Ingemar Cox
#10,911
Most Influential Person Now
British academic
Ingemar Cox's AcademicInfluence.com Rankings
Ingemar Coxcomputer-science Degrees
Computer Science
#618
World Rank
#638
Historical Rank
Database
#700
World Rank
#734
Historical Rank
Download Badge
Computer Science
Why Is Ingemar Cox Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ingemar J. Cox is Professor and Director of Research in the Department of Computer Science at University College London, where he is Head of the Future Media Group, and he is Professor in the Machine Learning department at the University of Copenhagen. Between 2003 and 2008, he was Director of UCL's Adastral Park Campus.
Ingemar Cox's Published Works
Published Works
- Secure spread spectrum watermarking for multimedia (1997) (5991)
- Digital Watermarking (2001) (1872)
- Digital Watermarking and Steganography (2014) (1604)
- The Bayesian image retrieval system, PicHunter: theory, implementation, and psychophysical experiments (2000) (824)
- An Efficient Implementation of Reid's Multiple Hypothesis Tracking Algorithm and Its Evaluation for the Purpose of Visual Tracking (1996) (750)
- Rotation, scale, and translation resilient watermarking for images (2001) (697)
- Blanche-an experiment in guidance and navigation of an autonomous robot vehicle (1991) (667)
- A maximum-flow formulation of the N-camera stereo correspondence problem (1998) (604)
- Secure spread spectrum watermarking for images, audio and video (1996) (600)
- Watermarking as communications with side information (1999) (572)
- A Maximum Likelihood Stereo Algorithm (1996) (564)
- Dynamic Map Building for an Autonomous Mobile Robot (1990) (541)
- Digital technologies in the public-health response to COVID-19 (2020) (539)
- Autonomous Robot Vehicles (1990) (521)
- A Secure, Robust Watermark for Multimedia (1996) (506)
- The First 50 Years of Electronic Watermarking (2002) (429)
- Review of watermarking and the importance of perceptual modeling (1997) (362)
- A review of statistical data association techniques for motion correspondence (1993) (316)
- Feature-based face recognition using mixture-distance (1996) (306)
- Rotation-, scale-, and translation-resilient public watermarking for images (2000) (293)
- Watermarking applications and their properties (2000) (288)
- Some general methods for tampering with watermarks (1998) (281)
- Applying informed coding and embedding to design a robust high-capacity watermark (2004) (268)
- Copy protection for DVD video (1999) (249)
- PicHunter: Bayesian relevance feedback for image retrieval (1996) (244)
- Modeling a Dynamic Environment Using a Bayesian Multiple Hypothesis Approach (1994) (210)
- Information capacity and resolution in an optical system (1986) (209)
- A Review of of Watermarking Principles and Practices (1999) (189)
- Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking (2007) (185)
- On Finding Ranked Assignments With Application to Multi-Target Tracking and Motion Correspondence (1995) (158)
- "Ratio regions": a technique for image segmentation (1996) (155)
- Optimizing Murty's ranked assignment method (1997) (154)
- Public watermarks and resistance to tampering (1997) (153)
- Dynamic histogram warping of image pairs for constant image brightness (1995) (141)
- Local path control for an autonomous vehicle (1988) (137)
- An optimized interaction strategy for Bayesian relevance feedback (1998) (132)
- Chapter 12 – Steganography (2008) (130)
- 8 – Robust Watermarking (2002) (126)
- Blanche: Position Estimation For An Autonomous Robot Vehicle (1989) (126)
- Electronic watermarking: the first 50 years (2001) (114)
- Tracking COVID-19 using online search (2020) (111)
- Informed embedding: exploiting image and detector information during watermark insertion (2000) (107)
- Equilibrium Bids in Sponsored Search Auctions: Theory and Evidence (2013) (107)
- Steganalysis for LSB Matching in Images with High-frequency Noise (2007) (103)
- Normalized Energy Density-Based Forensic Detection of Resampled Images (2012) (103)
- Target testing and the PicHunter Bayesian multimedia retrieval system (1996) (94)
- Watermarking Is Not Cryptography (2006) (93)
- The web structure of e-government - developing a methodology for quantitative evaluation (2006) (93)
- Cylindrical rectification to minimize epipolar distortion (1997) (90)
- An efficient implementation and evaluation of Reid's multiple hypothesis tracking algorithm for visual tracking (1994) (89)
- REAPPRAISAL OF ARRAYS OF CONCENTRIC ANNULI AS SUPERRESOLVING FILTERS. (1982) (87)
- Audio Fingerprinting: Nearest Neighbor Search in High Dimensional Binary Spaces (2002) (85)
- On ranking the effectiveness of searches (2006) (81)
- An Analysis of Camera Noise (1992) (80)
- Dirty-paper trellis codes for watermarking (2002) (78)
- Detection of ±1 LSB steganography based on the amplitude of histogram local extrema (2008) (78)
- On Aggregating Labels from Multiple Crowd Workers to Infer Relevance of Documents (2012) (71)
- FindZebra: A search engine for rare diseases (2013) (67)
- A comparison of two algorithms for determining ranked assignments with application to multitarget tracking and motion correspondence (1997) (64)
- A Comparative Study of ±1 Steganalyzers (2008) (62)
- Detecting Disease Outbreaks in Mass Gatherings Using Internet Data (2013) (61)
- Stereo Without Disparity Gradient Smoothing: A Bayesian Sensor Fusion Solution (1992) (57)
- Inferring the Socioeconomic Status of Social Media Users Based on Behaviour and Language (2016) (54)
- Enhancing Feature Selection Using Word Embeddings: The Case of Flu Surveillance (2017) (54)
- Improvement in resolution by nearly confocal microscopy. (1982) (54)
- A maximum likelihood N-camera stereo algorithm (1994) (52)
- Probabilistic data association for dynamic world modeling: a multiple hypothesis approach (1991) (50)
- On Infectious Intestinal Disease Surveillance using Social Media Content (2016) (49)
- Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking (2005) (49)
- Hidden annotation in content based image retrieval (1997) (49)
- Predicting and Estimating the Accuracy of a Subpixel Registration Algorithm (1990) (48)
- Teleconferencing eye contract using a virtual camera (1993) (47)
- Blanche: an autonomous robot vehicle for structured environments (1988) (47)
- A Bayesian multiple-hypothesis approach to edge grouping and contour segmentation (1993) (42)
- Exception handling in robotics (1989) (42)
- An Asymmetric Fingerprinting Scheme Based on Tardos Codes (2010) (41)
- Psychophysical studies of the performance of an image database retrieval system (1998) (40)
- A comparative study of ± steganalyzers (2008) (40)
- TWO DIMENSIONAL OPTIMUM EDGE RECOGNITION USING MATCHED AND WIENER FILTERS FOR MACHINE VISION. (1987) (39)
- Digital watermarking for copyright protection: a communications perspective (2001) (39)
- Multi-Task Learning Improves Disease Models from Web Search (2018) (38)
- Digital image processing of confocal images (1983) (38)
- Information Transmission and Steganography (2005) (38)
- Improved Spread Transform Dither Modulation using a Perceptual Model: Robustness to Amplitude Scaling and JPEG Compression (2007) (37)
- Underwater sonar data fusion using an efficient multiple hypothesis algorithm (1995) (36)
- Partitioning Data Sets (1995) (35)
- Multi-Dueling Bandits and Their Application to Online Ranker Evaluation (2016) (35)
- The added value of online user-generated content in traditional methods for influenza surveillance (2018) (31)
- Assessing the impact of a health intervention via user-generated Internet content (2015) (30)
- Concurrent Programming and Robotics (1989) (30)
- On Optimum Edge Recognition using Matched Filters (1986) (30)
- Automatic Identification of Web-Based Risk Markers for Health Events (2015) (29)
- A rotation, scale and translation resilient public watermark (1999) (28)
- A Comparison of On-Line Computer Science Citation Databases (2005) (27)
- Spread Transform Dither Modulation using a Perceptual Model (2006) (27)
- Watermarking in the real world: an application to DVD (1999) (27)
- Risky business: modeling and exploiting uncertainty in information retrieval (2009) (25)
- On The Congruence Of Noisy Images To Line Segment Models (1988) (24)
- Scanning optical microscope incorporating a digital framestore and microcomputer. (1983) (23)
- Comparing relevance feedback algorithms for web search (2005) (23)
- Selecting a Subset of Queries for Acquisition of Further Relevance Judgements (2011) (23)
- An energy-based method for the forensic detection of Re-sampled images (2011) (23)
- Share mobile and social-media data to curb COVID-19 (2020) (22)
