Deepa Kundur

Orcid: 0000-0001-5999-1847

According to our database1, Deepa Kundur authored at least 189 papers between 1996 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to signal processing techniques for multimedia and cyber security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024

On the Use of Reinforcement Learning for Attacking and Defending Load Frequency Control.
IEEE Trans. Smart Grid, May, 2024

A Deep Time Delay Filter for Cooperative Adaptive Cruise Control.
ACM Trans. Cyber Phys. Syst., April, 2024

A Novel Approach to Classify Power Quality Signals Using Vision Transformers.
CoRR, 2024

Enhancing Power Quality Event Classification with AI Transformer Models.
CoRR, 2024

A Survey on Cyber-Physical Security of Active Distribution Networks in Smart Grids.
IEEE Access, 2024

Analysis of Data-Driven Detection and Localization of Cyberattacks on Faulty Electric Vehicle Platoons.
Proceedings of the IEEE International Conference on Smart Mobility, 2024

Prediction of Relapse in Adolescent Depression using Fusion of Video and Speech Data (short paper).
Proceedings of Machine Learning for Cognitive and Mental Health Workshop (ML4CMH 2024) Co-located with the Thirty-Eighth AAAI Conference on Artificial Intelligence (AAAI 2024), 2024

2023
Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., October, 2023

Identification of a class of precision motion systems with uncertain hysteretic nonlinearities.
Int. J. Control, August, 2023

Mitigation of Cyber-Attacks on Wide-Area Under-Frequency Load-Shedding Schemes.
IEEE Trans. Smart Grid, May, 2023

On the Use of Safety Critical Control for Cyber-Physical Security in the Smart Grid.
CoRR, 2023

A Probabilistic Approach to Adaptive Protection in the Smart Grid.
CoRR, 2023

Multi-Head Attention Machine Learning for Fault Classification in Mixed Autonomous and Human-Driven Vehicle Platoons.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Reinforcement Learning for Supply Chain Attacks Against Frequency and Voltage Control.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Protection of Power System State Estimation against False Data Injection Attacks.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

Mitigation of Denial of Service and Time Delay Attacks on the Automatic Generation Control of Power Systems.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

2022
Transmissibility-Based Health Monitoring of the Future Connected Autonomous Vehicles Networks.
IEEE Trans. Veh. Technol., 2022

Dynamic-Line-Rating-Based Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objectives.
IEEE Internet Things J., 2022

Integrity of Multimedia and Multimodal Data: From Capture to Use.
IEEE Multim., 2022

Hybrid Approach for Stabilizing Large Time Delays in Cooperative Adaptive Cruise Control with Reduced Performance Penalties.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

2021
False Data Injection Attacks Against Synchronization Systems in Microgrids.
IEEE Trans. Smart Grid, 2021

A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays.
IEEE Trans. Smart Grid, 2021

Vulnerability of Connected Autonomous Vehicles Networks to Periodic Time-Varying Communication Delays of Certain Frequency.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

Towards cyber-resilient telecontrol commands using software-defined networking.
Proceedings of the MSCPES@CPSIoTWeek '21: Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, Virtual Event, May 19, 2021

Health Monitoring of Mixed Autonomous and Human-driven Vehicle Platoon using Transmissibility Identification.
Proceedings of the 2021 American Control Conference, 2021

2020
A User-centric Approach toward Resilient Frequency-regulating Wind Generators.
ACM Trans. Cyber Phys. Syst., 2020

Implicit Feedback Deep Collaborative Filtering Product Recommendation System.
CoRR, 2020

Output-Only Fault Detection and Mitigation of Networks of Autonomous Vehicles.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

Fault Detection, Localization, and Mitigation of a Network of Connected Autonomous Vehicles Using Transmissibility Identification.
Proceedings of the 2020 American Control Conference, 2020

2019
Hierarchical Signal Processing for Tractable Power Flow Management in Electric Grid Networks.
IEEE Trans. Signal Inf. Process. over Networks, 2019

Financially Motivated FDI on SCED in Real-Time Electricity Markets: Attacks and Mitigation.
IEEE Trans. Smart Grid, 2019

On Effective Virtual Inertia of Storage-Based Distributed Control for Transient Stability.
IEEE Trans. Smart Grid, 2019

Mitigating Attacks With Nonlinear Dynamics on Actuators in Cyber-Physical Mechatronic Systems.
IEEE Trans. Ind. Informatics, 2019

On Cyber-Physical Coupling and Distributed Control in Smart Grids.
IEEE Trans. Ind. Informatics, 2019

Intelligent Signal Processing and Coordination for the Adaptive Smart Grid: An Overview of Data-Driven Grid Management.
IEEE Signal Process. Mag., 2019

Flocking-based adaptive granular control strategy for autonomous microgrids in emergency situations.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Identification of Android malware using refined system calls.
Concurr. Comput. Pract. Exp., 2019

Transient Model-Based Detection Scheme for False Data Injection Attacks in Microgrids.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Preventing False Tripping Cyberattacks Against Distance Relays: A Deep Learning Approach.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Modeling and Simulation of the Aurora Attack on Microgrid Point of Common Coupling.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

Identification of Hammerstein Systems with Rate-Dependent Hysteresis Nonlinearities in a Class of Smart Material-Based Actuators.
Proceedings of the 2019 American Control Conference, 2019

2018
A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability.
IEEE Trans. Signal Inf. Process. over Networks, 2018

A Class of Switching Exploits Based on Inter-Area Oscillations.
IEEE Trans. Smart Grid, 2018

A Cyber-Physical Control Framework for Transient Stability in Smart Grids.
IEEE Trans. Smart Grid, 2018

A Storage-Based Multiagent Regulation Framework for Smart Grid Resilience.
IEEE Trans. Ind. Informatics, 2018

Reactance Perturbation for Detecting and Identifying FDI Attacks in Power System State Estimation.
IEEE J. Sel. Top. Signal Process., 2018

Introduction to the Issue on Signal and Information Processing for Critical Infrastructures.
IEEE J. Sel. Top. Signal Process., 2018

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018

Online Power Quality Disturbance Classification with Recurrent Neural Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Identification of Piezomicropositioning Hammerstein Systems with Generalized Prandtl-Ishlinskii Hysteresis Nonlinearities.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Delay in Chaum's Anonymizing Mix Networks.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

Identification of Precision Motion Systems with Prandtl-Ishlinskii Hysteresis Nonlinearities.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Resilient Distributed Real-Time Demand Response via Population Games.
IEEE Trans. Smart Grid, 2017

A Game Theoretic Approach to Real-Time Robust Distributed Generation Dispatch.
IEEE Trans. Ind. Informatics, 2017

On the Impact of Cyber Attacks on Data Integrity in Storage-Based Transient Stability Control.
IEEE Trans. Ind. Informatics, 2017

On the Use of Energy Storage Systems and Linear Feedback Optimal Control for Transient Stability.
IEEE Trans. Ind. Informatics, 2017

Fundamental limits on communication latency for distributed control via electromechanical waves.
Proceedings of the IEEE International Conference on Communications, 2017

A transient stability control adaptive to measurements uncertainties.
Proceedings of the IEEE International Conference on Communications, 2017

Simplified implementation and control of a flywheel energy system for microgrid applications.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Reactance perturbation for enhancing detection of FDI attacks in power system state estimation.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

IEC-61850 GOOSE traffic modeling and generation.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Impact of Cyber Attacks on Data Integrity in Transient Stability Control.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Performance Metrics for Storage-Based Transient Stability Control.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

2016
GOAliE: Goal-Seeking Obstacle and Collision Evasion for Resilient Multicast Routing in Smart Grid.
IEEE Trans. Smart Grid, 2016

A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis.
IEEE Trans. Smart Grid, 2016

A Cyber-Enabled Stabilizing Control Scheme for Resilient Smart Grid Systems.
IEEE Trans. Smart Grid, 2016

A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems.
IEEE Trans. Smart Grid, 2016

Noise Suppression of Corona Current Measurement From HVdc Transmission Lines.
IEEE Trans. Instrum. Meas., 2016

Mitigating link insecurities in smart grids via QoS multi-constraint routing.
Proceedings of the IEEE International Conference on Communication, 2016

Implementation of an Offline Co-Simulation Test-Bed for Cyber Security and Control Verification.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Enhancing the performance of controlled distributed energy resources in noisy communication environments.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

Control verification via off-line co-simulation.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

Communication Links Vulnerability Model for Cyber Security Mitigation.
Proceedings of the Ad Hoc Networks - 8th International Conference, 2016

