dblp.uni-trier.dewww.uni-trier.de

Deepa Kundur

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
44EEAlexandra Czarlinska, William Luh, Deepa Kundur: On privacy and security in distributed visual sensor networks. ICIP 2008: 1692-1695
43EETakis Zourntos, Nebu John Mathai, Sebastian Magierowski, Deepa Kundur: A bio-inspired analog scheme for navigational control of lightweight autonomous agents. ICRA 2008: 1132-1137
42EEAlexandra Czarlinska, Deepa Kundur: Coordination and Selfishness in Attacks on Visual Sensor Networks. WCNC 2008: 2391-2396
41EEWilliam Luh, Deepa Kundur: Distributed Secret Sharing for Discrete Memoryless Networks. IEEE Transactions on Information Forensics and Security 3(3): 1-7 (2008)
2007
40 Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, Jessica J. Fridrich: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007 ACM 2007
39EEAlexandra Czarlinska, William Luh, Deepa Kundur: Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments. GLOBECOM 2007: 1001-1005
38EEWilliam Luh, Deepa Kundur: Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks. GLOBECOM 2007: 1637-1641
37EEWilliam Luh, Deepa Kundur: Distributed Keyless Secret Sharing Over Noiseless Channels. GLOBECOM 2007: 44-48
36EEDeepa Kundur, Zhu Liu, Madjid Merabti, Heather Yu: Advances in Peer-to-Peer Content Search. ICME 2007: 404-407
35EEJulien S. Jainsky, Deepa Kundur, Don R. Halverson: Towards digital video steganalysis using asymptotic memoryless detection. MM&Sec 2007: 161-168
34EEAlexandra Czarlinska, Deepa Kundur: Attack vs. failure detection in event-driven wireless visual sensor networks. MM&Sec 2007: 215-220
33EEWilliam Luh, Deepa Kundur: Distributed keyless security for correlated data with applications in visual sensor networks. MM&Sec 2007: 75-86
32EEUnoma Ndili Okorafor, Deepa Kundur: On node isolation in directional sensor networks. SenSys 2007: 433-434
31EEAlexandra Czarlinska, Deepa Kundur: Towards characterizing the effectiveness of random mobility against actuation attacks. Computer Communications 30(13): 2546-2559 (2007)
2006
30EEUnoma Ndili Okorafor, Deepa Kundur: OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks. BROADNETS 2006
29EEZhu Liu, Heather Yu, Deepa Kundur, Madjid Merabti: On Peer-to-Peer Multimedia Content Access and Distribution. ICME 2006: 557-560
28EEDeepa Kundur, Unoma Ndili Okorafor, William Luh: HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. IIH-MSP 2006: 267-270
27EEWilliam Luh, Deepa Kundur: Multimedia Fingerprinting. Encyclopedia of Multimedia 2006
26EEDeepa Kundur, William Luh: Multimedia Sensor Networks. Encyclopedia of Multimedia 2006
25EEChuhong Fei, Deepa Kundur, Raymond H. Kwong: Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 1(1): 43-55 (2006)
24EEUdit Budhia, Deepa Kundur, Takis Zourntos: Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Transactions on Information Forensics and Security 1(4): 502-516 (2006)
2005
23 Chuhong Fei, Deepa Kundur, Raymond H. Kwong: Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. Security, Steganography, and Watermarking of Multimedia Contents 2005: 697-708
22EEKaren Su, Deepa Kundur, Dimitrios Hatzinakos: Statistical invisibility for collusion-resistant digital video watermarking. IEEE Transactions on Multimedia 7(1): 43-51 (2005)
21EEKaren Su, Deepa Kundur, Dimitrios Hatzinakos: Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. IEEE Transactions on Multimedia 7(1): 52-66 (2005)
2004
20 Deepa Kundur, Yang Zhao, Patrizio Campisi: A stenographic framework for dual authentication and compression of high resolution imagery. ISCAS (2) 2004: 1-4
19 Chuhong Fei, Deepa Kundur, Raymond H. Kwong: Analysis and design of authentication watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2004: 760-771
18EEChuhong Fei, Deepa Kundur, Raymond H. Kwong: Analysis and design of watermarking algorithms for improved resistance to compression. IEEE Transactions on Image Processing 13(2): 126-144 (2004)
17EEYang Zhao, Patrizio Campisi, Deepa Kundur: Dual domain watermarking for authentication and compression of cultural heritage image. IEEE Transactions on Image Processing 13(3): 430-448 (2004)
16EEDeepa Kundur, Dimitrios Hatzinakos: Toward robust logo watermarking using multiresolution image fusion principles. IEEE Transactions on Multimedia 6(1): 185-198 (2004)
15 Deepa Kundur, Ching-Yung Lin, Benoit M. Macq, Hong-heather Yu: Special Issue on Enabling Security Technologies for Digital Rights Management. Proceedings of the IEEE 92(6): 879-882 (2004)
14 Deepa Kundur, Kannan Karthik: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE 92(6): 918-932 (2004)
2003
13EENebu John Muthui, Ali Sheikholeslami, Deepa Kundur: VLSI implementation of a real-time video watermark embedder and detector. ISCAS (2) 2003: 772-775
2001
12EEKaren Su, Deepa Kundur, Dimitrios Hatzinakos: A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks. ICIP (1) 2001: 818-821
11EEChuhong Fei, Deepa Kundur, Raymond H. Kwong: The Choice of Watermark Domain in the Presence of Compression. ITCC 2001: 79-84
10EEHong-heather Yu, Deepa Kundur, Ching-Yung Lin: Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era. IEEE MultiMedia 8(3): 8-12 (2001)
9EEDeepa Kundur: Watermarking with Diversity: Insights and Implications. IEEE MultiMedia 8(4): 46-52 (2001)
2000
8 Deepa Kundur: Energy Allocation for High-Capacity Watermarking in the Presence of Compression. ICIP 2000
7 Deepa Kundur: Water-Filling for Watermarking? IEEE International Conference on Multimedia and Expo (III) 2000: 1287-1290
6EEDeepa Kundur: Implications for High Capacity Data Hiding in Presence of Lossy Compression. ITCC 2000: 16-21
5EEDeepa Kundur, Dimitrios Hatzinakos, Henry Leung: Robust classification of blurred imagery. IEEE Transactions on Image Processing 9(2): 243-255 (2000)
1999
4 Deepa Kundur, Dimitrios Hatzinakos: Attack Characterization for Effective Watermarking. ICIP (2) 1999: 240-244
1998
3 Deepa Kundur, Dimitrios Hatzinakos: Towards a Telltale Watermarking Technique for Tamper-Proofing. ICIP (2) 1998: 409-413
1997
2EEDeepa Kundur, Dimitrios Hatzinakos: A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion. ICIP (1) 1997: 544-547
1EEDeepa Kundur, Dimitrios Hatzinakos, Henry Leung: A novel approach to robust blind classification of remote sensing imagery. ICIP (3) 1997: 130-133

