2004 |
Kundur, D; Hatzinakos, D Toward Robust Logo Watermarking using Multiresolution Image Fusion Principles Journal Article IEEE Transactions on Multimedia, 6 (2), pp. 185-198, 2004. @article{KunHatTMM04, title = {Toward Robust Logo Watermarking using Multiresolution Image Fusion Principles}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatTMM04.pdf http://dx.doi.org/10.1109/TMM.2003.819747}, year = {2004}, date = {2004-02-01}, journal = {IEEE Transactions on Multimedia}, volume = {6}, number = {2}, pages = {185-198}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Analysis and Design of Authentication Watermarking Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents VI, pp. 760-771, San Jose, California, 2004. @inproceedings{FeiKunKwoSPIE04, title = {Analysis and Design of Authentication Watermarking}, author = {C Fei and D Kundur and R Kwong}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE04.pdf http://dx.doi.org/10.1117/12.526714}, year = {2004}, date = {2004-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents VI}, volume = {5306}, pages = {760-771}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Zhao, Y; Campisi, P A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery Inproceedings Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, Vancouver, Canada, 2004. Links | BibTeX | Tags: drm, forensics @inproceedings{KunZhaCamISCAS04, title = {A Steganographic Framework for Dual Authentication and Compression of High Resolution Imagery}, author = {D Kundur and Y Zhao and P Campisi}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunZhaCamISCAS04.pdf http://dx.doi.org/10.1109/ISCAS.2004.1329193}, year = {2004}, date = {2004-01-01}, booktitle = {Proc. IEEE International Symposium on Circuits and Systems (ISCAS)}, volume = {2}, pages = {1-4}, address = {Vancouver, Canada}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2003 |
Zhao, Yang Dual Domain Semi-Fragile Watermarking for Image Authentication 2003. Abstract | BibTeX | Tags: drm, forensics, MS Thesis, thesis @masterthesis{ZhaMSThesis03, title = {Dual Domain Semi-Fragile Watermarking for Image Authentication}, author = {Yang Zhao}, year = {2003}, date = {2003-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-ragile watermarking. A novel watermarking algorithm is proposed in this thesis that is both robust to compression and self-authenticating. The proposed algorithm is a content-based, semi-fragile watermarking method that employs a public-key scheme for still image authentication and integrity veri¯cation. The use of dual domains in the proposed algorithm enables greater control over the robustness and fragility of the overall scheme to manipulations, and provides very good classi¯cation of intentional and incidental tampering. In addition, the thesis provides theoretical analysis for the performance and the feasibility of the scheme. We also present experimental results to verify the theoretical observations and the comparison results for the proposed algorithm to four popular techniques.}, keywords = {drm, forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-ragile watermarking. A novel watermarking algorithm is proposed in this thesis that is both robust to compression and self-authenticating. The proposed algorithm is a content-based, semi-fragile watermarking method that employs a public-key scheme for still image authentication and integrity veri¯cation. The use of dual domains in the proposed algorithm enables greater control over the robustness and fragility of the overall scheme to manipulations, and provides very good classi¯cation of intentional and incidental tampering. In addition, the thesis provides theoretical analysis for the performance and the feasibility of the scheme. We also present experimental results to verify the theoretical observations and the comparison results for the proposed algorithm to four popular techniques. |
Squeira, Adrian Enhanced Watermark Detection 2003. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{SeqMSThesis03, title = {Enhanced Watermark Detection}, author = {Adrian Squeira}, year = {2003}, date = {2003-12-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Digital watermarking is a relatively overhead free solution to the problem of copyright infringement. In this thesis we investigate the choice of transform domain for embedding blind and non-blind watermarks in the face of eight different attacks. The chosen attacks are commonly used in watermark benchmarking programs. After extensive simulations involving seventeen different transforms, we find that our findings corroborate the results obtained by Ramkumar et al. for compression attacks. In addition, we analyse the Voloshynovskiy scheme for its probability of false alarm in a novel way. We then use the transform domain chosen from above and introduce the use of the SAGE algorithm as a parameter estimator. This algorithm is used to lower the probability of false alarm for the Voloshynovskiy scheme by improving the accuracy of parameter estimation and therefore lowering the variance of the detector output.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Digital watermarking is a relatively overhead free solution to the problem of copyright infringement. In this thesis we investigate the choice of transform domain for embedding blind and non-blind watermarks in the face of eight different attacks. The chosen attacks are commonly used in watermark benchmarking programs. After extensive simulations involving seventeen different transforms, we find that our findings corroborate the results obtained by Ramkumar et al. for compression attacks. In addition, we analyse the Voloshynovskiy scheme for its probability of false alarm in a novel way. We then use the transform domain chosen from above and introduce the use of the SAGE algorithm as a parameter estimator. This algorithm is used to lower the probability of false alarm for the Voloshynovskiy scheme by improving the accuracy of parameter estimation and therefore lowering the variance of the detector output. |
Mathai, N J; Sheikholeslami, A; Kundur, D VLSI Implementation of a Real-Time Video Watermark Embedder and Detector Inproceedings Proc. IEEE International Symposium on Circuits and Systems (ISCAS), pp. 772-775, Bangkok, Thailand, 2003. @inproceedings{MatSheKunISCAS03, title = {VLSI Implementation of a Real-Time Video Watermark Embedder and Detector}, author = {N J Mathai and A Sheikholeslami and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MatSheKunISCAS03.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1206088}, year = {2003}, date = {2003-05-01}, booktitle = {Proc. IEEE International Symposium on Circuits and Systems (ISCAS)}, volume = {2}, pages = {772-775}, address = {Bangkok, Thailand}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Mathai, N J; Sheikholeslami, A; Kundur, D Hardware Implementation Perspectives of Digital Video Watermarking Algorithms Journal Article IEEE Transactions on Signal Processing, 51 (4), pp. 925-938, 2003. @article{MatKunSheTSP03, title = {Hardware Implementation Perspectives of Digital Video Watermarking Algorithms}, author = {N J Mathai and A Sheikholeslami and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/MatKunSheTSP03.pdf http://dx.doi.org/10.1109/TSP.2003.809382}, year = {2003}, date = {2003-04-01}, journal = {IEEE Transactions on Signal Processing}, volume = {51}, number = {4}, pages = {925-938}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Ahsan, K Practical Internet Steganography: Data Hiding in IP Inproceedings Proc. Texas Workshop on Security of Information Systems, College Station, Texas, 2003. Links | BibTeX | Tags: forensics @inproceedings{KunAhsTXSecWrkshp03, title = {Practical Internet Steganography: Data Hiding in IP}, author = {D Kundur and K Ahsan}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunAhsTXSecWrkshp03.pdf}, year = {2003}, date = {2003-04-01}, booktitle = {Proc. Texas Workshop on Security of Information Systems}, address = {College Station, Texas}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2002 |
Ahsan, K; Kundur, D Practical Data Hiding in TCP/IP Inproceedings Proc. Workshop on Multimedia Security at ACM Multimedia '02, Juan Les Pins, France, 2002. Links | BibTeX | Tags: forensics @inproceedings{AhsKunMMSec02, title = {Practical Data Hiding in TCP/IP}, author = {K Ahsan and D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/AhsKunMMSec02.pdf}, year = {2002}, date = {2002-12-01}, booktitle = {Proc. Workshop on Multimedia Security at ACM Multimedia '02}, address = {Juan Les Pins, France}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Ahsan, Kamran Covert Channel Analysis and Data Hiding in TCP/IP 2002. Abstract | BibTeX | Tags: forensics, MS Thesis, thesis @masterthesis{AhsMAScThesis02, title = {Covert Channel Analysis and Data Hiding in TCP/IP}, author = {Kamran Ahsan}, year = {2002}, date = {2002-08-01}, abstract = {This thesis investigates the existence of covert channels in computer networks by analyzing the transport and the Internet layers of the TCP/IP protocol suite. Two approaches for data hiding are identified: packet header manipulation and packet sorting. Each scenario facilitates the interaction of steganographic principles with the existing network security environment. Specifically, we show how associating additional information with IPv4 headers can ease up security mechanisms in network nodes like routers, firewalls and for services such as authentication, audit, and billing. Furthermore, use of packet sorting with the IP Sec framework results in an enhanced network security architecture. The packet sorting approach is simulated at the network layer which provides a feasibility of packet sorting under varying network conditions. While bridging the areas of data hiding, network protocols and network security, both techniques have potential for practical data hiding at the transport and network layers.