Search the dblp DataBase
Rajarathnam Chandramouli :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mohamed A. Haleem , Chetan Nanjunda Mathur , Rajarathnam Chandramouli , K. P. Subbalakshmi On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:448-458 [Conf ] Rajarathnam Chandramouli On information hiding with incomplete information about steganalysis. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:1161-1164 [Conf ] Rajarathnam Chandramouli , Nasir D. Memon Analysis of LSB based image steganography techniques. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2001, pp:1019-1022 [Conf ] Siva Somasundaram , Rajarathnam Chandramouli Waterfilling: a connection between information theoretic and perceptually based watermarking. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2002, pp:485-488 [Conf ] Guilin Chen , Byung-Tae Kang , Mahmut T. Kandemir , Narayanan Vijaykrishnan , Mary Jane Irwin , Rajarathnam Chandramouli Energy-Aware Compilation and Execution in Java-Enabled Mobile Devices. [Citation Graph (0, 0)][DBLP ] IPDPS, 2003, pp:34- [Conf ] Chandramouli Rajarathnam Web search steganalysis: some challenges and approaches. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 2004, pp:576-579 [Conf ] Rajarathnam Chandramouli , Nasir D. Memon How Many Pixels to Watermark? [Citation Graph (0, 0)][DBLP ] ITCC, 2000, pp:11-15 [Conf ] Rajarathnam Chandramouli , Mehdi Kharrazi , Nasir D. Memon Image Steganography and Steganalysis: Concepts and Practice. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:35-49 [Conf ] Rajarathnam Chandramouli , Nasir D. Memon A distributed detection framework for Steganalysis. [Citation Graph (0, 0)][DBLP ] ACM Multimedia Workshops, 2000, pp:123-126 [Conf ] Rajarathnam Chandramouli On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:590-594 [Conf ] Rajarathnam Chandramouli , Shalin P. Trivedi , R. N. Uma On the complexity and hardness of the steganography embedding problem. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:496-500 [Conf ] Shalin P. Trivedi , Rajarathnam Chandramouli Locally most-powerful detector for secret key estimation in spread spectrum image steganography. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:1-12 [Conf ] Rajarathnam Chandramouli Learning through Multimedia Interaction. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2006, v:13, n:1, pp:84-85 [Journal ] Rajarathnam Chandramouli A mathematical framework for active steganalysis. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:3, pp:303-311 [Journal ] Rajarathnam Chandramouli , S. Bapatla , K. P. Subbalakshmi , R. N. Uma Battery power-aware encryption. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:162-180 [Journal ] Guangyu Chen , Byung-Tae Kang , Mahmut T. Kandemir , Narayanan Vijaykrishnan , Mary Jane Irwin , Rajarathnam Chandramouli Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:9, pp:795-809 [Journal ] Hafiz Malik , K. P. Subbalakshmi , Rajarathnam Chandramouli Steganalysis of GIM-based data hiding using kernel density estimation. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:149-160 [Conf ] Aruna Ambalavanan , Rajarathnam Chandramouli A Bayesian image steganalysis approach to estimate the embedded secret message. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2005, pp:33-38 [Conf ] Mohamed A. Haleem , Chetan Nanjunda Mathur , Rajarathnam Chandramouli , K. P. Subbalakshmi Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:313-324 [Journal ] Yiping Xing , Chetan Nanjunda Mathur , Mohamed A. Haleem , Rajarathnam Chandramouli , K. P. Subbalakshmi Dynamic Spectrum Access with QoS and Interference Temperature Constraints. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:4, pp:423-433 [Journal ] Decentralized Learning for Pricing a RED Buffer. [Citation Graph (, )][DBLP ] An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks. [Citation Graph (, )][DBLP ] Gender identification from E-mails. [Citation Graph (, )][DBLP ] Impact of Constraints on the Complexity of Dynamic Spectrum Assignment. [Citation Graph (, )][DBLP ] A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks. [Citation Graph (, )][DBLP ] Current trends in steganalysis: a critical survey. [Citation Graph (, )][DBLP ] Search in 0.024secs, Finished in 0.025secs