The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rajarathnam Chandramouli: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
    On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:448-458 [Conf]
  2. Rajarathnam Chandramouli
    On information hiding with incomplete information about steganalysis. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:1161-1164 [Conf]
  3. Rajarathnam Chandramouli, Nasir D. Memon
    Analysis of LSB based image steganography techniques. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:1019-1022 [Conf]
  4. Siva Somasundaram, Rajarathnam Chandramouli
    Waterfilling: a connection between information theoretic and perceptually based watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2002, pp:485-488 [Conf]
  5. Guilin Chen, Byung-Tae Kang, Mahmut T. Kandemir, Narayanan Vijaykrishnan, Mary Jane Irwin, Rajarathnam Chandramouli
    Energy-Aware Compilation and Execution in Java-Enabled Mobile Devices. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:34- [Conf]
  6. Chandramouli Rajarathnam
    Web search steganalysis: some challenges and approaches. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:576-579 [Conf]
  7. Rajarathnam Chandramouli, Nasir D. Memon
    How Many Pixels to Watermark? [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:11-15 [Conf]
  8. Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon
    Image Steganography and Steganalysis: Concepts and Practice. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:35-49 [Conf]
  9. Rajarathnam Chandramouli, Nasir D. Memon
    A distributed detection framework for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia Workshops, 2000, pp:123-126 [Conf]
  10. Rajarathnam Chandramouli
    On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:590-594 [Conf]
  11. Rajarathnam Chandramouli, Shalin P. Trivedi, R. N. Uma
    On the complexity and hardness of the steganography embedding problem. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:496-500 [Conf]
  12. Shalin P. Trivedi, Rajarathnam Chandramouli
    Locally most-powerful detector for secret key estimation in spread spectrum image steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:1-12 [Conf]
  13. Rajarathnam Chandramouli
    Learning through Multimedia Interaction. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2006, v:13, n:1, pp:84-85 [Journal]
  14. Rajarathnam Chandramouli
    A mathematical framework for active steganalysis. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:303-311 [Journal]
  15. Rajarathnam Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma
    Battery power-aware encryption. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:162-180 [Journal]
  16. Guangyu Chen, Byung-Tae Kang, Mahmut T. Kandemir, Narayanan Vijaykrishnan, Mary Jane Irwin, Rajarathnam Chandramouli
    Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:9, pp:795-809 [Journal]
  17. Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli
    Steganalysis of GIM-based data hiding using kernel density estimation. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:149-160 [Conf]
  18. Aruna Ambalavanan, Rajarathnam Chandramouli
    A Bayesian image steganalysis approach to estimate the embedded secret message. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:33-38 [Conf]
  19. Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
    Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:313-324 [Journal]
  20. Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi
    Dynamic Spectrum Access with QoS and Interference Temperature Constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:4, pp:423-433 [Journal]

  21. Decentralized Learning for Pricing a RED Buffer. [Citation Graph (, )][DBLP]


  22. An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks. [Citation Graph (, )][DBLP]


  23. Gender identification from E-mails. [Citation Graph (, )][DBLP]


  24. Impact of Constraints on the Complexity of Dynamic Spectrum Assignment. [Citation Graph (, )][DBLP]


  25. A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks. [Citation Graph (, )][DBLP]


  26. Current trends in steganalysis: a critical survey. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002