Picture for Olga Taran

Olga Taran

Benchmarking 2D Egocentric Hand Pose Datasets

Add code
Sep 11, 2024
Viaarxiv icon

Radio-astronomical Image Reconstruction with Conditional Denoising Diffusion Model

Add code
Feb 20, 2024
Viaarxiv icon

Stochastic Digital Twin for Copy Detection Patterns

Add code
Sep 28, 2023
Viaarxiv icon

Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns

Add code
Dec 14, 2022
Viaarxiv icon

Digital twins of physical printing-imaging channel

Add code
Oct 28, 2022
Viaarxiv icon

Printing variability of copy detection patterns

Add code
Oct 11, 2022
Figure 1 for Printing variability of copy detection patterns
Figure 2 for Printing variability of copy detection patterns
Figure 3 for Printing variability of copy detection patterns
Figure 4 for Printing variability of copy detection patterns
Viaarxiv icon

Anomaly localization for copy detection patterns through print estimations

Add code
Sep 29, 2022
Figure 1 for Anomaly localization for copy detection patterns through print estimations
Figure 2 for Anomaly localization for copy detection patterns through print estimations
Figure 3 for Anomaly localization for copy detection patterns through print estimations
Figure 4 for Anomaly localization for copy detection patterns through print estimations
Viaarxiv icon

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Add code
Jun 25, 2022
Figure 1 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 2 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 3 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Figure 4 for Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Viaarxiv icon

Mobile authentication of copy detection patterns

Add code
Mar 04, 2022
Figure 1 for Mobile authentication of copy detection patterns
Figure 2 for Mobile authentication of copy detection patterns
Figure 3 for Mobile authentication of copy detection patterns
Figure 4 for Mobile authentication of copy detection patterns
Viaarxiv icon

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?

Add code
Oct 06, 2021
Figure 1 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 2 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 3 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Figure 4 for Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?
Viaarxiv icon