Kannan Karthik
According to our database1,
Kannan Karthik
authored at least 22 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
EURASIP J. Inf. Secur., December, 2023
2021
2020
Face anti-spoofing by identity masking using random walk patterns and outlier detection.
Pattern Anal. Appl., 2020
Correction of complex purple fringing by green-channel compensation and local luminance adaptation.
IET Image Process., 2020
2019
Proceedings of the Pattern Recognition and Machine Intelligence, 2019
2018
Signal Image Video Process., 2018
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018
2017
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017
Proceedings of the Ninth International Conference on Advances in Pattern Recognition, 2017
2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Detection of purple fringing aberration patterns and its application to forensic analysis of spliced images.
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2013
Signal Image Video Process., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs.
Pattern Recognit., 2012
2010
MIX-SPLIT: Controlled mixing of secrets and traceable pseudonym generation using codebooks.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
2007
Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection.
Int. J. Netw. Secur., 2007
A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2004
Proc. IEEE, 2004