Coauthor Index

1Udit Budhia [24]
2Patrizio Campisi [17] [20]
3Alexandra Czarlinska [31] [34] [39] [42] [44]
4Jana Dittmann [40]
5Chuhong Fei [11] [18] [19] [23] [25]
6Jessica J. Fridrich [40]
7Don R. Halverson [35]
8Dimitrios Hatzinakos [1] [2] [3] [4] [5] [12] [16] [21] [22]
9Julien S. Jainsky [35]
10Kannan Karthik [14]
11Raymond H. Kwong [11] [18] [19] [23] [25]
12Henry Leung [1] [5]
13Ching-Yung Lin [10] [15]
14Zhu Liu [29] [36]
15William Luh [26] [27] [28] [33] [37] [38] [39] [41] [44]
16Benoit M. Macq (Benoît Macq) [15]
17Sebastian Magierowski [43]
18Nebu John Mathai [43]
19Madjid Merabti [29] [36]
20Nebu John Muthui [13]
21Unoma Ndili Okorafor [28] [30] [32]
22B. Prabhakaran (Balakrishnan Prabhakaran) [40]
23Ali Sheikholeslami [13]
24Karen Su [12] [21] [22]
25Heather Yu [29] [36]
26Hong-heather Yu [10] [15]
27Yang Zhao [17] [20]
28Takis Zourntos [24] [43]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)