}, keywords = {forensics, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } This thesis investigates the existence of covert channels in computer networks by analyzing the transport and the Internet layers of the TCP/IP protocol suite. Two approaches for data hiding are identified: packet header manipulation and packet sorting. Each scenario facilitates the interaction of steganographic principles with the existing network security environment. Specifically, we show how associating additional information with IPv4 headers can ease up security mechanisms in network nodes like routers, firewalls and for services such as authentication, audit, and billing. Furthermore, use of packet sorting with the IP Sec framework results in an enhanced network security architecture. The packet sorting approach is simulated at the network layer which provides a feasibility of packet sorting under varying network conditions. While bridging the areas of data hiding, network protocols and network security, both techniques have potential for practical data hiding at the transport and network layers. |
Campisi, P; Kundur, D; Hatzinakos, D; Neri, A Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding Journal Article EURASIP Journal on Applied Signal Processing Special Issue on Emerging Applications of Data Hiding, 2002 (2), pp. 152-163, 2002. @article{CamKunHatNerJASP02, title = {Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding}, author = {P Campisi and D Kundur and D Hatzinakos and A Neri}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CamKunHatNerJASP02.pdf http://dx.doi.org/10.1155/S1110865702000550}, year = {2002}, date = {2002-01-01}, journal = {EURASIP Journal on Applied Signal Processing Special Issue on Emerging Applications of Data Hiding}, volume = {2002}, number = {2}, pages = {152-163}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, K; Kundur, D; Hatzinakos, D A Novel Approach to Collusion Resistant Video Watermarking Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents IV, pp. 491-502, San Jose, California, 2002. @inproceedings{SuKunHatSPIE02, title = {A Novel Approach to Collusion Resistant Video Watermarking}, author = {K Su and D Kundur and D Hatzinakos}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatSPIE02.pdf http://dx.doi.org/10.1117/12.465307}, year = {2002}, date = {2002-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents IV}, volume = {4675}, pages = {491-502}, address = {San Jose, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Campisi, P; Kundur, D; Hatzinakos, D; Neri, A Hiding Based Compression for Improved Color Image Coding Inproceedings III, Delp E J; Wong, P W (Ed.): Proc. SPIE Security and Watermarking of Multimedia Contents IV, pp. 230-239, San Jose, California, 2002. Links | BibTeX | Tags: forensics @inproceedings{CamKunHatNerSPIE02, title = {Hiding Based Compression for Improved Color Image Coding}, author = {P Campisi and D Kundur and D Hatzinakos and A Neri}, editor = {Delp E J III and P W Wong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/CamKunHatNerSPIE02.pdf http://dx.doi.org/10.1117/12.465280}, year = {2002}, date = {2002-01-01}, booktitle = {Proc. SPIE Security and Watermarking of Multimedia Contents IV}, volume = {4675}, pages = {230-239}, address = {San Jose, California}, keywords = {forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
2001 |
