Search Results for author: Taras Holotyak

Found 15 papers, 4 papers with code

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

no code implementations14 Dec 2022 Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy

Nowadays, copy detection patterns (CDP) appear as a very promising anti-counterfeiting technology for physical object protection.

Copy Detection

Digital twins of physical printing-imaging channel

no code implementations28 Oct 2022 Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

In this paper, we address the problem of modeling a printing-imaging channel built on a machine learning approach a. k. a.

Copy Detection Image-to-Image Translation

Printing variability of copy detection patterns

no code implementations11 Oct 2022 Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy

Since digital off-set printing represents great flexibility in terms of product personalized in comparison with traditional off-set printing, it looks very interesting to address the above concerns for digital off-set printers that are used by several companies for the CDP protection of physical objects.

Copy Detection

Anomaly localization for copy detection patterns through print estimations

no code implementations29 Sep 2022 Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

Systems based on classical supervised learning and digital templates assume knowledge of fake CDP at training time and cannot generalize to unseen types of fakes.

Copy Detection

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

no code implementations23 Jun 2022 Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

While Deep Learning (DL) can be used as a part of the authentication system, to the best of our knowledge, none of the previous works has studied the performance of a DL-based authentication system against ML-based attacks on CDP with 1x1 symbol size.

BIG-bench Machine Learning Copy Detection

Mobile authentication of copy detection patterns

no code implementations4 Mar 2022 Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications.

Copy Detection One-Class Classification

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

1 code implementation5 Oct 2021 Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy

Nowadays, the modern economy critically requires reliable yet cheap protection solutions against product counterfeiting for the mass market.

BIG-bench Machine Learning Copy Detection

Information bottleneck through variational glasses

no code implementations2 Dec 2019 Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende

In particular, we present a new interpretation of VAE family based on the IB framework using a direct decomposition of mutual information terms and show some interesting connections to existing methods such as VAE [2; 3], beta-VAE [11], AAE [12], InfoVAE [5] and VAE/GAN [13].

Novelty Detection

Reconstruction of Privacy-Sensitive Data from Protected Templates

no code implementations8 May 2019 Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA).

Privacy Preserving Quantization

Defending against adversarial attacks by randomized diversification

1 code implementation CVPR 2019 Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

The vulnerability of machine learning systems to adversarial attacks questions their usage in many applications.

Sparse Ternary Codes for similarity search have higher coding gain than dense binary codes

no code implementations26 Jan 2017 Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras Holotyak

This paper addresses the problem of Approximate Nearest Neighbor (ANN) search in pattern recognition where feature vectors in a database are encoded as compact codes in order to speed-up the similarity search in large-scale databases.

Binarization

Cannot find the paper you are looking for? You can Submit a new open access paper.