanks to the rapid advancement of digital technologies. To combat these counterfeits, an anti-counterfeiting technology based on hand-crafted randomness implemented in a form of copy detection patterns (CDP) is propose… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  10. arXiv:2002.01469  [pdf, other

    cs.CV cs.CR eess.IV

    Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups

    Authors: Sohrab Ferdowsi, Behrooz Razeghi, Taras Holotyak, Flavio P. Calmon, Slava Voloshynovskiy

    Abstract: We propose a practical framework to address the problem of privacy-aware image sharing in large-scale setups. We argue that, while compactness is always desired at scale, this need is more severe when trying to furthermore protect the privacy-sensitive content. We therefore encode images, such that, from one hand, representations are stored in the public domain without paying the huge cost of priv… ▽ More

    Submitted 4 February, 2020; originally announced February 2020.

    Comments: Accepted as an oral presentation for ICASSP 2020

  11. arXiv:1912.00830  [pdf, other

    cs.CV

    Information bottleneck through variational glasses

    Authors: Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende

    Abstract: Information bottleneck (IB) principle [1] has become an important element in information-theoretic analysis of deep models. Many state-of-the-art generative models of both Variational Autoencoder (VAE) [2; 3] and Generative Adversarial Networks (GAN) [4] families use various bounds on mutual information terms to introduce certain regularization constraints [5; 6; 7; 8; 9; 10]. Accordingly, the mai… ▽ More

    Submitted 5 December, 2019; v1 submitted 2 December, 2019; originally announced December 2019.

  12. arXiv:1905.05454  [pdf, other

    cs.LG cs.CR stat.ML

    Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address a problem of machine learning system vulnerability to adversarial attacks. We propose and investigate a Key based Diversified Aggregation (KDA) mechanism as a defense strategy. The KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set but (iii) does not know the secret key. The rob… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  13. arXiv:1905.03282  [pdf, other

    cs.LG cs.CR cs.IR stat.ML

    Reconstruction of Privacy-Sensitive Data from Protected Templates

    Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA). The STCA is a generalization of randomization techniques which includes random projections, lossy quantization, and addition of ambiguization noise to satisfy the privacy-utility trade-off requirements. The theoretical privacy-pr… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: accepted at ICIP 2019

  14. arXiv:1904.00689  [pdf, other

    cs.LG cs.CR stat.ML

    Defending against adversarial attacks by randomized diversification

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

    Abstract: The vulnerability of machine learning systems to adversarial attacks questions their usage in many applications. In this paper, we propose a randomized diversification as a defense strategy. We introduce a multi-channel architecture in a gray-box scenario, which assumes that the architecture of the classifier and the training data set are known to the attacker. The attacker does not only have acce… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  15. arXiv:1901.10760  [pdf, ps, other

    cs.LG stat.ML

    Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment

    Authors: Dimche Kostadinov, Behrooz Razeghi, Taras Holotyak, Slava Voloshynovskiy

    Abstract: This paper presents a novel clustering concept that is based on jointly learned nonlinear transforms (NTs) with priors on the information loss and the discrimination. We introduce a clustering principle that is based on evaluation of a parametric min-max measure for the discriminative prior. The decomposition of the prior measure allows to break down the assignment into two steps. In the first ste… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  16. arXiv:1701.07675  [pdf, other

    cs.IT cs.CV cs.IR

    Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes

    Authors: Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras Holotyak

    Abstract: This paper addresses the problem of Approximate Nearest Neighbor (ANN) search in pattern recognition where feature vectors in a database are encoded as compact codes in order to speed-up the similarity search in large-scale databases. Considering the ANN problem from an information-theoretic perspective, we interpret it as an encoding, which maps the original feature vectors to a less entropic spa… ▽ More

    Submitted 25 April, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: Accepted at 2017 IEEE International Symposium on Information Theory (ISIT'17)