2008 |
Mathai, N J; Zourntos, T; Kundur, D Vector Field Design of Screw-Type Chaos Journal Article Fluctuations and Noise Letters, 8 (3-4), pp. L369-L379, 2008. Links | BibTeX | Tags: dyn-sys @article{MatZouKunFNL08, title = {Vector Field Design of Screw-Type Chaos}, author = {N J Mathai and T Zourntos and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MatZouKunFNL08.pdf http://dx.doi.org/10.1142/S0219477508005045}, year = {2008}, date = {2008-01-01}, journal = {Fluctuations and Noise Letters}, volume = {8}, number = {3-4}, pages = {L369-L379}, keywords = {dyn-sys}, pubstate = {published}, tppubtype = {article} } |
Czarlinska, A; Kundur, D Reliable Scalar-Visual Event-Detection in Wireless Visual Sensor Networks Inproceedings Proc. IEEE Consumer Communications & Networking Conference (CCNC) Special Session on Image/Video Processing & Wireless Sensor Networks, pp. 660-664, Las Vegas, Nevada, 2008. @inproceedings{CzaKunCCNC08, title = {Reliable Scalar-Visual Event-Detection in Wireless Visual Sensor Networks}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunCCNC08.pdf http://dx.doi.org/10.1109/ccnc08.2007.152}, year = {2008}, date = {2008-01-01}, booktitle = {Proc. IEEE Consumer Communications & Networking Conference (CCNC) Special Session on Image/Video Processing & Wireless Sensor Networks}, pages = {660-664}, address = {Las Vegas, Nevada}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Kundur, D Event-Driven Visual Sensor Networks: Issues in Reliability Inproceedings Proc. IEEE Workshop on Applications of Computer Vision (WACV), pp. 1-6, Copper Mountain Resort, 2008. @inproceedings{CzaKunWACV08, title = {Event-Driven Visual Sensor Networks: Issues in Reliability}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunWACV08.pdf http://dx.doi.org/10.1109/WACV.2008.4544039}, year = {2008}, date = {2008-01-01}, booktitle = {Proc. IEEE Workshop on Applications of Computer Vision (WACV)}, pages = {1-6}, address = {Copper Mountain Resort}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Luh, W; Okorafor, U N; Zourntos, T Security and Privacy for Distributed Multimedia Sensor Networks Journal Article Proceedings of the IEEE Special Issue on Recent Advances in Distributed Multimedia Communications, 96 (1), pp. 112-130, 2008. @article{KunLuhOkoZouProcIEEE08, title = {Security and Privacy for Distributed Multimedia Sensor Networks}, author = {D Kundur and W Luh and U N Okorafor and T Zourntos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunLuhOkoZouProcIEEE08.pdf http://dx.doi.org/10.1109/JPROC.2007.909914}, year = {2008}, date = {2008-01-01}, journal = {Proceedings of the IEEE Special Issue on Recent Advances in Distributed Multimedia Communications}, volume = {96}, number = {1}, pages = {112-130}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
2007 |
Luh, W; Kundur, D Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks Inproceedings Proc. IEEE Global Communications Conference (GLOBECOM), pp. 1637-1641, Washington, DC, 2007. Links | BibTeX | Tags: phys-layer @inproceedings{LuhKunGLOBECOM07b, title = {Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunGLOBECOM07b.pdf http://dx.doi.org/10.1109/GLOCOM.2007.315}, year = {2007}, date = {2007-11-01}, booktitle = {Proc. IEEE Global Communications Conference (GLOBECOM)}, pages = {1637-1641}, address = {Washington, DC}, keywords = {phys-layer}, pubstate = {published}, tppubtype = {inproceedings} } |
Luh, W; Kundur, D Distributed Keyless Secret Sharing over Noiseless Channels Inproceedings Proc. IEEE Global Communications Conference (GLOBECOM), pp. 44-48, Washington, DC, 2007. Links | BibTeX | Tags: phys-layer @inproceedings{LuhKunGLOBECOM07a, title = {Distributed Keyless Secret Sharing over Noiseless Channels}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunGLOBECOM07a.pdf Distributed Keyless Secret Sharing over Noiseless Channels}, year = {2007}, date = {2007-11-01}, booktitle = {Proc. IEEE Global Communications Conference (GLOBECOM)}, pages = {44-48}, address = {Washington, DC}, keywords = {phys-layer}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Luh, W; Kundur, D Attacks on Sensing in Hostile Sensor-Actuator Environments Inproceedings Proc. IEEE Global Communications Conference (GLOBECOM), pp. 1001-1005, Washington, DC, 2007. @inproceedings{CzaLuhKunGLOBECOM07, title = {Attacks on Sensing in Hostile Sensor-Actuator Environments}, author = {A Czarlinska and W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaLuhKunGLOBECOM07.pdf http://dx.doi.org/10.1109/GLOCOM.2007.193}, year = {2007}, date = {2007-11-01}, booktitle = {Proc. IEEE Global Communications Conference (GLOBECOM)}, pages = {1001-1005}, address = {Washington, DC}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Jainsky, J S; Kundur, D; Halverson, D R Towards Digital Video Steganalysis using Asymptotic Memoryless Detection Inproceedings Proc. ACM Multimedia and Security (MMSec) Workshop, pp. 161-168, Dallas, Texas, 2007. Links | BibTeX | Tags: forensics @inproceedings{JaiKunHalMMSec07, title = {Towards Digital Video Steganalysis using Asymptotic Memoryless Detection}, author = {J S Jainsky and D Kundur and D R Halverson}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/JaiKunHalMMSec07.pdf http://doi.acm.org/10.1145/1288869.1288891}, year = {2007}, date = {2007-09-01}, booktitle = {Proc. ACM Multimedia and Security (MMSec) Workshop}, pages = {161-168}, address = {Dallas, Texas}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Kundur, D Attack vs. Failure Detection in Event-Driven Wireless Visual Sensor Networks Inproceedings Proc. ACM Multimedia and Security (MMSec) Workshop, pp. 215-220, Dallas, Texas, 2007. @inproceedings{CzaKunMMSec07b, title = {Attack vs. Failure Detection in Event-Driven Wireless Visual Sensor Networks}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunMMSec07.pdf http://doi.acm.org/10.1145/1288869.1288899}, year = {2007}, date = {2007-09-01}, booktitle = {Proc. ACM Multimedia and Security (MMSec) Workshop}, pages = {215-220}, address = {Dallas, Texas}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Luh, W; Kundur, D Distributed Keyless Security for Correlated Data with Applications in Visual Sensor Networks Inproceedings Proc. ACM Multimedia and Security (MMSec) Workshop, pp. 