Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Taran, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.07337  [pdf, other

    cs.CV

    Benchmarking 2D Egocentric Hand Pose Datasets

    Authors: Olga Taran, Damian M. Manzone, Jose Zariffa

    Abstract: Hand pose estimation from egocentric video has broad implications across various domains, including human-computer interaction, assistive technologies, activity recognition, and robotics, making it a topic of significant research interest. The efficacy of modern machine learning models depends on the quality of data used for their training. Thus, this work is devoted to the analysis of state-of-th… ▽ More

    Submitted 11 September, 2024; originally announced September 2024.

  2. arXiv:2402.10204  [pdf, other

    astro-ph.IM cs.AI cs.CV

    Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model

    Authors: Mariia Drozdova, Vitaliy Kinakh, Omkar Bait, Olga Taran, Erica Lastufka, Miroslava Dessauges-Zavadsky, Taras Holotyak, Daniel Schaerer, Slava Voloshynovskiy

    Abstract: Reconstructing sky models from dirty radio images for accurate source localization and flux estimation is crucial for studying galaxy evolution at high redshift, especially in deep fields using instruments like the Atacama Large Millimetre Array (ALMA). With new projects like the Square Kilometre Array (SKA), there's a growing need for better source extraction methods. Current techniques, such as… ▽ More

    Submitted 20 February, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: In production in Astronomy&Astrophyics

  3. arXiv:2309.16866  [pdf, other

    cs.CV eess.IV

    Stochastic Digital Twin for Copy Detection Patterns

    Authors: Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) present an efficient technique for product protection against counterfeiting. However, the complexity of studying CDP production variability often results in time-consuming and costly procedures, limiting CDP scalability. Recent advancements in computer modelling, notably the concept of a "digital twin" for printing-imaging channels, allow for enhanced scalability and… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2023

  4. arXiv:2212.07326  [pdf, other

    cs.CV cs.CR

    Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

    Authors: Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Nowadays, copy detection patterns (CDP) appear as a very promising anti-counterfeiting technology for physical object protection. However, the advent of deep learning as a powerful attacking tool has shown that the general authentication schemes are unable to compete and fail against such attacks. In this paper, we propose a new mathematical model of printing-imaging channel for the authentication… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2022

  5. arXiv:2210.17420  [pdf, other

    cs.CV cs.LG

    Digital twins of physical printing-imaging channel

    Authors: Yury Belousov, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of modeling a printing-imaging channel built on a machine learning approach a.k.a. digital twin for anti-counterfeiting applications based on copy detection patterns (CDP). The digital twin is formulated on an information-theoretic framework called Turbo that uses variational approximations of mutual information developed for both encoder and decoder in a two-… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    Comments: Paper accepted at the IEEE International Workshop on Information Forensics and Security (WIFS) 2022

  6. arXiv:2210.05343  [pdf, other

    cs.CR cs.CV

    Printing variability of copy detection patterns

    Authors: Roman Chaban, Olga Taran, Joakim Tutt, Yury Belousov, Brian Pulfer, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection pattern (CDP) is a novel solution for products' protection against counterfeiting, which gains its popularity in recent years. CDP attracts the anti-counterfeiting industry due to its numerous benefits in comparison to alternative protection techniques. Besides its attractiveness, there is an essential gap in the fundamental analysis of CDP authentication performance in large-scale… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  7. arXiv:2209.15625  [pdf, other

    cs.CV cs.CR cs.LG

    Anomaly localization for copy detection patterns through print estimations

    Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) are recent technologies for protecting products from counterfeiting. However, in contrast to traditional copy fakes, deep learning-based fakes have shown to be hardly distinguishable from originals by traditional authentication systems. Systems based on classical supervised learning and digital templates assume knowledge of fake CDP at training time and cannot general… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

  8. arXiv:2206.11793  [pdf, other

    cs.CR cs.LG

    Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

    Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: Copy detection patterns (CDP) are an attractive technology that allows manufacturers to defend their products against counterfeiting. The main assumption behind the protection mechanism of CDP is that these codes printed with the smallest symbol size (1x1) on an industrial printer cannot be copied or cloned with sufficient accuracy due to data processing inequality. However, previous works have sh… ▽ More

    Submitted 25 June, 2022; v1 submitted 23 June, 2022; originally announced June 2022.

    Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)

  9. arXiv:2203.02397  [pdf, other

    cs.CR cs.CV

    Mobile authentication of copy detection patterns

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

    Abstract: In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect this paper addresses a problem… ▽ More

    Submitted 18 May, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

  10. arXiv:2110.02176  [pdf, other

    cs.CR cs.CV cs.LG

    Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

    Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy

    Abstract: Nowadays, the modern economy critically requires reliable yet cheap protection solutions against product counterfeiting for the mass market. Copy detection patterns (CDP) are considered as such solution in several applications. It is assumed that being printed at the maximum achievable limit of a printing resolution of an industrial printer with the smallest symbol size 1x1 elements, the CDP canno… ▽ More

    Submitted 6 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

  11. arXiv:2110.01864  [pdf, other

    cs.CR cs.DB

    Mobile authentication of copy detection patterns: how critical is to know fakes?

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

    Abstract: Protection of physical objects against counterfeiting is an important task for the modern economies. In recent years, the high-quality counterfeits appear to be closer to originals thanks to the rapid advancement of digital technologies. To combat these counterfeits, an anti-counterfeiting technology based on hand-crafted randomness implemented in a form of copy detection patterns (CDP) is propose… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  12. arXiv:2108.13939  [pdf, other

    cs.CV

    ScatSimCLR: self-supervised contrastive learning with pretext task regularization for small-scale datasets

    Authors: Vitaliy Kinakh, Olga Taran, Svyatoslav Voloshynovskiy

    Abstract: In this paper, we consider a problem of self-supervised learning for small-scale datasets based on contrastive loss between multiple views of the data, which demonstrates the state-of-the-art performance in classification task. Despite the reported results, such factors as the complexity of training requiring complex architectures, the needed number of views produced by data augmentation, and thei… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

  13. arXiv:1912.00830  [pdf, other

    cs.CV

    Information bottleneck through variational glasses

    Authors: Slava Voloshynovskiy, Mouad Kondah, Shideh Rezaeifar, Olga Taran, Taras Holotyak, Danilo Jimenez Rezende

    Abstract: Information bottleneck (IB) principle [1] has become an important element in information-theoretic analysis of deep models. Many state-of-the-art generative models of both Variational Autoencoder (VAE) [2; 3] and Generative Adversarial Networks (GAN) [4] families use various bounds on mutual information terms to introduce certain regularization constraints [5; 6; 7; 8; 9; 10]. Accordingly, the mai… ▽ More

    Submitted 5 December, 2019; v1 submitted 2 December, 2019; originally announced December 2019.

  14. arXiv:1905.05454  [pdf, other

    cs.LG cs.CR stat.ML

    Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address a problem of machine learning system vulnerability to adversarial attacks. We propose and investigate a Key based Diversified Aggregation (KDA) mechanism as a defense strategy. The KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set but (iii) does not know the secret key. The rob… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  15. arXiv:1905.03282  [pdf, other

    cs.LG cs.CR cs.IR stat.ML

    Reconstruction of Privacy-Sensitive Data from Protected Templates

    Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA). The STCA is a generalization of randomization techniques which includes random projections, lossy quantization, and addition of ambiguization noise to satisfy the privacy-utility trade-off requirements. The theoretical privacy-pr… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: accepted at ICIP 2019

  16. arXiv:1904.00689  [pdf, other

    cs.LG cs.CR stat.ML

    Defending against adversarial attacks by randomized diversification

    Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy

    Abstract: The vulnerability of machine learning systems to adversarial attacks questions their usage in many applications. In this paper, we propose a randomized diversification as a defense strategy. We introduce a multi-channel architecture in a gray-box scenario, which assumes that the architecture of the classifier and the training data set are known to the attacker. The attacker does not only have acce… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  17. arXiv:1903.07359  [pdf, other

    cs.CR cs.LG stat.ML

    Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

    Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy

    Abstract: In recent years, printable graphical codes have attracted a lot of attention enabling a link between the physical and digital worlds, which is of great interest for the IoT and brand protection applications. The security of printable codes in terms of their reproducibility by unauthorized parties or clonability is largely unexplored. In this paper, we try to investigate the clonability of printabl… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  18. arXiv:1809.03259  [pdf, other

    cs.CV

    Classification by Re-generation: Towards Classification Based on Variational Inference

    Authors: Shideh Rezaeifar, Olga Taran, Slava Voloshynovskiy

    Abstract: As Deep Neural Networks (DNNs) are considered the state-of-the-art in many classification tasks, the question of their semantic generalizations has been raised. To address semantic interpretability of learned features, we introduce a novel idea of classification by re-generation based on variational autoencoder (VAE) in which a separate encoder-decoder pair of VAE is trained for each class. Moreov… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  19. arXiv:1809.01715  [pdf, other

    cs.CR cs.LG stat.ML

    Bridging machine learning and cryptography in defence against adversarial attacks

    Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy

    Abstract: In the last decade, deep learning algorithms have become very popular thanks to the achieved performance in many machine learning and computer vision tasks. However, most of the deep learning architectures are vulnerable to so called adversarial examples. This questions the security of deep neural networks (DNN) for many security- and trust-sensitive domains. The majority of the proposed existing… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

  20. arXiv:1709.10297  [pdf, other

    cs.CR cs.LG stat.ML

    Privacy Preserving Identification Using Sparse Approximation with Ambiguization

    Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran

    Abstract: In this paper, we consider a privacy preserving encoding framework for identification applications covering biometrics, physical object security and the Internet of Things (IoT). The proposed framework is based on a sparsifying transform, which consists of a trained linear map, an element-wise nonlinearity, and privacy amplification. The sparsifying transform and privacy amplification are not symm… ▽ More

    Submitted 29 September, 2017; originally announced September 2017.

    Comments: submitted to WIFS 2017