2008 |
44 | EE | Alexandra Czarlinska,
William Luh,
Deepa Kundur:
On privacy and security in distributed visual sensor networks.
ICIP 2008: 1692-1695 |
43 | EE | Takis Zourntos,
Nebu John Mathai,
Sebastian Magierowski,
Deepa Kundur:
A bio-inspired analog scheme for navigational control of lightweight autonomous agents.
ICRA 2008: 1132-1137 |
42 | EE | Alexandra Czarlinska,
Deepa Kundur:
Coordination and Selfishness in Attacks on Visual Sensor Networks.
WCNC 2008: 2391-2396 |
41 | EE | William Luh,
Deepa Kundur:
Distributed Secret Sharing for Discrete Memoryless Networks.
IEEE Transactions on Information Forensics and Security 3(3): 1-7 (2008) |
2007 |
40 | | Deepa Kundur,
Balakrishnan Prabhakaran,
Jana Dittmann,
Jessica J. Fridrich:
Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007
ACM 2007 |
39 | EE | Alexandra Czarlinska,
William Luh,
Deepa Kundur:
Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments.
GLOBECOM 2007: 1001-1005 |
38 | EE | William Luh,
Deepa Kundur:
Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks.
GLOBECOM 2007: 1637-1641 |
37 | EE | William Luh,
Deepa Kundur:
Distributed Keyless Secret Sharing Over Noiseless Channels.
GLOBECOM 2007: 44-48 |
36 | EE | Deepa Kundur,
Zhu Liu,
Madjid Merabti,
Heather Yu:
Advances in Peer-to-Peer Content Search.
ICME 2007: 404-407 |
35 | EE | Julien S. Jainsky,
Deepa Kundur,
Don R. Halverson:
Towards digital video steganalysis using asymptotic memoryless detection.
MM&Sec 2007: 161-168 |
34 | EE | Alexandra Czarlinska,
Deepa Kundur:
Attack vs. failure detection in event-driven wireless visual sensor networks.
MM&Sec 2007: 215-220 |
33 | EE | William Luh,
Deepa Kundur:
Distributed keyless security for correlated data with applications in visual sensor networks.
MM&Sec 2007: 75-86 |
32 | EE | Unoma Ndili Okorafor,
Deepa Kundur:
On node isolation in directional sensor networks.
SenSys 2007: 433-434 |
31 | EE | Alexandra Czarlinska,
Deepa Kundur:
Towards characterizing the effectiveness of random mobility against actuation attacks.
Computer Communications 30(13): 2546-2559 (2007) |
2006 |
30 | EE | Unoma Ndili Okorafor,
Deepa Kundur:
OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks.
BROADNETS 2006 |
29 | EE | Zhu Liu,
Heather Yu,
Deepa Kundur,
Madjid Merabti:
On Peer-to-Peer Multimedia Content Access and Distribution.
ICME 2006: 557-560 |
28 | EE | Deepa Kundur,
Unoma Ndili Okorafor,
William Luh:
HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing.
IIH-MSP 2006: 267-270 |
27 | EE | William Luh,
Deepa Kundur:
Multimedia Fingerprinting.
Encyclopedia of Multimedia 2006 |
26 | EE | Deepa Kundur,
William Luh:
Multimedia Sensor Networks.
Encyclopedia of Multimedia 2006 |
25 | EE | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Analysis and design of secure watermark-based authentication systems.
IEEE Transactions on Information Forensics and Security 1(1): 43-55 (2006) |
24 | EE | Udit Budhia,
Deepa Kundur,
Takis Zourntos:
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain.
IEEE Transactions on Information Forensics and Security 1(4): 502-516 (2006) |
2005 |
23 | | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 697-708 |
22 | EE | Karen Su,
Deepa Kundur,
Dimitrios Hatzinakos:
Statistical invisibility for collusion-resistant digital video watermarking.
IEEE Transactions on Multimedia 7(1): 43-51 (2005) |
21 | EE | Karen Su,
Deepa Kundur,
Dimitrios Hatzinakos:
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance.
IEEE Transactions on Multimedia 7(1): 52-66 (2005) |
2004 |
20 | | Deepa Kundur,
Yang Zhao,
Patrizio Campisi:
A stenographic framework for dual authentication and compression of high resolution imagery.
ISCAS (2) 2004: 1-4 |
19 | | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Analysis and design of authentication watermarking.
Security, Steganography, and Watermarking of Multimedia Contents 2004: 760-771 |
18 | EE | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Analysis and design of watermarking algorithms for improved resistance to compression.
IEEE Transactions on Image Processing 13(2): 126-144 (2004) |
17 | EE | Yang Zhao,
Patrizio Campisi,
Deepa Kundur:
Dual domain watermarking for authentication and compression of cultural heritage image.
IEEE Transactions on Image Processing 13(3): 430-448 (2004) |
16 | EE | Deepa Kundur,
Dimitrios Hatzinakos:
Toward robust logo watermarking using multiresolution image fusion principles.
IEEE Transactions on Multimedia 6(1): 185-198 (2004) |
15 | | Deepa Kundur,
Ching-Yung Lin,
Benoit M. Macq,
Hong-heather Yu:
Special Issue on Enabling Security Technologies for Digital Rights Management.
Proceedings of the IEEE 92(6): 879-882 (2004) |
14 | | Deepa Kundur,
Kannan Karthik:
Video Fingerprinting and Encryption Principles for Digital Rights Management.
Proceedings of the IEEE 92(6): 918-932 (2004) |
2003 |
13 | EE | Nebu John Muthui,
Ali Sheikholeslami,
Deepa Kundur:
VLSI implementation of a real-time video watermark embedder and detector.
ISCAS (2) 2003: 772-775 |
2001 |
12 | EE | Karen Su,
Deepa Kundur,
Dimitrios Hatzinakos:
A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks.
ICIP (1) 2001: 818-821 |
11 | EE | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
The Choice of Watermark Domain in the Presence of Compression.
ITCC 2001: 79-84 |
10 | EE | Hong-heather Yu,
Deepa Kundur,
Ching-Yung Lin:
Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era.
IEEE MultiMedia 8(3): 8-12 (2001) |
9 | EE | Deepa Kundur:
Watermarking with Diversity: Insights and Implications.
IEEE MultiMedia 8(4): 46-52 (2001) |
2000 |
8 | | Deepa Kundur:
Energy Allocation for High-Capacity Watermarking in the Presence of Compression.
ICIP 2000 |
7 | | Deepa Kundur:
Water-Filling for Watermarking?
IEEE International Conference on Multimedia and Expo (III) 2000: 1287-1290 |
6 | EE | Deepa Kundur:
Implications for High Capacity Data Hiding in Presence of Lossy Compression.
ITCC 2000: 16-21 |
5 | EE | Deepa Kundur,
Dimitrios Hatzinakos,
Henry Leung:
Robust classification of blurred imagery.
IEEE Transactions on Image Processing 9(2): 243-255 (2000) |
1999 |
4 | | Deepa Kundur,
Dimitrios Hatzinakos:
Attack Characterization for Effective Watermarking.
ICIP (2) 1999: 240-244 |
1998 |
3 | | Deepa Kundur,
Dimitrios Hatzinakos:
Towards a Telltale Watermarking Technique for Tamper-Proofing.
ICIP (2) 1998: 409-413 |
1997 |
2 | EE | Deepa Kundur,
Dimitrios Hatzinakos:
A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion.
ICIP (1) 1997: 544-547 |
1 | EE | Deepa Kundur,
Dimitrios Hatzinakos,
Henry Leung:
A novel approach to robust blind classification of remote sensing imagery.
ICIP (3) 1997: 130-133 |