dblp.uni-trier.dewww.uni-trier.de

Husrev T. Sencar

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20EESevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Video copy detection based on source device characteristics: a complementary approach to content-based methods. Multimedia Information Retrieval 2008: 435-442
19EESevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Classification of digital camera-models based on demosaicing artifacts. Digital Investigation 5(1-2): 49-59 (2008)
18EEAhmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon: Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust. IEEE Transactions on Information Forensics and Security 3(3): 539-552 (2008)
2007
17EESintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon: Detecting Malicious Behavior in Cooperative Diversity. CISS 2007: 895-899
16EEYagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon: Tamper Detection Based on Regularity of Wavelet Transform Coefficients. ICIP (1) 2007: 397-400
15EEAhmet Emir Dirik, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: New Features to Identify Computer Generated Images. ICIP (4) 2007: 433-436
14EEYagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Improvements on Sensor Noise Based Source Camera Identification. ICME 2007: 24-27
13EEHusrev T. Sencar, Qiming Li, Nasir D. Memon: A new approach to countering ambiguity attacks. MM&Sec 2007: 205-214
12EEHusrev T. Sencar, Nasir D. Memon: Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. IEEE Transactions on Information Forensics and Security 2(4): 664-682 (2007)
11EEHusrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu, Amol Sukerkar: Improved utilization of embedding distortion in scalar quantization based data hiding techniques. Signal Processing 87(5): 877-890 (2007)
2006
10EESintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon: Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. ICIP 2006: 2313-2316
9 Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Identifying Digital Cameras Using CFA Interpolation. IFIP Int. Conf. Digital Forensics 2006: 289-299
8EEHusrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu: An overview of scalar quantization based data hiding methods. Signal Processing 86(5): 893-914 (2006)
7EEMehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. T. Data Hiding and Multimedia Security: 123-137 (2006)
2005
6EEHusrev T. Sencar, Nasir D. Memon: Watermarking and ownership problem: a revisit. Digital Rights Management Workshop 2005: 93-101
5EESevinc Bayram, Husrev T. Sencar, Nasir D. Memon, Ismail Avcibas: Source camera identification based on CFA interpolation. ICIP (3) 2005: 69-72
4EEYagiz Sutcu, Husrev T. Sencar, Nasir D. Memon: A secure biometric authentication scheme based on robust hashing. MM&Sec 2005: 111-116
3 Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Benchmarking steganographic and steganalysis techniques. Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263
2004
2EEMehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Blind source camera identification. ICIP 2004: 709-712
2003
1 Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu: A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques. ICIP (2) 2003: 507-510

Coauthor Index

1Ali N. Akansu [1] [8] [11]
2Ismail Avcibas [5]
3Sevinc Bayram [5] [9] [14] [15] [19] [20]
4Baris Coskun [16]
5Sintayehu Dehnie [10] [17]
6Ahmet Emir Dirik [15] [18]
7Mehdi Kharrazi [2] [3] [7]
8Qiming Li [13]
9Nasir D. Memon [2] [3] [4] [5] [6] [7] [9] [10] [12] [13] [14] [15] [16] [17] [18] [19] [20]
10Mahalingam Ramkumar [1] [8] [11]
11Amol Sukerkar [11]
12Yagiz Sutcu [4] [14] [16]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)