Deepa Kundur’s Google Scholar Page.
2004 |
Denial of Service Attacks: Path Reconstruction for IP Traceback using Adjusted Probabilistic Packet Marking () 2004. |
0.18 CMOS Implementation of a Video Watermarking Algorithm () 2004. |
“Security and Digital Rights Management for Mobile Content,” in Content Delivery in the Mobile Internet (Book Chapter) T. Wu; S. Dixit (Ed.): Chapter Security and Digital Rights Management f, pp. 371-407, John Wiley & Sons, 2004, ISBN: 978-0-471-46618-5. |
Lightweight Security Principles for Distributed Multimedia-Based Sensor Networks (Inproceedings) Proc. Annual Asilomar Conference on Signals, Systems and Computers, pp. 368-372, Pacific Grove, California, 2004. |
Robust Digital Watermarking in the Ridgelet Domain (Journal Article) IEEE Signal Processing Letters, 11 (10), pp. 826-830, 2004. |
Video Fingerprinting and Encryption Principles for Digital Rights Management (Journal Article) Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, 92 (6), pp. 918-932, 2004. |
Enabling Security Technologies for Digital Rights Management (Journal Article) Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, 92 (6), pp. 879-882, 2004. |
“Digital Video Watermarking: Techniques, Technology and Trends,” in Intelligent Watermarking Techniques (Book Chapter) P. J.-S. Pan; H.-C. Huang; L. Jain (Ed.): Chapter Digital Video Watermarking: Techniques, , pp. 265-314, World Scientific Publishing Company, 2004, ISBN: 978-981-238-757-8. |
Joint Fingerprinting and Decryption for Multimedia Content Tracing in Wireless Networks (Inproceedings) Edward M. Carapezza (Ed.): Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, pp. 360-370, Orlando, Florida, 2004. |
Digital Video Steganalysis Exploiting Collusion Sensitivity (Inproceedings) Edward M. Carapezza (Ed.): Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, pp. 210-221, Orlando, Florida, 2004. |
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images (Journal Article) IEEE Transactions on Image Processing, 13 (3), pp. 430-448, 2004. |
Technological Protection Measures in the Courts: Law, Engineering, and DRM Lessons Learned from the Failure of the Content Scrambling System (Journal Article) IEEE Signal Processing Magazine, 21 (2), pp. 109-117, 2004. |
Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression (Journal Article) IEEE Transactions on Image Processing, 13 (2), pp. 126-144, 2004. |
Toward Robust Logo Watermarking using Multiresolution Image Fusion Principles (Journal Article) IEEE Transactions on Multimedia, 6 (2), pp. 185-198, 2004. |
Analysis and Design of Authentication Watermarking (Inproceedings) E. J. Delp III; P. W. Wong (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VI, pp. 760-771, San Jose, California, 2004. |
A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery (Inproceedings) Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, Vancouver, Canada, 2004. |
2003 |
Dual Domain Semi-Fragile Watermarking for Image Authentication () 2003. |
Enhanced Watermark Detection () 2003. |
VLSI Implementation of a Real-Time Video Watermark Embedder and Detector (Inproceedings) Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 772-775, Bangkok, Thailand, 2003. |
Hardware Implementation Perspectives of Digital Video Watermarking Algorithms (Journal Article) IEEE Transactions on Signal Processing, 51 (4), pp. 925-938, 2003. |
Practical Internet Steganography: Data Hiding in IP (Inproceedings) Proc. Texas Workshop on Security of Information Systems, College Station, Texas, 2003. |
2002 |
Practical Data Hiding in TCP/IP (Inproceedings) Proc. Workshop on Multimedia Security at ACM Multimedia '02, Juan Les Pins, France, 2002. |
Covert Channel Analysis and Data Hiding in TCP/IP () 2002. |
Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding (Journal Article) EURASIP Journal on Applied Signal Processing Special Issue on Emerging Applications of Data Hiding, 2002 (2), pp. 152-163, 2002. |
A Novel Approach to Collusion Resistant Video Watermarking (Inproceedings) E. J. Delp III; P. W. Wong (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents IV, pp. 491-502, San Jose, California, 2002. |
Hiding Based Compression for Improved Color Image Coding (Inproceedings) E. J. Delp III; P. W. Wong (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents IV, pp. 230-239, San Jose, California, 2002. |
2001 |
A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks (Inproceedings) Proc. IEEE International Conference on Image Processing (ICIP), pp. 818-821, Thessaloniki, Greece, 2001. |
Watermarking with Diversity: Insights and Implications (Journal Article) IEEE Multimedia, 8 (4), pp. 46-52, 2001. |
Diversity and Attack Characterization for Improved Robust Watermarking (Journal Article) IEEE Transactions on Signal Processing, 29 (10), pp. 2383-2396, 2001. |
Digital Video Watermarking Principles for Resistance to Collusion and Interpolation Attacks () 2001. |
Communication and Information Theory in Watermarking: A Survey (Inproceedings) A. G. Tescher; B. Vasudev,; V. M. Bove (Ed.): Proc. SPIE Multimedia Systems and Applications IV, pp. 216-227, Denver, Colorado, 2001. |
Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era (Journal Article) IEEE Multimedia, 8 (3), pp. 8-12, 2001. |
Transform-Based Hybrid Data Hiding for Improved Robustness in the Presence of Perceptual Coding (Inproceedings) M. S. Schmalz (Ed.): Proc. SPIE Mathematics of Data/Image Coding, Compression and Encryption IV, with Applications, pp. 203-212, San Diego, California, 2001. |
The Choice of Transform for Robust Watermarking in the Presence of Lossy Compression () 2001. |
The Choice of Watermark Domain in the Presence of Compression (Inproceedings) Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 79-84, Las Vegas, Nevada, 2001. |
2000 |
Energy Allocation for High-Capacity Watermarking in the Presence of Compression (Inproceedings) Proc. IEEE International Conference on Image Processing (ICIP), pp. 423-426, Vancouver, Canada, 2000. |
Water-filling for Watermarking? (Inproceedings) Proc. IEEE International Conference on Multimedia and Expo (ICME), pp. 1287-1290, New York City, New York, 2000. |
Implications for High Capacity Data Hiding in the Presence of Lossy Compression (Inproceedings) Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 16-21, Las Vegas, Nevada, 2000. |
Robust Classification of Blurred Imagery (Journal Article) IEEE Transactions on Image Processing, 9 (2), pp. 243-255, 2000. |
1999 |
Attack Characterization for Effective Watermarking (Inproceedings) Proc. IEEE International Conference on Image Processing (ICIP), pp. 240-244, Kobe, Japan, 1999. |
Improved Digital Watermarking through Diversity and Attack Characterization (Inproceedings) Proc. Workshop on Multimedia Security at ACM Multimedia `99, pp. 53-58, Orlando, Florida, 1999. |
Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression (Inproceedings) A. G. Tescher (Ed.): Proc. SPIE Multimedia Systems and Applications II, pp. 29-42, Boston, Massachusetts, 1999. |
Digital Watermarking for Telltale Tamper-Proofing and Authentication (Journal Article) Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 87 (7), pp. 1167-1180, 1999. |
1998 |
Improved Robust Watermarking through Attack Characterization (Journal Article) Optics Express Special Issue on Digital Watermarking, 3 (12), pp. 485-490, 1998. |
Semi-Blind Image Restoration Based on Telltale Watermarking (Inproceedings) Proc. Asilomar Conference on Signals, Systems and, Computers, pp. 933-937, Pacific Grove, California, 1998. |
On the use of Lyapunov Criteria to Analyze the Convergence of Blind Deconvolution Algorithms (Journal Article) IEEE Transactions on Signal Processing, 26 (10), pp. 2918-2925, 1998. |
Towards a Telltale Watermarking Technique for Tamper-Proofing (Inproceedings) Proc. IEEE International Conference on Image Processing (ICIP), pp. 409-413, 1998. |
Digital Watermarking using Multiresolution Wavelet Decomposition (Inproceedings) Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2969-2972, Seattle, Washington, 1998. |
A Novel Blind Deconvolution Scheme for Image Restoration using Recursive Filtering (Journal Article) IEEE Transactions on Signal Processing, 46 (2), pp. 375-390, 1998. |
1997 |
A Robust Digital Image Watermarking Method using Wavelet-Based Fusion (Inproceedings) Proc. IEEE International Conference on Image Processing (ICIP), pp. 544-547, Santa Barbara, California, 1997. |