Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Renato Villán is active.

Publication


Featured researches published by Renato Villán.


IEEE Transactions on Information Forensics and Security | 2006

Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management

Renato Villán; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Thierry Pun

In this paper, we deal with the design of high-rate multilevel 2-D bar codes for the print-and-scan channel. First, we introduce a framework for evaluating the performance limits of these codes by studying an intersymbol-interference (ISI)-free, synchronous, and noiseless print-and-scan channel, where the input and output alphabets are finite and the printer device uses halftoning to simulate multiple gray levels. Second, we present a new model for the print-and-scan channel specifically adapted to the problem of communications via multilevel 2-D bar codes. This model, inspired by our experimental work, assumes perfect synchronization and absence of ISI, but independence between the channel input and the noise is not assumed. We adapt the theory of multilevel coding with multistage decoding (MLC/MSD) to the print-and-scan channel. Finally, we present experimental results confirming the utility of our channel model, and showing that multilevel 2-D bar codes using MLC/MSD can reliably achieve the high-capacity storage requirements of many multimedia security and management applications


conference on security steganography and watermarking of multimedia contents | 2005

Multilevel 2D bar codes: toward high-capacity storage modules for multimedia security and management

Renato Villán; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Thierry Pun

In this paper, we deal with the design of high-rate multilevel 2-D bar codes for the print-and-scan channel. First, we introduce a framework for evaluating the performance limits of these codes by studying an intersymbol-interference (ISI)-free, synchronous, and noiseless print-and-scan channel, where the input and output alphabets are finite and the printer device uses halftoning to simulate multiple gray levels. Second, we present a new model for the print-and-scan channel specifically adapted to the problem of communications via multilevel 2-D bar codes. This model, inspired by our experimental work, assumes perfect synchronization and absence of ISI, but independence between the channel input and the noise is not assumed. We adapt the theory of multilevel coding with multistage decoding (MLC/MSD) to the print-and-scan channel. Finally, we present experimental results confirming the utility of our channel model, and showing that multilevel 2-D bar codes using MLC/MSD can reliably achieve the high-capacity storage requirements of many multimedia security and management applications


electronic imaging | 2008

Secure surface identification codes

Fokko Beekhof; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Renato Villán; Thierry Pun

This paper introduces an identification framework for random microstructures of material surfaces. These microstructures represent a kind of unique fingerprints that can be used to track and trace an item as well as for anti-counterfeiting. We first consider the architecture for mobile phone-based item identification and then introduce a practical identification algorithm enabling fast searching in large databases. The proposed algorithm is based on reference list decoding. The link to digital communications and robust perceptual hashing is shown. We consider a practical construction of reference list decoding, which comprizes computational complexity, security, memory storage and performance requirements. The efficiency of the proposed algorithm is demonstrated on experimental data obtained from natural paper surfaces.


electronic imaging | 2008

Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case

Oleksiy J. Koval; Sviatoslav Voloshynovskiy; Renato Villán; Thierry Pun

In this paper we analyze the performance limits of multimodal biometric identification systems in the multiple hypothesis testing formulation. For the sake of tractability, we approximate the performance of the actual system by a set of pairwise binary tests. We point out that the attainable error exponent that can be achieved for such an approximation is limited by the worst pairwise Chernoff distance between alternative hypothesis prior models. We consider impact of the inter-modal dependencies on the attainable performance measure and demonstrate that, contrarily to the binary multimodal hypothesis testing framework, an expected performance gain from fusion of independent modalities does not any more play the role of lower bound on the gain one can expect from multimodal fusion.


Journal of Electronic Imaging | 2008

Authentication of biometric identification documents via mobile devices

Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Renato Villán; Fokko Beekhof; Thierry Pun

We consider the problem of authentication of biometric identification documents via mobile devices such as mobile phones or personal digital assistants (PDAs). We assume that the biometric identification document holds biometric data (e.g., face or fingerprint) in the form of an image and personal data in the form of text, both being printed directly onto the identification document. The proposed solution makes use of digital data hiding in order to crossstore the biometric data inside the personal data and vice versa. Moreover, a theoretical framework is presented that should enable analysis and guide the design of future authentication systems based on this approach. In particular, we advocate the separation approach, which uses robust visual hashing techniques in order to match the information rates of biometric and personal data to the rates offered by current image and text data hiding technologies. We also describe practical schemes for robust visual hashing and digital data hiding that can be used as building blocks for the proposed authentication system. The obtained experimental results show that the proposed system constitutes a viable and practical solution.


Storage and Retrieval for Image and Video Databases | 2006

Text data-hiding for digital and printed documents: theoretical and practical considerations

Renato Villán; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Joan Vila; Emre Topak; Frédéric Deguillaume; Yuriy Rytsar; Thierry Pun


conference on security steganography and watermarking of multimedia contents | 2007

Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding

Renato Villán; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Frédéric Deguillaume; Thierry Pun


international conference on communications | 2005

A theoretical framework for data-hiding in digital and printed text documents

Renato Villán; Sviatoslav Voloshynovskiy; Frédéric Deguillaume; Yuriy Rytsar; Oleksiy J. Koval; Emre Topak; E. Rivera; Thierry Pun


1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia | 2010

Document forensics based on steganographic anti-counterfeiting markings and mobile architectures

Fokko Beekhof; Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Renato Villán; Emre Topak


Storage and Retrieval for Image and Video Databases | 2006

Information-theoretic analysis of electronic and printed document authentication

Sviatoslav Voloshynovskiy; Oleksiy J. Koval; Renato Villán; Emre Topak; Jose Emilio Vila Forcen; Frédéric Deguillaume; Yuriy Rytsar; Thierry Pun

Collaboration


Dive into the Renato Villán's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge