Sabu Emmanuel

Orcid: 0009-0001-0035-3979

Affiliations:
  • Nanyang Technological University, Singapore


According to our database1, Sabu Emmanuel authored at least 99 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detection of Evasive Android Malware Using EigenGCN.
J. Inf. Secur. Appl., 2024

Cancelable Biometric Template Generation Using Random Feature Vector Transformations.
IEEE Access, 2024

2021
On Existence of Common Malicious System Call Codes in Android Malware Families.
IEEE Trans. Reliab., 2021

Graph based secure cancelable palm vein biometrics.
J. Inf. Secur. Appl., 2021

2020
Anti-forensics of median filtering and contrast enhancement.
J. Vis. Commun. Image Represent., 2020

A TAN based hybrid model for android malware detection.
J. Inf. Secur. Appl., 2020

GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection.
Expert Syst. Appl., 2020

2019
Joint Spatial and Discrete Cosine Transform Domain-Based Counter Forensics for Adaptive Contrast Enhancement.
IEEE Access, 2019

2018
Robust PRNU estimation from probabilistic raw measurements.
Signal Process. Image Commun., 2018

2017
Online SVM and backward model validation based visual tracking.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Forensic Analysis of Linear and Nonlinear Image Filtering Using Quantization Noise.
ACM Trans. Multim. Comput. Commun. Appl., 2016

ACE-An Effective Anti-forensic Contrast Enhancement Technique.
IEEE Signal Process. Lett., 2016

Sensor Pattern Noise Estimation Using Probabilistically Estimated RAW Values.
IEEE Signal Process. Lett., 2016

Anti-forensic technique for median filtering using L1-L2 TV model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Video forgery detection and localization using normalized cross-correlation of moment features.
Proceedings of the 2016 IEEE Southwest Symposium on Image Analysis and Interpretation, 2016

Improving SURF Based Copy-Move Forgery Detection Using Super Resolution.
Proceedings of the IEEE International Symposium on Multimedia, 2016

2015
Empirical mode decomposition based blind audio watermarking.
Multim. Tools Appl., 2015

Spatial domain quantization noise based image filtering detection.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
Visual Object Tracking Based on Backward Model Validation.
IEEE Trans. Circuits Syst. Video Technol., 2014

Moving people tracking with detection by latent semantic analysis for visual surveillance applications.
Multim. Tools Appl., 2014

Partially compressed-encrypted domain robust JPEG image watermarking.
Multim. Tools Appl., 2014

Obfuscation by code fragmentation to evade reverse engineering.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Function Level Control Flow Obfuscation for Software Security.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code.
IEEE Trans. Inf. Forensics Secur., 2013

Computation time efficient approach for licenses validation in DRM systems.
Multim. Tools Appl., 2013

Software Protection with Obfuscation and Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Visual object tracking based on appearance model selection.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Pixel estimation based video forgery detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Aggregate licenses validation for digital rights violation detection.
ACM Trans. Multim. Comput. Commun. Appl., 2012

Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption.
IEEE Trans. Multim., 2012

Robust Watermarking of Compressed and Encrypted JPEG2000 Images.
IEEE Trans. Multim., 2012

Fourier Transform-Based Scalable Image Quality Measure.
IEEE Trans. Image Process., 2012

Nonintrusive Quality Assessment of Noise Suppressed Speech With Mel-Filtered Energies and Support Vector Regression.
IEEE Trans. Speech Audio Process., 2012

Secure interoperable digital content distribution mechanisms in a multi-domain architecture.
Multim. Tools Appl., 2012

Privacy enabled video surveillance using a two state Markov tracking algorithm.
Multim. Syst., 2012

Guest editorial: Privacy-aware multimedia surveillance systems.
Multim. Syst., 2012

Multimedia in Forensics, Security, and Intelligence.
IEEE Multim., 2012

Audio watermarking in partially compressed-encrypted domain.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Video forgery detection using HOG features and compression properties.
Proceedings of the 14th IEEE International Workshop on Multimedia Signal Processing, 2012

2011
Mobile Agent Protection with Self-Modifying Code.
J. Signal Process. Syst., 2011

Robust Watermarking of Compressed JPEG Images in Encrypted Domain.
Trans. Data Hiding Multim. Secur., 2011

Guest Editorial.
J. Multim., 2011

Auto-scaled ISL tracking for region based control infrastructure and applications in video surveillance.
Comput. Syst. Sci. Eng., 2011

Rights violation detection in multi-level digital rights management system.
Comput. Secur., 2011

Software code obfuscation by hiding control flow information in stack.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Context based Watermarking of Secure JPEG-LS Images.
Proceedings of the SIGMAP 2011, 2011

Pedestrian Tracking Based on <i>Hidden-Latent</i> Temporal Markov Chain.
Proceedings of the Advances in Multimedia Modeling, 2011

Third ACM international workshop on multimedia in forensics and intelligence (MiFor 2011).
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

A privacy preserving content distribution mechanism for drm without trusted third parties.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

DRM violation detection using consumer logs analysis.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Efficient Access Control in Multimedia Social Networks.
Proceedings of the Social Media Modeling and Computing., 2011

2010
Moving People Segmentation from Zoomed Dynamic Scenes Containing a Door.
New Gener. Comput., 2010

A Geometric Approach for Efficient Licenses Validation in DRM.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

Non-intrusive Speech Quality Assessment with Support Vector Regression.
Proceedings of the Advances in Multimedia Modeling, 2010

An efficient access control method for multimedia social networks.
Proceedings of second ACM SIGMM workshop on Social media, 2010

Second ACM international workshop on multimedia in forensics, security and intelligence (MiFor 2010).
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Privacy preserving video surveillance using pedestrian tracking mechanism.
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, 2010

EMD and psychoacoustic model based watermarking for audio.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Compressed-encrypted domain JPEG2000 image watermarking.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Privacy modeling for video data publication.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Efficient Aggregate Licenses Validation in DRM.
Proceedings of the Database Systems for Advanced Applications, 2010

An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission.
Proceedings of the Seventh IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010

Functionality Delegation in Distributed Surveillance Systems.
Proceedings of the Seventh IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010

2009
Joint watermarking scheme for multiparty multilevel DRM architecture.
IEEE Trans. Inf. Forensics Secur., 2009

Secure Domain Architecture for Interoperable Content Distribution.
Proceedings of the Advances in Multimedia Information Processing, 2009

Protection of DRM Agent Codes.
Proceedings of the Advances in Multimedia Information Processing, 2009

Secure multimedia content delivery with multiparty multilevel DRM architecture.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

A CRT based watermark for multiparty multilevel DRM architecture.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Spatiotemporal latent semantic cues for moving people tracking.
Proceedings of the IEEE International Conference on Acoustics, 2009

Efficient license validation in MPML DRM architecture.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

Privacy Preserving Multiparty Multilevel DRM Architecture.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Auto-scaled Incremental Tensor Subspace Learning for Region Based Rate Control Application.
Proceedings of the Computer Vision, 2009

2008
Energy-efficient cluster-based scheme for failure management in sensor networks.
IET Commun., 2008

Spatial and temporal sampling control for visual surveillance application.
Proceedings of the IEEE International Conference on Systems, 2008

Generalized Self-healing Key Distribution Using Vector Space Access Structure.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Quality-aware GSM speech watermarking.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Zoomed Object Segmentation from Dynamic Scene Containing a Door.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Size-restricted cluster formation and cluster maintenance technique for mobile ad hoc networks.
Int. J. Netw. Manag., 2007

gpICA: A Novel Nonlinear ICA Algorithm Using Geometric Linearization.
EURASIP J. Adv. Signal Process., 2007

Intelligent Video Surveillance for Monitoring Elderly in Home Environments.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

A Cluster-Based Approach to Fault Detection and Recovery in Wireless Sensor Networks.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Identifying Source Cell Phone using Chromatic Aberration.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

A Survey on Digital Camera Image Forensic Methods.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Mask-based fingerprinting scheme for digital video broadcasting.
Multim. Tools Appl., 2006

Implementation of Low Power and High-Speed Higher Order Channel Filters for Software Radio Receivers.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

ELM for the Classification of Music Genres.
Proceedings of the Ninth International Conference on Control, 2006

2005
DASCA: A Degree and Size based Clustering Approach for Wireless Sensor Networks.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

Complexity reduction of software defined radio channelizers using filter coefficient-partitioning.
Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005

2D dimension, location and speed descriptors from surveillance video.
Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005

Model Redundancy vs. Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2005

A Reversible Watermarking Scheme for JPEG-2000 Compressed Images.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

A Finite State Transition-based Fragile Watermarking Scheme for JPEG-2000 Compressed Images.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

A Novel Framework for Multiple Creatorship Protection of Digital Movies.
Proceedings of the Digital Rights Management: Technologies, 2005

A Novel Watermarking Framework for Joint-Creatorship Protection.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

FPGA Implementation and Analyses of Cluster Maintenance Algorithms in Mobile Ad-Hoc Networks.
Proceedings of the Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, 2005

2004
A novel distributed cluster maintenance technique for high mobility ad-hoc networks.
Proceedings of the 1st IEEE International Symposium on Wireless Communication Systems, 2004

2003
A digital rights management scheme for broadcast video.
Multim. Syst., 2003

2001
Copyright Protection For Mpeg-2 Compressed Broadcast Video.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001


  Loading...