Su, K; Kundur, D; Hatzinakos, D A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 818-821, Thessaloniki, Greece, 2001. @inproceedings{SuKunHatICIP01, title = {A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks}, author = {K Su and D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SuKunHatICIP01.pdf http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=959171}, year = {2001}, date = {2001-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {1}, pages = {818-821}, address = {Thessaloniki, Greece}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Watermarking with Diversity: Insights and Implications Journal Article IEEE Multimedia, 8 (4), pp. 46-52, 2001. @article{KunMMM01, title = {Watermarking with Diversity: Insights and Implications}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunMMM01.pdf http://dx.doi.org/10.1109/93.959102}, year = {2001}, date = {2001-10-01}, journal = {IEEE Multimedia}, volume = {8}, number = {4}, pages = {46-52}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D Diversity and Attack Characterization for Improved Robust Watermarking Journal Article IEEE Transactions on Signal Processing, 29 (10), pp. 2383-2396, 2001. @article{KunHatTSP01, title = {Diversity and Attack Characterization for Improved Robust Watermarking}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatTSP01.pdf http://dx.doi.org/10.1109/78.950793}, year = {2001}, date = {2001-10-01}, journal = {IEEE Transactions on Signal Processing}, volume = {29}, number = {10}, pages = {2383-2396}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Su, Karen Digital Video Watermarking Principles for Resistance to Collusion and Interpolation Attacks 2001. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{SuMAScThesis01, title = {Digital Video Watermarking Principles for Resistance to Collusion and Interpolation Attacks}, author = {Karen Su}, year = {2001}, date = {2001-09-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {In this thesis,w e propose two video watermarks based on the novel ideas of statistical invisibility and content-synchronized placement. We present a mathematical framework designed to facilitate collusion analysis and thereby enable protection from this important class of attacks. We define statistical invisibility and show that it is not only a property that supports the desired resistance to such attacks,but that it can also be easily induced using a spatially localized image-dependent approach. To construct the watermark,the notion of a watermark’s footprint,the spatial locations over which its energy is spread,is introduced. By defining localized footprints with regular structures,e.g.,sets of subframes within each frame, current image watermarks can immediately be applied at the subframe level. Results are presented to demonstrate the effectiveness of the algorithms. Comparisons are made with the well-known JAWS and CDMA video watermarks,as well as the StirMark 3.1 benchmarking suite.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } In this thesis,w e propose two video watermarks based on the novel ideas of statistical invisibility and content-synchronized placement. We present a mathematical framework designed to facilitate collusion analysis and thereby enable protection from this important class of attacks. We define statistical invisibility and show that it is not only a property that supports the desired resistance to such attacks,but that it can also be easily induced using a spatially localized image-dependent approach. To construct the watermark,the notion of a watermark’s footprint,the spatial locations over which its energy is spread,is introduced. By defining localized footprints with regular structures,e.g.,sets of subframes within each frame, current image watermarks can immediately be applied at the subframe level. Results are presented to demonstrate the effectiveness of the algorithms. Comparisons are made with the well-known JAWS and CDMA video watermarks,as well as the StirMark 3.1 benchmarking suite. |
Sequeira, A; Kundur, D Communication and Information Theory in Watermarking: A Survey Inproceedings Tescher, A G; Vasudev, B; Bove, V M (Ed.): Proc. SPIE Multimedia Systems and Applications IV, pp. 216-227, Denver, Colorado, 2001. @inproceedings{SeqKunSPIE01, title = {Communication and Information Theory in Watermarking: A Survey}, author = {A Sequeira and D Kundur}, editor = {A G Tescher and B. Vasudev and V M Bove}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/SeqKunSPIE01.pdf http://dx.doi.org/10.1117/12.448206}, year = {2001}, date = {2001-08-01}, booktitle = {Proc. SPIE Multimedia Systems and Applications IV}, volume = {4518}, pages = {216-227}, address = {Denver, Colorado}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Yu, H H; Kundur, D; Lin, C -Y Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era Journal Article IEEE Multimedia, 8 (3), pp. 8-12, 2001. @article{YuKunLinMMM01, title = {Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era}, author = {H H Yu and D Kundur and C -Y Lin}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/YuKunLinMMM01.pdf http://dx.doi.org/10.1109/93.939993}, year = {2001}, date = {2001-07-01}, journal = {IEEE Multimedia}, volume = {8}, number = {3}, pages = {8-12}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Fei, C; Kundur, D; Kwong, R Transform-Based Hybrid Data Hiding for Improved Robustness in the Presence of Perceptual Coding Inproceedings Schmalz, M S (Ed.): Proc. SPIE Mathematics of Data/Image Coding, Compression and Encryption IV, with Applications, pp. 203-212, San Diego, California, 2001. @inproceedings{FeiKunKwoSPIE01, title = {Transform-Based Hybrid Data Hiding for Improved Robustness in the Presence of Perceptual Coding}, author = {C Fei and D Kundur and R Kwong}, editor = {M S Schmalz}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoSPIE01.pdf http://dx.doi.org/10.1117/12.449583}, year = {2001}, date = {2001-07-01}, booktitle = {Proc. SPIE Mathematics of Data/Image Coding, Compression and Encryption IV, with Applications}, volume = {4475}, pages = {203-212}, address = {San Diego, California}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Fei, Chuhong The Choice of Transform for Robust Watermarking in the Presence of Lossy Compression 2001. Abstract | BibTeX | Tags: drm, MS Thesis, thesis @masterthesis{FeiMAScThesis01, title = {The Choice of Transform for Robust Watermarking in the Presence of Lossy Compression}, author = {Chuhong Fei}, year = {2001}, date = {2001-04-01}, address = {Toronto, Canada}, school = {University of Toronto}, abstract = {Digital watermarking technology is an approach for the protection of digital information against illegal duplication and manipulation. In this thesis, we concentrate on the problem of robust watermarking in the presence of lossy compression. We investigate how the embedding of the watermark signal in a suitable transform domain can improve performance. Two typical classes of watermarking techniques are considered: one is the spread spectrum watermarking method, the other is the quantization based watermarking method. Based on a communication paradigm for watermarking, we present and information-theoretic approach to estimate the number of watermark bits that can be reliably hidden. The best domain for watermarking is determined to maximize the watermark channel capacity. Based on the advantages and disadvantages of both watermarking methods, a novel hybrid watermarking technique is proposed which combines the best of both spread spectrum and quantization based methods.}, keywords = {drm, MS Thesis, thesis}, pubstate = {published}, tppubtype = {masterthesis} } Digital watermarking technology is an approach for the protection of digital information against illegal duplication and manipulation. In this thesis, we concentrate on the problem of robust watermarking in the presence of lossy compression. We investigate how the embedding of the watermark signal in a suitable transform domain can improve performance. Two typical classes of watermarking techniques are considered: one is the spread spectrum watermarking method, the other is the quantization based watermarking method. Based on a communication paradigm for watermarking, we present and information-theoretic approach to estimate the number of watermark bits that can be reliably hidden. The best domain for watermarking is determined to maximize the watermark channel capacity. Based on the advantages and disadvantages of both watermarking methods, a novel hybrid watermarking technique is proposed which combines the best of both spread spectrum and quantization based methods. |
Fei, C; Kundur, D; Kwong, R The Choice of Watermark Domain in the Presence of Compression Inproceedings Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 79-84, Las Vegas, Nevada, 2001. @inproceedings{FeiKunKwoITCC01, title = {The Choice of Watermark Domain in the Presence of Compression}, author = {C Fei and D Kundur and R Kwong}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/FeiKunKwoITCC01.pdf http://dx.doi.org/10.1109/ITCC.2001.918769}, year = {2001}, date = {2001-04-01}, booktitle = {Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC)}, pages = {79-84}, address = {Las Vegas, Nevada}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
2000 |
Kundur, D Energy Allocation for High-Capacity Watermarking in the Presence of Compression Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 423-426, Vancouver, Canada, 2000. @inproceedings{KunICIP00, title = {Energy Allocation for High-Capacity Watermarking in the Presence of Compression}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunICIP00.pdf http://dx.doi.org/10.1109/ICIP.2000.900985}, year = {2000}, date = {2000-09-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {1}, pages = {423-426}, address = {Vancouver, