Publications

Computational health

Information retrieval

Relevance Feedback

  • “Can constrained relevance feedback and display strategies help users retrieve items on mobile devices?”,V. Vinay, I. J. Cox, N. Milic-Frayling and K. Wood,Springer Journal of Information Retrieval, 9, 4, 435-453, 2006. pdf
  • “Comparing Relevance Feedback algorithms for Web Search”V. Vinay, K. Wood, N. Milic-Frayling, I. J. Cox: : poster at WWW’05 , pdf
  • “Evaluating Relevance Feedback Algorithms for Searching on Small Displays”,V. Vinay, I. J. Cox, N. Milic-Frayling, K. Wood, 27th European Conference on IR Research, ECIR 2005, Santiago de Compostela, Spain, March 21-23, 2005, Proceedings Series: Lecture Notes in Computer Science, Vol. 3408, Losada, David E.; Fernández-Luna, Juan M. (Eds.) 2005, XVII, 572 p. Also available online., Softcover ISBN: 3-540-25295-9, pdf
  • “Evaluating Relevance Feedback and Display Strategies for Searching on Small Displays”,V. Vinay, I. J. Cox, N. Milic-Frayling, K. Wood, in Alberto Apostolico, Massimo Melucci (Eds.): String Processing and Information Retrieval, 11th International Conference, SPIRE 2004, Padova, Italy, October 5-8, 2004, Proceedings. Lecture Notes in Computer Science 3246 Springer 2004, ISBN 3-540-23210-9, pdf

Audio Fingerprinting

  • “Audio Fingerprinting: Nearest neighbor search in high-dimensional binary space”,M. L. Miller, M. A. Rodriguez and I. J. Cox,IEEE Multimedia Signal Processing Workshop, 182 – 185, St. Thomas, 2002, pdf

Image Database Retrieval

  • “The Bayesian Image Retrieval System, PicHunter: Theory, Implementation and Psychological Experiments,”I. J. Cox, M. L. Miller, T. P. Minka, T. V. Papathomas, P. N. Yianilos,IEEE Transctions on Image Processing, 9(1), pp. 20-37, (2000). ps, pdf
  • “Psychophysical studies of the performance of an image database retrieval system”,T. V. Papathomasa, T. E. Conway, I. J. Cox, J. Ghosn, M. L. Miller, T. Minka, P. N. Yianilos,SPIE’98
  • “An Optimized Interaction Strategy for Bayesian Relevance Feedback”,I. J. Cox, M. L. Miller, T. Minka, P. N. Yianilos,IEEE International Conference on Computer Vision and Pattern Recognition – CVPR ’98, Santa Barbara, CA, pp. 553-558, 1998. ps, zip
  • ” Hidden Annotation in Content Based Image Retrieval,”Ingemar J. Cox, Matt L. Miller, Thomas V. Papathomas, Peter N. Yianilos and Joumana Ghosn,IEEE Workshop on Content-Based Access of Image and Video Libraries, 76-81, (June 1997), . Copyright (c) 1997 by IEEE, ps, zip,
  • “Target Testing and the PicHunter Bayesian Multimedia Database Retrieval System,”I. J. Cox, M. L. Miller, S. M. Omohundro and P. N. Yianilos,Proc. of the 3rd Forum on Research and Technology Advances in Digital Libraries (ADL’96), 66-75, (1996). Copyright (c) 1996 by IEEE, ps, zip
  • “PicHunter: Bayesian Relevance Feedback for Image Retrieval,”I. J. Cox, M. L. Miller, S. M. Omohundro and P. N. Yianilos,Proc. Int. Conf. on Pattern Recognition, Vienna, Austria, C:361-369, August 1996. Copyright (c) 1996 by IEEE, ps, zip,

Web

  • “Equilibrium Bids in Sponsored Search Auctions: Theory and Evidence”,T. Borgers, I. J. Cox, V. Petricek, M. Pesendorfer,(to be published). pdf
  • “Characterising Web Site Link Structure”,S. Zhou, I. J. Cox and V. Petricek,9th IEEE Symp. on Web Site Evolution, 2007. pdf
  • “The Web Structure of E-Government – Developing a Methodology for Quantitative Evaluation”,V. Petricek, T. Escher, I. J. Cox and H. Margetts,WWW’06, 2006. pdf
  • “Modeling the Author Bias between two online Computer Science Citation Databases”,V. Petricek, I. J. Cox, H. Han, I. G. Council, C. L. Giles,WWW’05, 2005. pdf


Watermarking

  • Journal papers
        • “Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking”,
          Q. Li and I. J. Cox, IEEE Transactions on Information Forensics and Security, 2, 2, 127-139, 2007. pdf
        • “Facilitating watermark insertion by preprocessing media”,
          I. J. Cox and M. L. Miller,
          EURASIP J. Applied Signal Processingf, 14, 2081-2092, 2004, pdf
        • Applying Informed Coding and Embedding to Design a Robust, High capacity Watermark”,
          M. L. Miller, G. J. Doerr and I. J. Cox,
          IEEE Trans. on Image Procesing, 13, 6, 792-807, June 2004 pdf
        • “The First 50 Years of Electronic Watermarking”,
          I. J. Cox and M. L. Miller,
          EURASIP J. of Applied Signal Processing, 2002, 2, 126-132, 2002, pdf
        • “Rotation, Scale, and Translation Resilient Public Watermarking for Images”,
          C. Lin, M. Wu, Y. M. Lui, J. A. Bloom, M. L. Miller, I. J. Cox,
          IEEE Transactions on Image Processing, 10, 5, 767-782, 2001, pdf
        • “Copy Protection for DVD Video”,
          J. A. Bloom, I. J. Cox, T. Kalker, J-P Linnartz, M. L. Miller and B. Traw,
          Proceedings of the IEEE, 87 (7), pp 1267-1276, 1999 pdf
        • “Watermarking as Communications with Side Information,”
          I. J. Cox, M.L. Miller, A.L. McKellips,
          Proceedings of the IEEE, 87(7), pp. 1127-1141, (1999). Copyright (c) 1999 by IEEE pdf , ps
        • “A Review of of Watermarking Principles and Practices,”
          I. J. Cox, M.L. Miller, J. M. G. Linnartz, T. Kalker,
          Digital Signal Processing for Multimedia Systems, K. K. Parhi, T. Nishitani (eds.), Marcell Dekker, Inc. NY, pp. 461-485, (1999).
          Copyright (c) 1999 by IEEE pdf , ps
        • “Some General Methods for Tampering with Watermaking,”
          I. J. Cox, J.P Linnartz,
          IEEE Journal on Selected Areas of Communication, 16(4), pp.587-593, (1998).
          Copyright (c) 1998 by IEEE pdf , ps
        • “Secure Spread Spectrum Watermarking for Multimedia”,
          I. J. Cox, J. Kilian, T. Leighton and T. Shamoon,
          IEEE Trans. on Image Processing, 6, 12, 1673-1687, (1997). Copyright (c) 1997 by IEEE, ps, zip
  • Conference papers
        • An Energy-based Method for the Forensic Detection of Re-sampled Images”,
          X. Feng, I. J. Cox and G. Doerr,
          IEEE Inn. Conf. on Multimedia and Expo, (ICME) 2011. pdf
        • An Asymmetric Fingerprinting Scheme based on Tardos Codes”,
          A. Charpentier, C. Fontaine, T. Furon, and I.J. Cox,
          13th Information Hiding Conference, 2011. pdf
        • “Improved Spread Transform Dither Modulation using a Perceptual Model: Robustness to amplitude scaling and JPEG Compression”,
          Q. Li and I. J. Cox,
          IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2007. pdf
        • “Trellis Coded Modulation to Improve Dirty Paper Trellis Watermarking”
          C. K. Wang, G. Doerr andI.J. Cox;
          SPIE Conf. on Security, Steganography and Watermarking of Multimedia Contents IX 2007. pdf
        • “Watermarking is not Cryptography”
          I.J. Cox, G. Doerr and T. Furon,
          Int. Workshop on Digital Watermarking (IWDW) 2006. pdf
        • “Spread Transform Dither Modulation using a Perceptual Model”,
          Q. Li, G. Doerr, and I. J. Cox,
          IEEE International Workshop on Multimedia Signal Processing(MMSP), 2006. pdf
        • “Toward a Better Understanding of Dirty Paper Trellis Codes”,
          C. K. Wang; G. Doerr and I.J. Cox;
          IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2, 2006. pdf
        • “Rational dither modulation watermarking using a perceptual model”,
          Q. Li and I. J. Cox,
          IEEE International Workshop on Multimedia Signal Processing(MMSP), 2005. pdf
        • “An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking”,
          L. Lin, I. J. Cox and G. Doerr,
          IEEE Int. Conf. on Image Processing, 2005. pdf
        • “Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking”,
          Q. Li and I. J. Cox,
          IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP), 2005, pdf
        • “Using perceptual distance to improve the selection of dirty paper trellis codes for watermarking”,
          C. K. Wang and I. J. Cox,
          IEEE Multimedia and Signal Processing Workshop (MMSP), 2004. pdf
        • “Dirty-Paper trellis codes for Watermarking”,
          G. L. Miller, G. J. Doerr and I. J. Cox,
          IEEE Int. Conf. on Image Processing, II-129 – II-132 vol.2, 2002, pdf
        • “Preprocessing media for later insertion of a watermark”,
          M. L. Miller and I. J. Cox,
          14th Int. conf. on Digital Signal Processing (DSP02), Santorini, Greece, 2002, pdf
        • “Watermarking: The First 50 years”,
          I. J. Cox and M. L. Miller,
          IEEE 2001 Int. Workshop on MultiMedia Signal Processing, 2001, pdf
        • “Informed Embedding: Exploiting Image and Detector Information During Watermark Insertion”,
          M. L. Miller, I. J. Cox, J. A. Bloom,
          IEEE International Conference on Image Processing – ICIP (2000).
          Copyright (c) 2000 by IEEE pdf , ps
        • “Rotation, Scale, and Translation Resilient Public Watermarking for Images”,
          C. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, Y. M. Lui,
          Proceedings of SPIE, volume 3971, Security and Watermarking of Multimedia Contents, 90-98, (2000). pdf
        • “Watermarking Applications and Their Properties”,
          I. J. Cox, M. L. Miller, J. A. Bloom,
          Proceedings of the International Conference on Information Technology: Coding and Computing – ITCC2000, pp. 6-10, (2000).
          Copyright (c) 2000 by IEEE pdf , ps
        • “Watermarking in the Real world: An Application to DVD,”
          M. L. Miller, I. J. Cox, J. A. Bloom,
          in Multimedia and Security-Workshop at ACM Multimedia ’98 (GMD Report), vol.41, J.Dittmann, P. Wohlmacher, P. Horster, and R. Steinmetz (eds.) Bristol, U.K.: ACM, GMD – Forschungszentrum Informationsstechnik GmbH, 41, pp. 71-76, (1998).
          Copyright (c) 1998 by IEEE pdf , zip
        • “Public watermarks and resistance to tampering”,
          I. J. Cox and J-P Linnartz,
          Proc. IEEE Int. Conf. on Image Processing, (1997), Copyright (c) 1997 by IEEE,ps, zip
        • “A review of watermarking and the importance of perceptual modeling”,
          I. J. Cox and M. L. Miller,
          Proc. SPIE Conf. on Human Vision and Electronic Imaging II, Vol 3016, 92-99, February 1987. ps, zip
        • “Secure Spread Spectrum Watermarking for Images, Audio and Video”,
          I. J. Cox, J. Kilian, T. Leighton and T. Shamoon,
          Proc. of 1996 Int’l. Conf. on Image Processing (ICIP’96), vol. III, pp. 243-246, (1996). Copyright (c) 1996 by IEEE, ps, zip
        • “A Secure, Robust Watermark for Multimedia”,
          I. J. Cox, J. Kilian, T. Leighton and T. Shamoon,
          Workshop on Information Hiding, Newton Institute, Univ. of Cambridge, May 1996. ps, zip

Steganography

      • “A Comparative Study of +-1 Steganalyzers”,
        G. Cancelli, G. Doerr, I. J. Cox and M. Barni, IEEE Int. Workshop. on Multimedia Signal Processing, IEEE Workshop on Multimedia Signal Processing, (MMSP), 2008. pdf
      • “Detection of +-1 LSB Steganography B ased on the Amplitude of Histogram Local Extrema”,
        G. Cancelli, G. Doerr, I. J. Cox and M. Barni, IEEE Int. Conf. on Image Processing, (ICIP) 2008, pdf
      • “Steganalysis for LSB Matching in Images with High-frequency Noise”,
        J. Zhang, I. J. Cox and G. Doerr,
        IEEE Int. Workshop on Multimedia Signal Processing (MMSP), 2007. pdf
      • “JPEG Based Conditional Entropy Coding for Correlated Steganography”,
        L. Zheng and I. J. Cox
        IEEE Int. Conf. on Multimedia and Expo (ICME), 2007. pdf
      • “Information Transmission and Steganography”,
        I. J. Cox, T. Kalker, G. Pakura and M. Scheel,
        Int. Workshop on Digital Watermarking, (IWDW), Sept, 2005. pdf

Audio Fingerprinting

  • Journal
        • “Audio fingerprinting: nearest neighbor search in high dimensional binary spaces”,
          M. L. Miller, M. A. Rodriguez and I. J. Cox,
          J. of VLSI Signal Processing, Springer (to be published November 2005), pdf
  • Conference
        • “A Comparison of Extended Fingerprint Hashing and Locality Sensitive Hashing for Binary Audio Fingerprints”,
          K. Moravec and I. J. Cox,
          ACM International Conference on Multimedia Retrieval, April, 2011, pdf
        • “Audio Fingerprinting: Nearest neighbor search in high-dimensional binary space”,
          M. L. Miller, M. A. Rodriguez and I. J. Cox,
          IEEE Multimedia Signal Processing Workshop, 182 – 185, St. Thomas, 2002, pdf


Computer vision

Motion without structure

      • “Motion Without Structure”,
        S. Roy and I.J. Cox,
        Proc. Int. Conf. on Pattern Recognition, Vienna, Austria, A:728-734, August 1996. Copyright (c) 1996 by IEEE (ICPR’96 Best Student Paper award.), zip
      • “Direct Estimation of Rotation from Two Frames via Epipolar Search,”
        S. Roy and I.J. Cox,
        Proceedings of the 6th International Conference on Computer Analysis of Images & Patterns – CAIP 95, Hlavac, V.; Sara, R. (eds), Springer-Verlag, Berlin, pp. 880-887, 1995, zip
      • “Statistical modelling of epipolar misalignment,”
        I. J. Cox and S. Roy,
        Int. Workshop on Stereoscopic and Three Dimensional Imaging, (IWS3DI’95), Santorini, greeece, 115-121, 1995, zip

Motion correspondence

      • “A Comparison Of Two Algorithms For Determining Ranked Assignments With Application to Multi-Target Tracking and Motion Correspondence,”
        I. J. Cox, M. L. Miller, R. Danchick and G.E. Newnam,
        IEEE Trans. on AES, vol. 33, no. 1, pp. 295-301, Jan. 1997. Copyright (c) 1997 by IEEE, zip
      • “An Efficient Implementation of Reid’s Multiple Hypothesis Tracking Algorithm and its Evaluation for the Purpose of Visual Tracking,”
        I. J. Cox and S.L. Hingorani,
        IEEE Trans. on PAMI, vol. 18, no. 2, pp. 138-150, Feb. 1996, zip
      • “Optimizing Murty’s Ranked Assignment Method ”
        M. L. Miller, H. S. Stone and I. J. Cox,
        IEEE Transactions on Aerospace & Electronic Systems, 33(3), pp. 851-862, 1997, zip
      • “On Finding Ranked Assignments With Applications to Multi-Target Tracking and Motion Correspondence,”
        I. J. Cox and M. L. Miller,
        IEEE Trans. AES, 32, 1, 486-489, (1995). Copyright (c) 1995 by IEEE, zip
      • “An Efficient Implementation of Reid’s Multiple Hypothesis Tracking Algorithm and its Evaluation for the Purpose of Visual Tracking,”
        I. J. Cox and S. L. Hingorani,
        International Conf. on Pattern Recognition, 437-443, (1994). Copyright (c) 1994 by IEEE, zip
      • “A Review of Statistical Data Association Techniques for Motion Correspondence,”
        I.J. Cox,
        Int. J. of Computer Vision, 10, 1, 53-66, (1993), pdf

Stereo

      • “A Maximum-Flow Formulation of the N-camera Stereo Correspondence Problem”,
        Sébastien Roy and Ingemar J. Cox,
        Int. Conf. on Computer Vision (ICCV’98), Bombay, India, January 1998 Copyright (c) 1998 by IEEE, ps, zip,
      • ” Cylindrical Rectification to Minimize Epipolar Distortion,”
        S. Roy, J. Meunier and I. J. Cox,
        IEEE Proc. Computer Vision and Pattern REcognition, 393-399, (1997). Copyright (c) 1997 by IEEE, ps, zip,
      • “A Maximum Likelihood Stereo Algorithm,”
        I. J. Cox, S. L. Hingorani, S. B. Rao and B. M. Maggs,
        Computer Vision and Image Understanding, Vol. 63, no. 3, pp. 542-567, May 1996, zip
      • “A Maximum Likelihood N-Camera Stereo Algorithm,”
        I. J. Cox,
        Int. Conf. on Computer Vision and Pattern Recognition, 733-739, (1994). Copyright (c) 1994 by IEEE, zip
      • “Teleconferencing Eye Contact Using a Virtual Camera,”M. Ott, J. P. Lewis and I. J. Cox,
        Interchi’93 Adjunct Proceedings, 109-110, Amsterdam, (1993), pdf
      • “Stereo without Disparity Gradient Smoothing: a Bayesian Sensor Fusion Solution,”
        I. J. Cox,
        British Machine Vision Conference, Leeds, 337-346 (1992). Reprint

Contour Grouping

      • “A Bayesian Multiple Hypothesis Approach to Contour Segmentation,”
        I. J. Cox, J. M. Rehg and S. L. Hingorani,
        Int. J. of Computer Vision, 11, 1, 5-24, (1993), pdf
      • “A Bayesian Multiple Hypothesis Approach to Contour Grouping,”
        I. J. Cox, J. M. Rehg and S. L. Hingorani,
        2nd European Conf Computer Vision, 72-77, (1992).

Face Recognition

      • ” Feature-Based Face Recognition Using Mixture-Distance,”
        I. J. Cox, J. Ghosn and P. N. Yianilos,
        Proc. of 1996 IEEE Conf. on Computer Vision and Pattern Recognition (CVPR’96), pp. 209-216, June 1996, Copyright (c) 1996 by IEEE, zip

Mobile Robot Navigation

      • “Underwater Sonar Data Fusion Using an Efficient Multiple Hypothesis Algorithm,”
        J. J. Leonard, B. A. Moran and I. J. Cox,
        IEEE Int. Conf. on Robotics and Automation, (1995). Copyright (c) 1995 by IEEE, zip
      • “Modeling a Dynamic Environment Using a Multiple Hypothesis Approach,”
        I. J. Cox and J. J. Leonard,
        A.I. Journal, 66, 2, 311-344, (1994), pdf.
      • “Dynamic Map Building for an Autonomous Mobile Robot,”
        J. J. Leonard, H. Durrant-Whyte and I. J. Cox,
        Int J. of Robotics Research, 11, 4, 286-298, (1992), Abstract, Reprint.
      • “Blanche: An Experiment in Guidance and Navigation for an Autonomous Robot Vehicle,”
        I. J. Cox,
        IEEE Trans. on Robotics and Automation, 7, 2, 193-204, (1991), Reprint.

Image Processing


Miscellaneous

      • ” ‘Ratio Regions’: A Technique for Image Segmentation,”
        I. J. Cox, S. B. Rao, Y. Zhong,
        Proc. Int. Conf. on Pattern Recognition, B:557-564, August 1996. Copyright (c) 1996 by IEEE, zip
      • N. Niranjan, I.J. Cox and S.L. Hingorani, “Recursive Tracking of Formants in Speech Signals,” International Conf. on Acoustics, Speech and Signal Processing (ICASSP), 1994.