2008 |
20 | EE | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Video copy detection based on source device characteristics: a complementary approach to content-based methods.
Multimedia Information Retrieval 2008: 435-442 |
19 | EE | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Classification of digital camera-models based on demosaicing artifacts.
Digital Investigation 5(1-2): 49-59 (2008) |
18 | EE | Ahmet Emir Dirik,
Husrev T. Sencar,
Nasir D. Memon:
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust.
IEEE Transactions on Information Forensics and Security 3(3): 539-552 (2008) |
2007 |
17 | EE | Sintayehu Dehnie,
Husrev T. Sencar,
Nasir D. Memon:
Detecting Malicious Behavior in Cooperative Diversity.
CISS 2007: 895-899 |
16 | EE | Yagiz Sutcu,
Baris Coskun,
Husrev T. Sencar,
Nasir D. Memon:
Tamper Detection Based on Regularity of Wavelet Transform Coefficients.
ICIP (1) 2007: 397-400 |
15 | EE | Ahmet Emir Dirik,
Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
New Features to Identify Computer Generated Images.
ICIP (4) 2007: 433-436 |
14 | EE | Yagiz Sutcu,
Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Improvements on Sensor Noise Based Source Camera Identification.
ICME 2007: 24-27 |
13 | EE | Husrev T. Sencar,
Qiming Li,
Nasir D. Memon:
A new approach to countering ambiguity attacks.
MM&Sec 2007: 205-214 |
12 | EE | Husrev T. Sencar,
Nasir D. Memon:
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks.
IEEE Transactions on Information Forensics and Security 2(4): 664-682 (2007) |
11 | EE | Husrev T. Sencar,
Mahalingam Ramkumar,
Ali N. Akansu,
Amol Sukerkar:
Improved utilization of embedding distortion in scalar quantization based data hiding techniques.
Signal Processing 87(5): 877-890 (2007) |
2006 |
10 | EE | Sintayehu Dehnie,
Husrev T. Sencar,
Nasir D. Memon:
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images.
ICIP 2006: 2313-2316 |
9 | | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Identifying Digital Cameras Using CFA Interpolation.
IFIP Int. Conf. Digital Forensics 2006: 289-299 |
8 | EE | Husrev T. Sencar,
Mahalingam Ramkumar,
Ali N. Akansu:
An overview of scalar quantization based data hiding methods.
Signal Processing 86(5): 893-914 (2006) |
7 | EE | Mehdi Kharrazi,
Husrev T. Sencar,
Nasir D. Memon:
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography.
T. Data Hiding and Multimedia Security: 123-137 (2006) |
2005 |
6 | EE | Husrev T. Sencar,
Nasir D. Memon:
Watermarking and ownership problem: a revisit.
Digital Rights Management Workshop 2005: 93-101 |
5 | EE | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon,
Ismail Avcibas:
Source camera identification based on CFA interpolation.
ICIP (3) 2005: 69-72 |
4 | EE | Yagiz Sutcu,
Husrev T. Sencar,
Nasir D. Memon:
A secure biometric authentication scheme based on robust hashing.
MM&Sec 2005: 111-116 |
3 | | Mehdi Kharrazi,
Husrev T. Sencar,
Nasir D. Memon:
Benchmarking steganographic and steganalysis techniques.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263 |
2004 |
2 | EE | Mehdi Kharrazi,
Husrev T. Sencar,
Nasir D. Memon:
Blind source camera identification.
ICIP 2004: 709-712 |
2003 |
1 | | Husrev T. Sencar,
Mahalingam Ramkumar,
Ali N. Akansu:
A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques.
ICIP (2) 2003: 507-510 |