2015
A Novel Bio-Inspired Technique for Rapid Real-Time Generator Coherency Identification.
IEEE Trans. Smart Grid, 2015

Distributed Optimization of Dispatch in Sustainable Generation Systems via Dual Decomposition.
IEEE Trans. Smart Grid, 2015

On the Use of Matroid Theory for Distributed Cyber-Physical-Constrained Generator Scheduling in Smart Grid.
IEEE Trans. Ind. Electron., 2015

A generalized design framework for IIR digital multiple notch filters.
EURASIP J. Adv. Signal Process., 2015

Distributed demand curtailment via water-filling.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Secure operating region simplification in dynamic security assessment.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Tuning out of phase: Resonance attacks.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

A systematic approach to delay-adaptive control design for smart grids.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

On using distributed energy resources to reshape the dynamics of power systems during transients.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Denial of service attacks and mitigation for stability in cyber-enabled power grid.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Distributed sustainable generation dispatch via evolutionary games.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Grid-independent cooperative microgrid networks with high renewable penetration.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

On using energy storage systems in switching attacks that destabilize smart grid systems.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

A cyber-enabled stabilizing controller for resilient smart grid systems.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Cooperative microgrid networks for remote and rural areas.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

On using distributed control schemes to mitigate switching attacks in smart grids.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
A Flocking-Based Paradigm for Hierarchical Cyber-Physical Smart Grid Modeling and Control.
IEEE Trans. Smart Grid, 2014

A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid.
IEEE Trans. Smart Grid, 2014

Performance evaluation of flocking-based distributed cyber-physical control for Smart Grid.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

A game-theoretic control approach to mitigate cyber switching attacks in Smart Grid systems.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Distributed power dispatch via bifurcation control.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Cyber attack detection in PMU measurements via the expectation-maximization algorithm.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Performance of flocking-based control schemes in smart grid applications.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

Partition based cascaded generator scheduling with constraints for large power networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Probing the telltale physics: Towards a cyber-physical protocol to mitigate information corruption in smart grid systems.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Coordinated variable structure switching attack in the presence of model error and state estimation.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Coordinated variable structure switching in smart power systems: attacks and mitigation.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

A flocking-based model for DoS-resilient communication routing in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

On the use of cyber-physical hierarchy for smart grid security and efficient control.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

Bloom filter based intrusion detection for smart grid SCADA.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

A distortion-theoretic perspective for redundant metering security in a smart grid.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Towards modelling the impact of cyber attacks on a smart grid.
Int. J. Secur. Networks, 2011

Preventative steganalysis in wireless visual sensor networks: Challenges and solutions.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Improving the visual performance of S/DISCUS.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

A class of cyber-physical switching attacks for power system disruption.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Advances In Peer-To-Peer Content Search.
J. Signal Process. Syst., 2010

Security-aware routing and localization for a directional mission critical network.
IEEE J. Sel. Areas Commun., 2010

2009
On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks.
IEEE Trans. Mob. Comput., 2009

A hypothesis testing approach to semifragile watermark-based authentication.
IEEE Trans. Inf. Forensics Secur., 2009

Wireless image sensor networks: event acquisition in attack-prone and uncertain environments.
Multidimens. Syst. Signal Process., 2009

Enhancing Privacy Protection in Multimedia Systems.
EURASIP J. Inf. Secur., 2009

Vector Field Driven Design for Lightweight Signal Processing and Control Schemes for Autonomous Robotic Navigation.
EURASIP J. Adv. Signal Process., 2009

Secure semi-fragilewatermarking for image authentication.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2008
Multimedia Fingerprinting.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Multimedia Sensor Networks.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration.
IEEE Trans. Multim., 2008

Distributed Secret Sharing for Discrete Memoryless Networks.
IEEE Trans. Inf. Forensics Secur., 2008

Security and Privacy for Distributed Multimedia Sensor Networks.
Proc. IEEE, 2008

Secure distributed source coding with side-information.
IEEE Commun. Lett., 2008

Coordination and Selfishness in Attacks on Visual Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Event-Driven Visual Sensor Networks: Issues in Reliability.
Proceedings of the 9th IEEE Workshop on Applications of Computer Vision (WACV 2008), 2008

A bio-inspired analog scheme for navigational control of lightweight autonomous agents.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

On privacy and security in distributed visual sensor networks.
Proceedings of the International Conference on Image Processing, 2008

Reliable Scalar-Visual Event-Detection in Wireless Visual Sensor Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems.
EURASIP J. Adv. Signal Process., 2007

Visual Sensor Networks.
EURASIP J. Adv. Signal Process., 2007

Towards characterizing the effectiveness of random mobility against actuation attacks.
Comput. Commun., 2007

On the Connectivity of Hierarchical Directional Optical Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

On node isolation in directional sensor networks.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Distributed keyless security for correlated data with applications in visual sensor networks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Towards digital video steganalysis using asymptotic memoryless detection.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Attack vs. failure detection in event-driven wireless visual sensor networks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks.
Proceedings of the Global Communications Conference, 2007

Distributed Keyless Secret Sharing Over Noiseless Channels.
Proceedings of the Global Communications Conference, 2007

Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments.
Proceedings of the Global Communications Conference, 2007

2006
Multimedia Fingerprinting.
Proceedings of the Encyclopedia of Multimedia, 2006

Multimedia Sensor Networks.
Proceedings of the Encyclopedia of Multimedia, 2006

Analysis and design of secure watermark-based authentication systems.
IEEE Trans. Inf. Forensics Secur., 2006

Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain.
IEEE Trans. Inf. Forensics Secur., 2006

A hypothesis testing approach for achieving semi-fragility in multimedia authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

On Peer-to-Peer Multimedia Content Access and Distribution.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance.
IEEE Trans. Multim., 2005

Statistical invisibility for collusion-resistant digital video watermarking.
IEEE Trans. Multim., 2005

New paradigms for effective multicasting and fingerprinting of entertainment media.
IEEE Commun. Mag., 2005

Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Efficient routing protocols for a free space optical sensor network.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

2004
Toward robust logo watermarking using multiresolution image fusion principles.
IEEE Trans. Multim., 2004

Dual domain watermarking for authentication and compression of cultural heritage image.
IEEE Trans. Image Process., 2004

Analysis and design of watermarking algorithms for improved resistance to compression.
IEEE Trans. Image Process., 2004

Robust digital watermarking in the ridgelet domain.
IEEE Signal Process. Lett., 2004

Special Issue on Enabling Security Technologies for Digital Rights Management.
Proc. IEEE, 2004

Video Fingerprinting and Encryption Principles for Digital Rights Management.
Proc. IEEE, 2004

Analysis and design of authentication watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

A stenographic framework for dual authentication and compression of high resolution imagery.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

2003
Hardware implementation perspectives of digital video watermarking algorithms.
IEEE Trans. Signal Process., 2003

VLSI implementation of a real-time video watermark embedder and detector.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding.
EURASIP J. Adv. Signal Process., 2002

Novel approach to collusion-resistant video watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Hiding-based compression for improved color image coding.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2001
Diversity and attack characterization for improved robust watermarking.
IEEE Trans. Signal Process., 2001

Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era.
IEEE Multim., 2001

Watermarking with Diversity: Insights and Implications.
IEEE Multim., 2001

The Choice of Watermark Domain in the Presence of Compression.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Robust classification of blurred imagery.
IEEE Trans. Image Process., 2000

Implications for High Capacity Data Hiding in Presence of Lossy Compression.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Water-Filling for Watermarking?
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Energy Allocation for High-Capacity Watermarking in the Presence of Compression.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Digital watermarking for telltale tamper proofing and authentication.
Proc. IEEE, 1999

Attack Characterization for Effective Watermarking.
Proceedings of the 1999 International Conference on Image Processing, 1999

1998
On the use of Lyapunov criteria to analyze the convergence of blind deconvolution algorithms.
IEEE Trans. Signal Process., 1998

A novel blind deconvolution scheme for image restoration using recursive filtering.
IEEE Trans. Signal Process., 1998

Towards a Telltale Watermarking Technique for Tamper-Proofing.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Digital watermarking using multiresolution wavelet decomposition.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

1997
A novel approach to robust blind classification of remote sensing imagery.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
Blind image deconvolution revisited.
IEEE Signal Process. Mag., 1996

Blind image deconvolution.
IEEE Signal Process. Mag., 1996

On the global asymptotic stability of the NAS-RIF algorithm for blind image restoration.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Blind image restoration via recursive filtering using deterministic constraints.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996


  Loading...