- A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia (1996) (22)
- A comparison of dimensionality reduction techniques for text retrieval (2005) (22)
- Line recognition (1990) (21)
- An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking (2005) (21)
- Probably Approximately Correct Search (2009) (21)
- Rational dither modulation watermarking using a perceptual model (2005) (21)
- An uncertainty-aware query selection model for evaluation of IR systems (2012) (21)
- Optimizing Hybrid Spreading in Metapopulations (2014) (19)
- Increasing the bit packing densities of optical disk systems. (1984) (19)
- Estimating the Population Impact of a New Pediatric Influenza Vaccination Program in England Using Social Media Content (2017) (19)
- Specialized tools are needed when searching the web for rare disease diagnoses (2013) (19)
- Correction to "the Bayesian image retrieval system, pichunter: theory, implementation, and psychophysical experiments" (2000) (19)
- An Improved Multileaving Algorithm for Online Ranker Evaluation (2016) (18)
- Motion without structure (1996) (18)
- Models of Watermarking (2002) (18)
- A Bayesian Multiple Hypothesis Approach to Contour Grouping (1992) (18)
- Observation of optical signatures of materials (1982) (18)
- Evaluating Relevance Feedback Algorithms for Searching on Small Displays (2005) (17)
- A Bayesian Multiple Hypothesis Approach to Contour Segmentation (1993) (15)
- Prioritizing relevance judgments to improve the construction of IR test collections (2011) (15)
- IEEE Signal Processing Society (2018) (14)
- Applications and Properties (2002) (14)
- Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings (2005) (14)
- Relationship Between Media Coverage and Measles-Mumps-Rubella (MMR) Vaccination Uptake in Denmark: Retrospective Study (2019) (13)
- A multiple-baseline stereo for precise human face acquisition (1997) (13)
- Trellis coded modulation to improve dirty paper trellis watermarking (2007) (13)
- Recursive tracking of formants in speech signals (1994) (12)
- Watermarking as communications with side information : Identification and protection of multimedia information (1999) (12)
- On the Feasibility of Unstructured Peer-to-Peer Information Retrieval (2011) (12)
- Multi-Keyword Multi-Click Advertisement Option Contracts for Sponsored Search (2013) (12)
- Transfer Learning for Unsupervised Influenza-like Illness Models from Online Search Data (2019) (12)
- Measuring the Complexity of a Collection of Documents (2006) (12)
- Preprocessing media to facilitate later insertion of a watermark (2002) (11)
- Entropy-Based Static Index Pruning (2009) (11)
- Concurrent C and robotics (1987) (11)
- JPEG Based Conditional Entropy Coding for Correlated Steganography (2007) (11)
- Facilitating Watermark Insertion by Preprocessing Media (2004) (10)
- Time-Series Adaptive Estimation of Vaccination Uptake Using Web Search Queries (2017) (10)
- Topic (query) selection for IR evaluation (2009) (10)
- Estimating global statistics for unstructured P2P search in the presence of adversarial peers (2014) (10)
- Document-Oriented Pruning of the Inverted Index in Information Retrieval Systems (2009) (10)
- A comparison of extended fingerprint hashing and locality sensitive hashing for binary audio fingerprints (2011) (10)
- Copy protection for DVD video : Identification and protection of multimedia information (1999) (10)
- Real-time software for robotics (1988) (10)
- Toward a Better Understanding of Dirty Paper Trellis Codes (2006) (9)
- C++ language support for guaranteed initialization, safe termination and error recovery in robotics (1988) (9)
- Optimizing the cost of information retrieval testcollections (2011) (9)
- Second-Order Assortative Mixing in Social Networks (2009) (9)
- Google search patterns monitoring the daily health impact of heatwaves in England: How do the findings compare to established syndromic surveillance systems from 2013 to 2017? (2018) (8)
- Unsupervised learning for mobile robot navigation using probabilistic data association (1994) (8)
- Seasonal Web Search Query Selection for Influenza-Like Illness (ILI) Estimation (2017) (8)
- Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search (2010) (8)
- Risk-Aware Information Retrieval (2009) (8)
- PAC'nPost: a framework for a micro-blogging social network in an unstructured P2P network (2012) (8)