75-86, Dallas, Texas, 2007. Links | BibTeX | Tags: mmsn, phys-layer @inproceedings{LuhKunMMSec07, title = {Distributed Keyless Security for Correlated Data with Applications in Visual Sensor Networks}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunMMSec07.pdf http://doi.acm.org/10.1145/1288869.1288881}, year = {2007}, date = {2007-09-01}, booktitle = {Proc. ACM Multimedia and Security (MMSec) Workshop}, pages = {75-86}, address = {Dallas, Texas}, keywords = {mmsn, phys-layer}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Kundur, D Towards Characterizing the Effectiveness of Random Mobility Against Actuation Attacks Journal Article Journal of Computer Communications Special Issue on Sensor and Actuator Networks, 30 (13), pp. 2546-2558, 2007. @article{CzaKunJCC07, title = {Towards Characterizing the Effectiveness of Random Mobility Against Actuation Attacks}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunJCC07.pdf http://dx.doi.org/10.1016/j.comcom.2007.05.030}, year = {2007}, date = {2007-09-01}, journal = {Journal of Computer Communications Special Issue on Sensor and Actuator Networks}, volume = {30}, number = {13}, pages = {2546-2558}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Liu, Z; Merabti, M; Yu, H H Advances in Peer-to-Peer Content Search Inproceedings Proc. IEEE International Conference on Mulitmedia and Expo (ICME), pp. 404-407, Beijing, China, 2007. @inproceedings{KunLiuMerYuICME07, title = {Advances in Peer-to-Peer Content Search}, author = {D Kundur and Z Liu and M Merabti and H H Yu}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunLiuMerYuICME07.pdf http://dx.doi.org/10.1109/ICME.2007.4284672}, year = {2007}, date = {2007-07-01}, booktitle = {Proc. IEEE International Conference on Mulitmedia and Expo (ICME)}, pages = {404-407}, address = {Beijing, China}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Okorafor, U N On the Connectivity of Hierarchical Directional Optical Sensor Networks Inproceedings Proc. IEEE Wireless Communications & Networking Conference (WCNC), pp. 11-15, Hong Kong, 2007. @inproceedings{OkoKunWCNC07b, title = {On the Connectivity of Hierarchical Directional Optical Sensor Networks}, author = {D Kundur and U N Okorafor}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunWCNC07.pdf http://dx.doi.org/10.1109/WCNC.2007.646}, year = {2007}, date = {2007-03-01}, booktitle = {Proc. IEEE Wireless Communications & Networking Conference (WCNC)}, pages = {11-15}, address = {Hong Kong}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Okorafor, U N; Kundur, D On Node Isolation in Directional Sensor Networks Inproceedings Proc. ACM Conference on Embedded Networked Sensor Systems (SenSys), pp. 433-434, Syndney, Australia, 2007. @inproceedings{OkoKunSenSys07, title = {On Node Isolation in Directional Sensor Networks}, author = {U N Okorafor and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunSenSys07.pdf http://dx.doi.org/10.1109/WCNC.2007.646}, year = {2007}, date = {2007-03-01}, booktitle = {Proc. ACM Conference on Embedded Networked Sensor Systems (SenSys)}, pages = {433-434}, address = {Syndney, Australia}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Lin, C -Y; Lu, C -S Visual Sensor Networks Journal Article EURASIP Journal on Advances in Signal Processing, 2007 , pp. Article ID 21515, 3 pages, 2007. @article{KunLinLuJASP07, title = {Visual Sensor Networks}, author = {D Kundur and C -Y Lin and C -S Lu}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunLinLuJASP07.pdf http://dx.doi.org/10.1155/2007/21515}, year = {2007}, date = {2007-01-17}, journal = {EURASIP Journal on Advances in Signal Processing}, volume = {2007}, pages = {Article ID 21515, 3 pages}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
Luh, W; Kundur, D; Zourntos, T A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems Journal Article EURASIP Journal on Advances in Signal Processing Signal Processing, 2007 (Article ID 21646), pp. 17 pages, 2007. @article{LuhKunZouJASP07, title = {A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems}, author = {W Luh and D Kundur and T Zourntos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunZouJASP07.pdf http://dx.doi.org/10.1155/2007/21646}, year = {2007}, date = {2007-01-01}, journal = {EURASIP Journal on Advances in Signal Processing Signal Processing}, volume = {2007}, number = {Article ID 21646}, pages = {17 pages}, keywords = {mmsn}, pubstate = {published}, tppubtype = {article} } |
2006 |
Luh, W; Kundur, D "Multimedia Fingerprinting, " in Encyclopedia of Multimedia Book Chapter Furht, B (Ed.): Springer, 2006, ISBN: 978-0-387-74724-8. @inbook{LuhKunEncyMM05, title = {"Multimedia Fingerprinting, " in Encyclopedia of Multimedia}, author = {W Luh and D Kundur}, editor = {B Furht}, url = {http://www.springer.com/computer/information+systems+and+applications/book/978-0-387-74724-8}, isbn = {978-0-387-74724-8}, year = {2006}, date = {2006-12-20}, publisher = {Springer}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Kundur, D; Luh, W "Multimedia Sensor Networks," in Encyclopedia of Multimedia Book Chapter Furht, B (Ed.): Springer, 2006, ISBN: 978-0-387-74724-8. @inbook{KunLuhEncyMM05, title = {"Multimedia Sensor Networks," in Encyclopedia of Multimedia}, author = {D Kundur and W Luh}, editor = {B Furht}, url = {http://www.springer.com/computer/information+systems+and+applications/book/978-0-387-74724-8}, isbn = {978-0-387-74724-8}, year = {2006}, date = {2006-12-20}, publisher = {Springer}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Kundur, D; Luh, W; Okorafor, U N HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing Inproceedings Proc. IEEE Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 267-270, Pasadenia, California, 2006. @inproceedings{KunLuhOkoIIHMSP06, title = {HoLiSTiC: Heterogeneous Lightweight Sensornets for Trusted Visual Computing}, author = {D Kundur and W Luh and U N Okorafor}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunLuhOkoIIHMSP06.pdf http://dx.doi.org/10.1109/IIH-MSP.2006.109}, year = {2006}, date = {2006-12-01}, booktitle = {Proc. IEEE Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)}, pages = {267-270}, address = {Pasadenia, California}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Budhia, U; Kundur, D; Zourntos, T Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain Journal Article IEEE Transactions on Information Forensics and Security, 1 (4), pp. 502-516, 2006. Links | BibTeX | Tags: forensics @article{BudKunZouTIFS06, title = {Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain}, author = {U Budhia and D Kundur and T Zourntos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/BudKunZouTIFS06.pdf http://dx.doi.org/10.1109/TIFS.2006.885020}, year = {2006}, date = {2006-12-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {1}, number = {4}, pages = {502-516}, keywords = {forensics}, pubstate = {published}, tppubtype = {article} } |
Okorafor, U N; Marshall, K; Kundur, D Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks Inproceedings Proc. IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 888-893, Vancouver, Canada, 2006. @inproceedings{OkoMarKunMASS06, title = {Security and Energy Considerations for Routing in Hierarchical Optical Sensor Networks}, author = {U N Okorafor and K Marshall and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoMarKunMASS06.pdf http://dx.doi.org/10.1109/MOBHOC.2006.278670}, year = {2006}, date = {2006-10-01}, booktitle = {Proc. IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS)}, pages = {888-893}, address = {Vancouver, Canada}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Okorafor, U N; Kundur, D OPSENET: A Security Enabled Routing Scheme for a System of Optical Sensor Networks Inproceedings Proc. International Conference on Broadband Communications, Networks, and Systems (BROADNETS), pp. 1-10, San Jose, California, 2006. @inproceedings{OkoKunBROADNETS06, title = {OPSENET: A Security Enabled Routing Scheme for a System of Optical Sensor Networks}, author = {U N Okorafor and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunBROADNETS06.pdf http://dx.doi.org/10.1109/BROADNETS.2006.4374297}, year = {2006}, date = {2006-10-01}, booktitle = {Proc. International Conference on Broadband Communications, Networks, and Systems (BROADNETS)}, pages = {1-10}, address = {San Jose, California}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Liu, Z; Yu, H H; Kundur, D; Merabti, M On Peer-to-Peer Multimedia Content Access and Distribution Inproceedings Proc. IEEE International Conference on Mulitmedia and Expo (ICME), pp. 557-560, Toronto, Canada, 2006. @inproceedings{LiuYuKunMerICME06, title = {On Peer-to-Peer Multimedia Content Access and Distribution}, author = {Z Liu and H H Yu and D Kundur and M Merabti}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LiuYuKunMerICME06.pdf http://dx.doi.org/10.1109/ICME.2006.262469}, year = {2006}, date = {2006-07-01}, booktitle = {Proc. IEEE International Conference on Mulitmedia and Expo (ICME)}, pages = {557-560}, address = {Toronto, Canada}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Chen, Anli Encrypted Media Aggregation in Wireless Sensor Networks 2006. Abstract | BibTeX | Tags: mmsn, MS Thesis, thesis @masterthesis{CheMERep08, title = {Encrypted Media Aggregation in Wireless Sensor Networks}, author = {Anli Chen}, year = {2006}, date = {2006-05-09}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {In historical investigation, sensors devices typically measure simple things such as humility, temperature, or pressure. This results in a fairly limited amount of data generated, even over thousands of sensors. Now, if we look ten years into the future when video capture devices will most likely be small and inexpensive, the ability to create video-based sensor networks will be possible. Previous literature has demonstrated the necessity of in-network data aggregation in order to minimize the volume of messages exchanged in the hierarchical wireless sensor networks. Nevertheless, with the severe power constraints, sensor networks are much more vulnerable to all those threats. A portion of the sensor devices may be physically captured by attackers, or even worse, the crucial elements like cluster heads and aggregators may also stimulate malicious intrusion. Sensor networks are more vulnerable than traditional communication and computation systems to security threats because of their severe power constraints. Furthermore, since crucial elements such as cluster heads and aggregators in sensor networks can often contain information of higher security level, they are more attractive to the attackers and may stimulate more malicious intrusion. Our primary objective is to develop a sufficiently secure, efficient, adaptive, and resilient mechanism for media aggregation within wireless sensor networks. After substantial investigation, we assert that one effective way to balance security with resource limitations for secure aggregation is to employ aggregation functions with the homomorphic attribute. This essentially means that aggregation can occur directly on ciphertext (i.e. encrypted media) opposed to plaintext (i.e. raw unencrypted data). We propose to adopt Statistical Disclosure Control (SDC), Secure Multiparty Computation (SMC) and Discrete Wavelet Transform (DWT) techniques to boost secure aggregation. We tailor the three methods into wireless sensor network scenario so that encrypted media can be securely aggregated. The result of this study allows the network administrator to adaptively select the most appropriate securing method that assures adequate protection according to their practical needs and environmental condition.}, keywords = {mmsn, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } In historical investigation, sensors devices typically measure simple things such as humility, temperature, or pressure. This results in a fairly limited amount of data generated, even over thousands of sensors. Now, if we look ten years into the future when video capture devices will most likely be small and inexpensive, the ability to create video-based sensor networks will be possible. Previous literature has demonstrated the necessity of in-network data aggregation in order to minimize the volume of messages exchanged in the hierarchical wireless sensor networks. Nevertheless, with the severe power constraints, sensor networks are much more vulnerable to all those threats. A portion of the sensor devices may be physically captured by attackers, or even worse, the crucial elements like cluster heads and aggregators may also stimulate malicious intrusion. Sensor networks are more vulnerable than traditional communication and computation systems to security threats because of their severe power constraints. Furthermore, since crucial elements such as cluster heads and aggregators in sensor networks can often contain information of higher security level, they are more attractive to the attackers and may stimulate more malicious intrusion. Our primary objective is to develop a sufficiently secure, efficient, adaptive, and resilient mechanism for media aggregation within wireless sensor networks. After substantial investigation, we assert that one effective way to balance security with resource limitations for secure aggregation is to employ aggregation functions with the homomorphic attribute. This essentially means that aggregation can occur directly on ciphertext (i.e. encrypted media) opposed to plaintext (i.e. raw unencrypted data). We propose to adopt Statistical Disclosure Control (SDC), Secure Multiparty Computation (SMC) and Discrete Wavelet Transform (DWT) techniques to boost secure aggregation. We tailor the three methods into wireless sensor network scenario so that encrypted media can be securely aggregated. The result of this study allows the network administrator to adaptively select the most appropriate securing method that assures adequate protection according to their practical needs and environmental condition. |
Luh, W; Kundur, D Distributed Privacy for Visual Sensor Networks via Markov Shares Inproceedings Proc. 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS), pp. 23-34, Columbia, Maryland, 2006. Links | BibTeX | Tags: mmsn, phys-layer @inproceedings{LuhKunDSSNS06, title = {Distributed Privacy for Visual Sensor Networks via Markov Shares}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunDSSNS06.pdf http://dx.doi.org/10.1109/DSSNS.2006.5}, year = {2006}, date = {2006-04-01}, booktitle = {Proc. 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS)}, pages = {23-34}, address = {Columbia, Maryland}, keywords = {mmsn, phys-layer}, pubstate = {published}, tppubtype = {inproceedings} } |
Czarlinska, A; Kundur, D Distributed Actuation Attacks in Wireless Sensor Networks: Implications and Countermeasures Inproceedings Proc. 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS), pp. 3-12, Columbia, Maryland, 2006. @inproceedings{CzaKunDSSNS06, title = {Distributed Actuation Attacks in Wireless Sensor Networks: Implications and Countermeasures}, author = {A Czarlinska and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CzaKunDSSNS06.pdf http://dx.doi.org/10.1109/DSSNS.2006.4}, year = {2006}, date = {2006-04-01}, booktitle = {Proc. 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS)}, pages = {3-12}, address = {Columbia, Maryland}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Fei, C; Kundur, D; Kwong, R Analysis and Design of Secure Watermark-based Authentication Systems Journal Article IEEE Transactions on Information Forensics and Security, 1 (1), pp. 43-55, 2006. @article{FeiKunKwoTIFS06, title = {Analysis and Design of Secure Watermark-based Authentication Systems}, author = {C Fei and D Kundur and R Kwong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoTIFS06.pdf http://dx.doi.org/10.1109/TIFS.2005.863505}, year = {2006}, date = {2006-03-01}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {1}, number = {1}, pages = {43-55}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, Chuhong Analysis and Design of Watermark-Based Multimedia Authentication Systems PhD Thesis University of Toronto, 2006. Abstract | BibTeX | Tags: drm, PhD thesis, thesis @phdthesis{FeiPhDThesis08, title = {Analysis and Design of Watermark-Based Multimedia Authentication Systems}, author = {Chuhong Fei}, year = {2006}, date = {2006-01-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Multimedia authentication techniques are required to protect the integrity and origin of digital multimedia data. In watermark-based multimedia authentication systems, a source-dependent authenticator is invisibly embedded within the protected data itself, in order to alert unacceptable distortions on the data and to authenticate the legitimate source. This thesis investigates the design and analysis of such systems. We formulate the authentication problem as error detection coding with robustness to certain types of legitimate channel noise. System performance requirements such as semi-fragility, security, key payload, embedding distortion, and algorithm complexity are all investigated in the unified framework to obtain best tradeoffs among them.In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility.In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes. In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility. In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes.}, keywords = {drm, PhD thesis, thesis}, pubstate = {published}, tppubtype = {phdthesis} } Multimedia authentication techniques are required to protect the integrity and origin of digital multimedia data. In watermark-based multimedia authentication systems, a source-dependent authenticator is invisibly embedded within the protected data itself, in order to alert unacceptable distortions on the data and to authenticate the legitimate source. This thesis investigates the design and analysis of such systems. We formulate the authentication problem as error detection coding with robustness to certain types of legitimate channel noise. System performance requirements such as semi-fragility, security, key payload, embedding distortion, and algorithm complexity are all investigated in the unified framework to obtain best tradeoffs among them.In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility.In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes. In the analysis of multimedia authentication systems, we demonstrate how lattice codes can be used to address semi-fragile requirements and embedding distortion in a practical scheme. Security against possible malicious attacks is considered at the code level, and cryptographic techniques are incorporated to construct secure codes. We propose a novel security enhancement strategy based on nested lattice codes that results in secure and efficient authentication algorithms. Unconditional security is also investigated. We provide a formal methodology using composite hypothesis testing to balance robustness and fragility objectives with respect to legitimate and illegitimate distortions that is superior to existing approaches. We show that a quantization-based watermarking scheme is more appropriate for achieving semi-fragility. In system design, we propose two practical watermark-based authentication schemes for natural images: one for uncompressed images, the other for JPEG compressed ones. Our proposed algorithms are able to distinguish incidental distortions, such as JPEG compression and image enhancement filtering, from malicious tampering such as image object removal and substitution even in a small portion of the protected images. Our algorithms are secure against an active attacker, and are able to determine the degree of distortion and its location. In addition, our proposed joint compression and authentication scheme for compressed images is able to increase compression efficiency while keeping practical robustness to mild incidental signal processing changes. Effectiveness of the proposed algorithms is demonstrated by simulations and comparison with existing schemes. |
Fei, C; Kundur, D; Kwong, R A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VIII, pp. 607220-1 - 607220-12, San Jose, California, 2006. @inproceedings{FeiKunKwoSPIE06, title = {A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication}, author = {C Fei and D Kundur and R Kwong}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE06.pdf http://dx.doi.org/10.1117/12.643502}, year = {2006}, date = {2006-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents VIII}, volume = {6072}, pages = {607220-1 - 607220-12}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2005 |
Okorafor, U N; Kundur, D Efficient Routing Protocols for a Free Space Optical Sensor Network Inproceedings Proc. IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 251-258, Washington, DC, 2005. @inproceedings{OkoKunMASS05, title = {Efficient Routing Protocols for a Free Space Optical Sensor Network}, author = {U N Okorafor and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/OkoKunMASS05.pdf http://dx.doi.org/10.1109/MAHSS.2005.1542807}, year = {2005}, date = {2005-11-01}, booktitle = {Proc. IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)}, pages = {251-258}, address = {Washington, DC}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Luh, W; Kundur, D New Paradigms for Effective Broadcasting and Fingerprinting of Entertainment Media Journal Article IEEE Communications Magazine, 43 (6), pp. 77-84, 2005. @article{LuhKunICM05, title = {New Paradigms for Effective Broadcasting and Fingerprinting of Entertainment Media}, author = {W Luh and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/LuhKunICM05.pdf http://dx.doi.org/10.1109/MCOM.2005.1452834}, year = {2005}, date = {2005-06-01}, journal = {IEEE Communications Magazine}, volume = {43}, number = {6}, pages = {77-84}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Budhia, Udit Steganalysis of Video Sequences using Collusion Sensitivity 2005. Abstract | BibTeX | Tags: forensics, MS Thesis, thesis @masterthesis{BudMSThesis05, title = {Steganalysis of Video Sequences using Collusion Sensitivity}, author = {Udit Budhia}, year = {2005}, date = {2005-05-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {In this thesis we present an effective steganalysis technique for digital video sequences based on the collusion attack. Steganalysis is the process of detecting with a high probability the presence of covert data in multimedia. Existing algorithms for steganalysis target detecting covert information in still images. When applied directly to video sequences these approaches are suboptimal. In this thesis we present methods that overcome this limitation by using redundant information present in the temporal domain to detect covert messages in the form of Gaussian watermarks. In particular we target the spread spectrum steganography method because of its widespread use. Our gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and more sophisticated pattern recognition tools. Through analysis and simulations we, evaluate the effectiveness of the video steganalysis method based on averaging based collusion scheme. Other forms of collusion attack in the form of weighted linear collusion and block-based collusion schemes have been proposed to improve the detection performance. The proposed steganalsyis methods were successful in detecting hidden watermarks bearing low SNR with high accuracy. The simulation results also show the improved performance of the proposed temporal based methods over the spatial methods. We conclude that the essence of future video steganalysis techniques lies in the exploitation of the temporal redundancy.}, keywords = {forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } In this thesis we present an effective steganalysis technique for digital video sequences based on the collusion attack. Steganalysis is the process of detecting with a high probability the presence of covert data in multimedia. Existing algorithms for steganalysis target detecting covert information in still images. When applied directly to video sequences these approaches are suboptimal. In this thesis we present methods that overcome this limitation by using redundant information present in the temporal domain to detect covert messages in the form of Gaussian watermarks. In particular we target the spread spectrum steganography method because of its widespread use. Our gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and more sophisticated pattern recognition tools. Through analysis and simulations we, evaluate the effectiveness of the video steganalysis method based on averaging based collusion scheme. Other forms of collusion attack in the form of weighted linear collusion and block-based collusion schemes have been proposed to improve the detection performance. The proposed steganalsyis methods were successful in detecting hidden watermarks bearing low SNR with high accuracy. The simulation results also show the improved performance of the proposed temporal based methods over the spatial methods. We conclude that the essence of future video steganalysis techniques lies in the exploitation of the temporal redundancy. |
Su, K; Kundur, D; Hatzinakos, D Spatially Localized Image-dependent Watermarking for Statistical Invisibility and Collusion Journal Article IEEE Transactions on Multimedia, 7 (1), pp. 52-66, 2005. @article{SuKunHatTMM05b, title = {Spatially Localized Image-dependent Watermarking for Statistical Invisibility and Collusion}, author = {K Su and D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatTMM05b.pdf http://dx.doi.org/10.1109/TMM.2004.840614}, year = {2005}, date = {2005-02-01}, journal = {IEEE Transactions on Multimedia}, volume = {7}, number = {1}, pages = {52-66}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, K; Kundur, D; Hatzinakos, D Statistical Invisibility for Collusion-resistant Digital Video Watermarking Journal Article IEEE Transactions on Multimedia, 7 (1), pp. 43-51, 2005. @article{SuKunHatTMM05b, title = {Statistical Invisibility for Collusion-resistant Digital Video Watermarking}, author = {K Su and D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatTMM05.pdf http://dx.doi.org/10.1109/TMM.2004.840617}, year = {2005}, date = {2005-02-01}, journal = {IEEE Transactions on Multimedia}, volume = {7}, number = {1}, pages = {43-51}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Achieving Computational and Unconditional Security in Authentication Watermarking: Analysis, Insights, and Algorithms Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VII, pp. 697-708, San Jose, California, 2005. @inproceedings{FeiKunKwoSPIE05, title = {Achieving Computational and Unconditional Security in Authentication Watermarking: Analysis, Insights, and Algorithms}, author = {C Fei and D Kundur and R Kwong}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE05.pdf http://dx.doi.org/10.1117/12.586388}, year = {2005}, date = {2005-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents VII}, volume = {5681}, number = {5681}, pages = {697-708}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2004 |
Luh, W; Kundur, D “Digital Media Fingerprinting: Techniques and Trends,” in Multimedia Security Handbook Book Chapter Furht, B; Kirovski, D (Ed.): pp. 577-603, CRC Press, 2004, ISBN: 9780849327735. @inbook{LuhKunMMSecHndbk04, title = {“Digital Media Fingerprinting: Techniques and Trends,” in Multimedia Security Handbook}, author = {W Luh and D Kundur}, editor = {B Furht and D Kirovski}, url = {http://www.crcpress.com/product/isbn/9780849327735}, isbn = {9780849327735}, year = {2004}, date = {2004-12-28}, pages = {577-603}, publisher = {CRC Press}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Luh, William Collusion-Resistant Fingerprinting for Multimedia in a Broadcast Channel Environment 2004. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{LuhMSThesis04, title = {Collusion-Resistant Fingerprinting for Multimedia in a Broadcast Channel Environment}, author = {William Luh}, year = {2004}, date = {2004-12-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {Digital fingerprinting is a method by which a copyright owner can uniquely embed a buyer-dependent, inconspicuous serial number (representing the fingerprint) into every copy of digital data that is legally sold. The buyer of a legal copy is then deterred from distributing further copies, because the unique fingerprint can be used to trace back the origin of the piracy. The major challenge in fingerprinting is collusion, an attack in which a coalition of pirates compare several of their uniquely fingerprinted copies for the purpose of detecting and removing the fingerprints. The contributions of this thesis are two-fold. First, this thesis motivates the need for robustness against large coalitions of pirates by introducing the concept of a malicious distributor that has been overlooked in prior work. A novel fingerprinting code that has superior codeword length in comparison to existing work under this novel malicious distributor scenario, is developed. In addition, ideas presented in the proposed ¯ngerprinting design can easily be applied to existing fingerprinting schemes, making them more robust to collusion attacks. Second, a new framework termed Joint Source Fingerprinting that integrates the processes of watermarking and codebook design is introduced. The need for this new paradigm is motivated by the fact that existing ¯ngerprinting methods result in a perceptually undistorted multimedia after collusion is applied. In contrast, the new paradigm equates the process of collusion amongst a coalition of pirates, to degrading the perceptual characteristics, and hence commercial value of the multimedia in ques- tion. Thus by enforcing that the process of collusion diminishes the commercial value of the content, the pirates are deterred from attacking the ¯ngerprints. A ¯ngerprint- ing algorithm for video as well as an e±cient means of broadcasting or distributing ¯ngerprinted video is also presented. Simulation results are provided to verify our theoretical and empirical observations.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Digital fingerprinting is a method by which a copyright owner can uniquely embed a buyer-dependent, inconspicuous serial number (representing the fingerprint) into every copy of digital data that is legally sold. The buyer of a legal copy is then deterred from distributing further copies, because the unique fingerprint can be used to trace back the origin of the piracy. The major challenge in fingerprinting is collusion, an attack in which a coalition of pirates compare several of their uniquely fingerprinted copies for the purpose of detecting and removing the fingerprints. The contributions of this thesis are two-fold. First, this thesis motivates the need for robustness against large coalitions of pirates by introducing the concept of a malicious distributor that has been overlooked in prior work. A novel fingerprinting code that has superior codeword length in comparison to existing work under this novel malicious distributor scenario, is developed. In addition, ideas presented in the proposed ¯ngerprinting design can easily be applied to existing fingerprinting schemes, making them more robust to collusion attacks. Second, a new framework termed Joint Source Fingerprinting that integrates the processes of watermarking and codebook design is introduced. The need for this new paradigm is motivated by the fact that existing ¯ngerprinting methods result in a perceptually undistorted multimedia after collusion is applied. In contrast, the new paradigm equates the process of collusion amongst a coalition of pirates, to degrading the perceptual characteristics, and hence commercial value of the multimedia in ques- tion. Thus by enforcing that the process of collusion diminishes the commercial value of the content, the pirates are deterred from attacking the ¯ngerprints. A ¯ngerprint- ing algorithm for video as well as an e±cient means of broadcasting or distributing ¯ngerprinted video is also presented. Simulation results are provided to verify our theoretical and empirical observations. |
Dube, Raghav Denial of Service Attacks: Path Reconstruction for IP Traceback using Adjusted Probabilistic Packet Marking 2004. Abstract | BibTeX | Tags: forensics, MS Thesis, thesis @masterthesis{DubMSThesis04, title = {Denial of Service Attacks: Path Reconstruction for IP Traceback using Adjusted Probabilistic Packet Marking}, author = {Raghav Dube}, year = {2004}, date = {2004-12-01}, address = {College Station, TX}, school = {Texas A&M University}, abstract = {The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any disruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increasingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS attack to identify the correct origin of the malicious traffic. The suggested mechanism requires routers to mark packets using adjusted probabilistic marking. This results in a lower number of packet-markings required to identify the traffic source. Unlike many related works, we use the existing IPv4 header structure to incorporate these markings. We simulate and test our algorithms using real Internet trace data to show that our technique is fast, and works successfully for a large number of distributed attackers.}, keywords = {forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any disruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increasingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS attack to identify the correct origin of the malicious traffic. The suggested mechanism requires routers to mark packets using adjusted probabilistic marking. This results in a lower number of packet-markings required to identify the traffic source. Unlike many related works, we use the existing IPv4 header structure to incorporate these markings. We simulate and test our algorithms using real Internet trace data to show that our technique is fast, and works successfully for a large number of distributed attackers. |
Mathai, Nebu John 0.18 CMOS Implementation of a Video Watermarking Algorithm 2004. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{MatMSThesis04, title = {0.18 CMOS Implementation of a Video Watermarking Algorithm}, author = {Nebu John Mathai}, year = {2004}, date = {2004-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {We consider hardware implementation aspects of the digital watermarking problem through the implementation of a well-known video watermarking algorithm called Just Another Watermarking System (JAWS); we discuss the time and area constraints that must be satisfied by a successful hardware implementation. A hardware architecture that implements the algorithm under the constraints is then proposed. The architecture is analyzed to gain an understanding of the relationships between algorithmic features and implementation cost. Some general findings of this work that can be applied toward making algorithmic developments more amenable to hardware implementation are finally presented.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } We consider hardware implementation aspects of the digital watermarking problem through the implementation of a well-known video watermarking algorithm called Just Another Watermarking System (JAWS); we discuss the time and area constraints that must be satisfied by a successful hardware implementation. A hardware architecture that implements the algorithm under the constraints is then proposed. The architecture is analyzed to gain an understanding of the relationships between algorithmic features and implementation cost. Some general findings of this work that can be applied toward making algorithmic developments more amenable to hardware implementation are finally presented. |
Kundur, D; Yu, H H; Lin, C -Y “Security and Digital Rights Management for Mobile Content,” in Content Delivery in the Mobile Internet Book Chapter Wu, T; Dixit, S (Ed.): Chapter Security and Digital Rights Management f, pp. 371-407, John Wiley & Sons, 2004, ISBN: 978-0-471-46618-5. @inbook{KunYuLinChap04, title = {“Security and Digital Rights Management for Mobile Content,” in Content Delivery in the Mobile Internet}, author = {D Kundur and H H Yu and C -Y Lin}, editor = {T Wu and S Dixit}, url = {http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471466182.html}, isbn = {978-0-471-46618-5}, year = {2004}, date = {2004-11-11}, pages = {371-407}, publisher = {John Wiley & Sons}, chapter = {Security and Digital Rights Management f}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inbook} } |
Kundur, D; Zourntos, T; Mathai, N Lightweight Security Principles for Distributed Multimedia-Based Sensor Networks Inproceedings Proc. Annual Asilomar Conference on Signals, Systems and Computers, pp. 368-372, Pacific Grove, California, 2004. @inproceedings{KunZouMatAsilomar04, title = {Lightweight Security Principles for Distributed Multimedia-Based Sensor Networks}, author = {D Kundur and T Zourntos and N Mathai}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunZouMatAsil04.pdf}, year = {2004}, date = {2004-11-01}, booktitle = {Proc. Annual Asilomar Conference on Signals, Systems and Computers}, pages = {368-372}, address = {Pacific Grove, California}, keywords = {mmsn}, pubstate = {published}, tppubtype = {inproceedings} } |
Campisi, P; Kundur, D; Neri, A Robust Digital Watermarking in the Ridgelet Domain Journal Article IEEE Signal Processing Letters, 11 (10), pp. 826-830, 2004. @article{CamKunNerSPL04, title = {Robust Digital Watermarking in the Ridgelet Domain}, author = {P Campisi and D Kundur and A Neri}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CamKunNerSPL04.pdf http://dx.doi.org/10.1109/LSP.2004.835463}, year = {2004}, date = {2004-10-01}, journal = {IEEE Signal Processing Letters}, volume = {11}, number = {10}, pages = {826-830}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Karthik, K Video Fingerprinting and Encryption Principles for Digital Rights Management Journal Article Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, 92 (6), pp. 918-932, 2004. @article{KunKarProcIEEE04, title = {Video Fingerprinting and Encryption Principles for Digital Rights Management}, author = {D Kundur and K Karthik}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunKarProcIEEE04.pdf http://dx.doi.org/10.1109/JPROC.2004.827356}, year = {2004}, date = {2004-06-01}, journal = {Proceedings of the IEEE Special Issue on Enabling Security Technologies for Digital Rights Management}, volume = {92}, number = {6}, pages = {918-932}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Lin, C -Y; Macq, B; Yu, H H Enabling Security Technologies for Digital Rights Management Journal Article Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, 92 (6), pp. 879-882, 2004. @article{KunLinMacYuProcIEEE04, title = {Enabling Security Technologies for Digital Rights Management}, author = {D Kundur and C -Y Lin and B Macq and H H Yu}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunLinMacYuProcIEEE04.pdf http://dx.doi.org/10.1109/JPROC.2004.827336}, year = {2004}, date = {2004-06-01}, journal = {Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management}, volume = {92}, number = {6}, pages = {879-882}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Su, K; Hatzinakos, D “Digital Video Watermarking: Techniques, Technology and Trends,” in Intelligent Watermarking Techniques Book Chapter Pan, P J -S; Huang, H -C; Jain, L (Ed.): Chapter Digital Video Watermarking: Techniques,, pp. 265-314, World Scientific Publishing Company, 2004, ISBN: 978-981-238-757-8. @inbook{KunSuHatChap04, title = {“Digital Video Watermarking: Techniques, Technology and Trends,” in Intelligent Watermarking Techniques}, author = {D Kundur and K Su and D Hatzinakos}, editor = {P J -S Pan and H -C Huang and L Jain}, url = {http://www.worldscibooks.com/compsci/5471.html}, isbn = {978-981-238-757-8}, year = {2004}, date = {2004-04-01}, pages = {265-314}, publisher = {World Scientific Publishing Company}, chapter = {Digital Video Watermarking: Techniques,}, keywords = {drm}, pubstate = {published}, tppubtype = {inbook} } |
Karthik, K; Kundur, D; Hatzinakos, D Joint Fingerprinting and Decryption for Multimedia Content Tracing in Wireless Networks Inproceedings Carapezza, Edward M (Ed.): Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, pp. 360-370, Orlando, Florida, 2004. @inproceedings{KarKunHatSPIE04, title = {Joint Fingerprinting and Decryption for Multimedia Content Tracing in Wireless Networks}, author = {K Karthik and D Kundur and D Hatzinakos}, editor = {Edward M Carapezza}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KarKunHatSPIE04.pdf http://dx.doi.org/10.1117/12.542777}, year = {2004}, date = {2004-04-01}, booktitle = {Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense}, volume = {5403}, pages = {360-370}, address = {Orlando, Florida}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Budhia, U; Kundur, D Digital Video Steganalysis Exploiting Collusion Sensitivity Inproceedings Carapezza, Edward M (Ed.): Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, pp. 210-221, Orlando, Florida, 2004. Links | BibTeX | Tags: forensics @inproceedings{BudKunSPIE04, title = {Digital Video Steganalysis Exploiting Collusion Sensitivity}, author = {U Budhia and D Kundur}, editor = {Edward M Carapezza}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/BudKunSPIE04.pdf http://dx.doi.org/10.1117/12.540814}, year = {2004}, date = {2004-04-01}, booktitle = {Proc. SPIE Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense}, volume = {5403}, pages = {210-221}, address = {Orlando, Florida}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Zhao, Y; Campisi, P; Kundur, D Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images Journal Article IEEE Transactions on Image Processing, 13 (3), pp. 430-448, 2004. Links | BibTeX | Tags: drm, forensics @article{ZhaCamKunTIP04, title = {Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images}, author = {Y Zhao and P Campisi and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ZhaCamKunTIP04.pdf http://dx.doi.org/10.1109/TIP.2003.821552}, year = {2004}, date = {2004-03-01}, journal = {IEEE Transactions on Image Processing}, volume = {13}, number = {3}, pages = {430-448}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {article} } |
Akalu, R; Kundur, D Technological Protection Measures in the Courts: Law, Engineering, and DRM Lessons Learned from the Failure of the Content Scrambling System Journal Article IEEE Signal Processing Magazine, 21 (2), pp. 109-117, 2004. @article{AkaKunSPM04, title = {Technological Protection Measures in the Courts: Law, Engineering, and DRM Lessons Learned from the Failure of the Content Scrambling System}, author = {R Akalu and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/AkaKunSPM04.pdf http://dx.doi.org/10.1109/MSP.2004.1276119}, year = {2004}, date = {2004-03-01}, journal = {IEEE Signal Processing Magazine}, volume = {21}, number = {2}, pages = {109-117}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression Journal Article IEEE Transactions on Image Processing, 13 (2), pp. 126-144, 2004. @article{FeiKunKwoTIP04, title = {Analysis and Design of Watermarking Algorithms for Improved Resistance to Compression}, author = {C Fei and D Kundur and R Kwong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoTIP04.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1206088}, year = {2004}, date = {2004-02-01}, journal = {IEEE Transactions on Image Processing}, volume = {13}, number = {2}, pages = {126-144}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |