The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Deepa Kundur: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Deepa Kundur
    Energy Allocation for High-Capacity Watermarking in the Presence of Compression. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  2. Deepa Kundur, Dimitrios Hatzinakos
    A Robust Digital Image Watermarking Scheme Using the Wavelet-Based Fusion. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1997, pp:544-547 [Conf]
  3. Deepa Kundur, Dimitrios Hatzinakos
    Towards a Telltale Watermarking Technique for Tamper-Proofing. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1998, pp:409-413 [Conf]
  4. Deepa Kundur, Dimitrios Hatzinakos
    Attack Characterization for Effective Watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1999, pp:240-244 [Conf]
  5. Deepa Kundur, Dimitrios Hatzinakos, Henry Leung
    A novel approach to robust blind classification of remote sensing imagery. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1997, pp:130-133 [Conf]
  6. Karen Su, Deepa Kundur, Dimitrios Hatzinakos
    A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2001, pp:818-821 [Conf]
  7. Deepa Kundur
    Water-Filling for Watermarking? [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (III), 2000, pp:1287-1290 [Conf]
  8. Nebu John Muthui, Ali Sheikholeslami, Deepa Kundur
    VLSI implementation of a real-time video watermark embedder and detector. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:772-775 [Conf]
  9. Deepa Kundur, Yang Zhao, Patrizio Campisi
    A stenographic framework for dual authentication and compression of high resolution imagery. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:1-4 [Conf]
  10. Chuhong Fei, Deepa Kundur, Raymond H. Kwong
    The Choice of Watermark Domain in the Presence of Compression. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:79-84 [Conf]
  11. Deepa Kundur
    Implications for High Capacity Data Hiding in Presence of Lossy Compression. [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:16-21 [Conf]
  12. Chuhong Fei, Deepa Kundur, Raymond H. Kwong
    Analysis and design of authentication watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:760-771 [Conf]
  13. Chuhong Fei, Deepa Kundur, Raymond H. Kwong
    Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:697-708 [Conf]
  14. Deepa Kundur, Unoma Ndili Okorafor, William Luh
    HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:267-270 [Conf]
  15. Deepa Kundur
    Watermarking with Diversity: Insights and Implications. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:4, pp:46-52 [Journal]
  16. Hong-heather Yu, Deepa Kundur, Ching-Yung Lin
    Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:3, pp:8-12 [Journal]
  17. Deepa Kundur, Kannan Karthik
    Video Fingerprinting and Encryption Principles for Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    Proceedings of the IEEE, 2004, v:92, n:6, pp:918-932 [Journal]
  18. Deepa Kundur, Ching-Yung Lin, Benoit M. Macq, Hong-heather Yu
    Special Issue on Enabling Security Technologies for Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    Proceedings of the IEEE, 2004, v:92, n:6, pp:879-882 [Journal]
  19. Chuhong Fei, Deepa Kundur, Raymond H. Kwong
    Analysis and design of watermarking algorithms for improved resistance to compression. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2004, v:13, n:2, pp:126-144 [Journal]
  20. Deepa Kundur, Dimitrios Hatzinakos, Henry Leung
    Robust classification of blurred imagery. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2000, v:9, n:2, pp:243-255 [Journal]
  21. Yang Zhao, Patrizio Campisi, Deepa Kundur
    Dual domain watermarking for authentication and compression of cultural heritage image. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2004, v:13, n:3, pp:430-448 [Journal]
  22. Deepa Kundur, Dimitrios Hatzinakos
    Toward robust logo watermarking using multiresolution image fusion principles. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2004, v:6, n:1, pp:185-198 [Journal]
  23. Karen Su, Deepa Kundur, Dimitrios Hatzinakos
    Statistical invisibility for collusion-resistant digital video watermarking. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:1, pp:43-51 [Journal]
  24. Karen Su, Deepa Kundur, Dimitrios Hatzinakos
    Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:1, pp:52-66 [Journal]
  25. Alexandra Czarlinska, Deepa Kundur
    Attack vs. failure detection in event-driven wireless visual sensor networks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:215-220 [Conf]
  26. Julien S. Jainsky, Deepa Kundur, Don R. Halverson
    Towards digital video steganalysis using asymptotic memoryless detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:161-168 [Conf]
  27. William Luh, Deepa Kundur
    Distributed keyless security for correlated data with applications in visual sensor networks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:75-86 [Conf]
  28. Alexandra Czarlinska, Deepa Kundur
    Towards characterizing the effectiveness of random mobility against actuation attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:13, pp:2546-2559 [Journal]

  29. OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks. [Citation Graph (, )][DBLP]


  30. On privacy and security in distributed visual sensor networks. [Citation Graph (, )][DBLP]


  31. On Peer-to-Peer Multimedia Content Access and Distribution. [Citation Graph (, )][DBLP]


  32. Advances in Peer-to-Peer Content Search. [Citation Graph (, )][DBLP]


  33. A bio-inspired analog scheme for navigational control of lightweight autonomous agents. [Citation Graph (, )][DBLP]


  34. On node isolation in directional sensor networks. [Citation Graph (, )][DBLP]


  35. Event-Driven Visual Sensor Networks: Issues in Reliability. [Citation Graph (, )][DBLP]


  36. Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks. [Citation Graph (, )][DBLP]


  37. Distributed Keyless Secret Sharing Over Noiseless Channels. [Citation Graph (, )][DBLP]


  38. Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments. [Citation Graph (, )][DBLP]


  39. Coordination and Selfishness in Attacks on Visual Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.023secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002