Svyatoslav Voloshynovskiy

Learn More
Watermarking is a potential method for protection of ownership rights on digital audio, image and video data. Benchmarks are used to evaluate the performance of different watermarking algorithms. For image watermarking, the Stirmark package is the most popular benchmark, and the best current algorithms perform well against it. However, results obtained by(More)
In recent years, content identification based on digital fingerprinting attracts a lot of attention in different emerging applications. At the same time, the theoretical analysis of digital fingerprinting systems for finite length case remains an open issue. Additionally, privacy leaks caused by fingerprint storage, distribution and sharing in a public(More)
The upper capacity bound of a brain-computer interface (BCI) is determined using a model based on Shannon channel theory. This capacity is compared with all bit-rate definitions used in the BCI community (Nykopp, Farwell and Donchin, Wolpaw et al); assumptions underlying those definitions and their limitations are discussed. Capacity estimates using Wolpaw(More)
SIFT descriptors are broadly used in various emerging applications. In recent years, these descriptors were deployed in compressed and binarized forms due to the computational complexity, storage, security and privacy cost incurred by working on real data. At the same time, the theoretical analysis of SIFT feature performance in different applications(More)
In this paper, we analyze the reversibility of data hiding techniques based on random binning as a by-product of pure message communications. We demonstrate the capabilities of unauthorized users to perform hidden data removal using solely a signal processing approach based on optimal estimation as well as consider reversibility on the side of authorized(More)
Identification of contents or objects based on some data that are stored/distributed in public domain is required in various applications. At the same time, these data should not reveal any information about original content or object that may be missused in terms of privacy leakage. We consider a privacy protection strategy based on reliable components of(More)
In this paper the problem of evaluation of bound accuracy for the range based localization techniques in the wireless sensor networks is considered. The comprehensive analysis of the existing solution of the Cramer-Rao lower bound problem for the anchored localization based on the time of arrival or relative signal strength principles shows certain(More)
In this paper, we analyze a reversibility of image data-hiding techniques based on random binning as a by-product of pure message communications. We demonstrate the capabilities of unauthorized users to perform hidden data removal using solely signal processing approach based on optimal estimation as well as consider reversibility on the side of authorized(More)
In this paper, we consider the compound wiretap channel with collaborative wiretappers. Contrarily to [1], where the wiretappers act independently, we analyze the setup when the wiretappers form a coalition, which shares the observed data within the coalition. The goal of coalition consists in learning the secret message communicated to the legitimate user(More)
In many problems such as biometrics, multimedia search and retrieval, recommendation systems requiring privacy-preserving similarity computations and identification, some binary features are stored in the public domain or outsourced to the third parties that might raise certain privacy concerns about the original data. To avoid this privacy leak, privacy(More)