| 2008 |
| 44 | EE | Alexandra Czarlinska,
William Luh,
Deepa Kundur:
On privacy and security in distributed visual sensor networks.
ICIP 2008: 1692-1695 |
| 43 | EE | Takis Zourntos,
Nebu John Mathai,
Sebastian Magierowski,
Deepa Kundur:
A bio-inspired analog scheme for navigational control of lightweight autonomous agents.
ICRA 2008: 1132-1137 |
| 42 | EE | Alexandra Czarlinska,
Deepa Kundur:
Coordination and Selfishness in Attacks on Visual Sensor Networks.
WCNC 2008: 2391-2396 |
| 41 | EE | William Luh,
Deepa Kundur:
Distributed Secret Sharing for Discrete Memoryless Networks.
IEEE Transactions on Information Forensics and Security 3(3): 1-7 (2008) |
| 2007 |
| 40 | | Deepa Kundur,
Balakrishnan Prabhakaran,
Jana Dittmann,
Jessica J. Fridrich:
Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007
ACM 2007 |
| 39 | EE | Alexandra Czarlinska,
William Luh,
Deepa Kundur:
Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments.
GLOBECOM 2007: 1001-1005 |
| 38 | EE | William Luh,
Deepa Kundur:
Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks.
GLOBECOM 2007: 1637-1641 |
| 37 | EE | William Luh,
Deepa Kundur:
Distributed Keyless Secret Sharing Over Noiseless Channels.
GLOBECOM 2007: 44-48 |
| 36 | EE | Deepa Kundur,
Zhu Liu,
Madjid Merabti,
Heather Yu:
Advances in Peer-to-Peer Content Search.
ICME 2007: 404-407 |
| 35 | EE | Julien S. Jainsky,
Deepa Kundur,
Don R. Halverson:
Towards digital video steganalysis using asymptotic memoryless detection.
MM&Sec 2007: 161-168 |
| 34 | EE | Alexandra Czarlinska,
Deepa Kundur:
Attack vs. failure detection in event-driven wireless visual sensor networks.
MM&Sec 2007: 215-220 |
| 33 | EE | William Luh,
Deepa Kundur:
Distributed keyless security for correlated data with applications in visual sensor networks.
MM&Sec 2007: 75-86 |
| 32 | EE | Unoma Ndili Okorafor,
Deepa Kundur:
On node isolation in directional sensor networks.
SenSys 2007: 433-434 |
| 31 | EE | Alexandra Czarlinska,
Deepa Kundur:
Towards characterizing the effectiveness of random mobility against actuation attacks.
Computer Communications 30(13): 2546-2559 (2007) |
| 2006 |
| 30 | EE | Unoma Ndili Okorafor,
Deepa Kundur:
OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks.
BROADNETS 2006 |
| 29 | EE | Zhu Liu,
Heather Yu,
Deepa Kundur,
Madjid Merabti:
On Peer-to-Peer Multimedia Content Access and Distribution.
ICME 2006: 557-560 |
| 28 | EE | Deepa Kundur,
Unoma Ndili Okorafor,
William Luh:
HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing.
IIH-MSP 2006: 267-270 |
| 27 | EE | William Luh,
Deepa Kundur:
Multimedia Fingerprinting.
Encyclopedia of Multimedia 2006 |
| 26 | EE | Deepa Kundur,
William Luh:
Multimedia Sensor Networks.
Encyclopedia of Multimedia 2006 |
| 25 | EE | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Analysis and design of secure watermark-based authentication systems.
IEEE Transactions on Information Forensics and Security 1(1): 43-55 (2006) |
| 24 | EE | Udit Budhia,
Deepa Kundur,
Takis Zourntos:
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain.
IEEE Transactions on Information Forensics and Security 1(4): 502-516 (2006) |
| 2005 |
| 23 | | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 697-708 |
| 22 | EE | Karen Su,
Deepa Kundur,
Dimitrios Hatzinakos:
Statistical invisibility for collusion-resistant digital video watermarking.
IEEE Transactions on Multimedia 7(1): 43-51 (2005) |
| 21 | EE | Karen Su,
Deepa Kundur,
Dimitrios Hatzinakos:
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance.
IEEE Transactions on Multimedia 7(1): 52-66 (2005) |
| 2004 |
| 20 | | Deepa Kundur,
Yang Zhao,
Patrizio Campisi:
A stenographic framework for dual authentication and compression of high resolution imagery.
ISCAS (2) 2004: 1-4 |
| 19 | | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Analysis and design of authentication watermarking.
Security, Steganography, and Watermarking of Multimedia Contents 2004: 760-771 |
| 18 | EE | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
Analysis and design of watermarking algorithms for improved resistance to compression.
IEEE Transactions on Image Processing 13(2): 126-144 (2004) |
| 17 | EE | Yang Zhao,
Patrizio Campisi,
Deepa Kundur:
Dual domain watermarking for authentication and compression of cultural heritage image.
IEEE Transactions on Image Processing 13(3): 430-448 (2004) |
| 16 | EE | Deepa Kundur,
Dimitrios Hatzinakos:
Toward robust logo watermarking using multiresolution image fusion principles.
IEEE Transactions on Multimedia 6(1): 185-198 (2004) |
| 15 | | Deepa Kundur,
Ching-Yung Lin,
Benoit M. Macq,
Hong-heather Yu:
Special Issue on Enabling Security Technologies for Digital Rights Management.
Proceedings of the IEEE 92(6): 879-882 (2004) |
| 14 | | Deepa Kundur,
Kannan Karthik:
Video Fingerprinting and Encryption Principles for Digital Rights Management.
Proceedings of the IEEE 92(6): 918-932 (2004) |
| 2003 |
| 13 | EE | Nebu John Muthui,
Ali Sheikholeslami,
Deepa Kundur:
VLSI implementation of a real-time video watermark embedder and detector.
ISCAS (2) 2003: 772-775 |
| 2001 |
| 12 | EE | Karen Su,
Deepa Kundur,
Dimitrios Hatzinakos:
A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks.
ICIP (1) 2001: 818-821 |
| 11 | EE | Chuhong Fei,
Deepa Kundur,
Raymond H. Kwong:
The Choice of Watermark Domain in the Presence of Compression.
ITCC 2001: 79-84 |
| 10 | EE | Hong-heather Yu,
Deepa Kundur,
Ching-Yung Lin:
Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era.
IEEE MultiMedia 8(3): 8-12 (2001) |
| 9 | EE | Deepa Kundur:
Watermarking with Diversity: Insights and Implications.
IEEE MultiMedia 8(4): 46-52 (2001) |
| 2000 |
| 8 | | Deepa Kundur:
Energy Allocation for High-Capacity Watermarking in the Presence of Compression.
ICIP 2000 |
| 7 | | Deepa Kundur:
Water-Filling for Watermarking?
IEEE International Conference on Multimedia and Expo (III) 2000: 1287-1290 |
| 6 | EE | Deepa Kundur:
Implications for High Capacity Data Hiding in Presence of Lossy Compression.
ITCC 2000: 16-21 |
| 5 | EE | Deepa Kundur,
Dimitrios Hatzinakos,
Henry Leung:
Robust classification of blurred imagery.
IEEE Transactions on Image Processing 9(2): 243-255 (2000) |
| 1999 |
| 4 | | Deepa Kundur,
Dimitrios Hatzinakos:
Attack Characterization for Effective Watermarking.
ICIP (2) 1999: 240-244 |
| 1998 |
| 3 | | Deepa Kundur,
Dimitrios Hatzinakos:
Towards a Telltale Watermarking Technique for Tamper-Proofing.
ICIP (2) 1998: 409-413 |
| 1997 |
| 2 | EE | Deepa Kundur,
Dimitrios Hatzinakos:
A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion.
ICIP (1) 1997: 544-547 |
| 1 | EE | Deepa Kundur,
Dimitrios Hatzinakos,
Henry Leung:
A novel approach to robust blind classification of remote sensing imagery.
ICIP (3) 1997: 130-133 |