- Signal Processing Magazine E-Newsletter: Inside Out (2007) (7)
- Characterising Web Site Link Structure (2007) (7)
- Providing early indication of regional anomalies in COVID-19 case counts in England using search engine queries (2020) (7)
- Evaluating Relevance Feedback and Display Strategies for Searching on Small Displays (2004) (7)
- Estimating retrieval effectiveness using rank distributions (2008) (6)
- Edge detection in micrometrology with nearly confocal microscopy. (1984) (6)
- Predicting Antimicrobial Drug Consumption using Web Search Data (2018) (6)
- A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation (2007) (6)
- Ranked-Listed or Categorized Results in IR: 2 Is Better Than 1 (2008) (5)
- Informed Embedding for Multi-bit Watermarks (2002) (5)
- Chapter 11 – Content Authentication (2008) (5)
- Watermarking with Side Information (2002) (5)
- (SPECIAL SECTION - SIGNAL PROCESSING FOR SOUND SYNTHESIS ) (2007) (5)
- Modeling the author bias between two on-line computer science citation databases (2005) (5)
- The information capacity of a multi-dimensional communications system (1986) (5)
- A Framework for Peer-to-Peer Micro-Blogging (2013) (5)
- Identification of events from 3D volumes of seismic data (1994) (5)
- Retrieval of highly dynamic information in an unstructured peer-to-peer network (2013) (4)
- Imaging in a scanning photoacoustic microscope (1984) (4)
- Digital Watermarking and Steganography. Ed.2 (2019) (4)
- Temporal Integration of Multiple Sensor Observations for Dynamic World Modeling: A Multiple Hypothesis Approach (1991) (4)
- Chapter 2 – Applications and Properties (2008) (4)
- Natural Language Information Hiding Based on Chinese Mathematical Expression (2009) (4)
- Psychophysical experiments on the PicHunter image retrieval system (2001) (4)
- Editorial Steganography and digital watermarking (2006) (4)
- Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor (2019) (4)
- Ranked Accuracy and Unstructured Distributed Search (2013) (3)
- Estimating uncertainty in dense stereo disparity maps (2003) (3)
- A Concept Language Model for Ad-hoc Retrieval (2017) (3)
- Learning About Health and Medicine from Internet Data (2015) (3)
- Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers (2005) (3)
- Using perceptual distance to improve the selection of dirty paper trellis codes for watermarking (2004) (3)
- Chapter 9 – Robust Watermarking (2008) (3)
- MICROPROCESSORS IN SCANNING MICROSCOPY. (1983) (3)
- Changes in Psycholinguistic Attributes of Social Media Users Before, During, and After Self-Reported Influenza Symptoms (2018) (3)
- Chapter 3 – Models of Watermarking (2008) (3)
- Special Issue on Steganography and Digital Watermarking (2006) (3)
- Watermarking, steganography and content forensics (2008) (3)
- Extraction of events from 3D volumes of seismic data (1994) (2)
- Chapter 10 – Watermark Security (2008) (2)
- 6 – Analyzing Errors (2002) (2)
- Direct Estimation of Rotation from Two Frames via Epipolar Search (1995) (2)
- Artificial-Intelligence Systems in Antisubmarine Warfare. Results of a Pilot Study with Expert Systems, (1984) (2)
- Retrieval of trending keywords in a peer-to-peer micro-blogging OSN (2013) (2)
- Watermarking: The First 50 years (2001) (2)
- Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers (Lecture Notes in Computer Science) (2005) (2)
- Can constrained relevance feedback and display strategies help users retrieve items on mobile devices? (2006) (2)
- Digital watermarking : second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers (2004) (2)
- Partitioning Data Sets: Dimacs Workshop, April 19-21, 1993 (1995) (2)
- Grouping Edges: An Efficient Bayesian Multiple Hypothesis Approach (1993) (1)
- Query classification using asymmetric learning (2009) (1)
- Re-ranking Documents Based on Query-Independent Document Specificity (2009) (1)
- On unstructured distributed search over BitTorrent (2013) (1)
- ELECTRONIC IMAGE PROCESSING OF SCANNING OPTICAL MICROSCOPE IMAGES. (1982) (1)
- Multimedia security and rights management (2004) (1)
- Statistical modelling of epipolar misalignment (1995) (1)
- Basic Message Coding (2002) (1)
- Increasing ranked accuracy for unstructured distributed search with dynamic replication (2013) (1)
- What value can Google search data add to existing syndromic surveillance systems? (2018) (1)
- Go local: The key to controlling the COVID-19 pandemic in the post lockdown era (2020) (1)
- Guest Editorial: Supplement on Secure Media - I (2004) (1)
- 10 – Content Authentication (2002) (1)
- Guest editorial - Copyright and privacy protection (1998) (1)
- ANALYSIS OF LAPLACIAN EDGE-ENHANCEMENT FILTERS ON INCOHERENT IMAGES (1985) (1)
- Chapter 18 A review of watermarking principles and practices (1999) (1)
- Chapter 4 – Basic Message Coding (2008) (1)
- Practical Dirty-Paper Codes (2008) (1)
- Chapter 5 – Watermarking with Side Information (2008) (1)
- Multi-Keyword Multi-Click Option Contracts for Sponsored Search Advertising (2013) (1)
- Trending topics in a peer-to-peer micro-blogging social network (2013) (1)
- Ranking Classes of Search Engine Results (2010) (1)
- A Robust Watermarking Scheme for Digital Video Sequence using Entropy and Hadamard Transformation Technique (2016) (0)
- IEE Proceedings: Information Security : Editorial (2006) (0)
- Blanche: Position Estimation for an Autonomous RQ (1989) (0)
- Measuring the Variability in Effectiveness of a Retrieval System (2010) (0)
- Proceedings of the Third international conference on Digital Watermarking (2002) (0)
- [weigl93] Title Grid-based Mapping for Autonomous Mobile Robot [yamauchi96] Title Mobile Robot Localization in Dynamic Environments Using Dead Reckoning and Evi- Dence Grids Source (1990) (0)
- Editorial (2018) (0)
- WSDM 2017 Workshop on Mining Online Health Reports: MOHRS 2017 (2017) (0)
- Characterising WebSite LinkStructure (2007) (0)
- Chapter 8 – Using Perceptual Models (2008) (0)
- Handbook of multisensor data fusion [Book Review] (2002) (0)
- What online searches tell us about public interest and potential impact on behaviour in response to Minimum Unit Pricing of alcohol in Scotland. (2021) (0)
- Method based on a probability function image retrieval (1997) (0)
- A method for data processing and for inserting a watermark (1999) (0)
- Estimating the Uncertainty of Neural Network Forecasts for Influenza Prevalence Using Web Search Activity (2021) (0)
- Method for generating and holding map for moving robot (1991) (0)
- Digital Watermarking Using Syndrome Codes (2005) (0)
- Time series: data analysis and theory [Book Review] (2002) (0)
- IMPROVE SPREAD TRANSFORM DITHER MODULATION BY USING A PERCEPTUAL MODEL TO PROVIDE RESISTANCE TO AMPLITUDE SCALING AND JPEG COMPRESSION (2006) (0)
- 9 – Watermark Security (2002) (0)
- Editorial [information security can trace its origins back to antiquity] (2006) (0)
- Methods for using extracted feature vectors to perform an action associated with a work identifier (2017) (0)
- Data Hiding and the Statistics of Images (2009) (0)
- Towards Robust Reference Image Watermarking using DWT- SVD and Edge Detection (2017) (0)
- Toward Optimal Search of Image Databases (2009) (0)
- Towards Robust Reference Image Watermarking using DWT- SVD and Edge Detection (2017) (0)
- Editorial for Supplement on Secure Media—III (2005) (0)
- Introduction: Computer Vision Research at NECI (1999) (0)
- Expert systems ߝ programs that behave intelligently (1985) (0)
- Using Perceptual Models (2002) (0)
- It's Who You Know: Second-Order Mixing in Networks (2009) (0)
- 4.4 Security for the Merchant (2007) (0)
- Data processing method and water punctuation (1999) (0)
- Insertion et detection de filigrane par champ (1999) (0)
- System for using extracted feature vectors to perform an action associated with a work identifier (2017) (0)
- i-sense - Early Warning Sensing Systems for Infectious Diseases (2015) (0)
- Term Frequency Quantization for Compressing an Inverted Index (2010) (0)
- Underwater Sonar Data Fusion Using an E cient Multiple HypothesisAlgorithmJohn (1995) (0)
- Analysing Digital Footprints to Infer the Health of Populations and Individuals (2020) (0)
- Robot Systems Software (1989) (0)
- Algorithms for statistical signal processing [Book Review] (2002) (0)
- FacilitatingWatermark Insertion by PreprocessingMedia (2004) (0)
- Chapter 7 – Analyzing Errors (2008) (0)
- A Message From the Editor-in-Chief and Guest Editorial: Supplement on Secure Media—II (2005) (0)
This paper list is powered by the following services:
Other Resources About Ingemar Cox
What Schools Are Affiliated With Ingemar Cox?
Ingemar Cox is affiliated with the following schools: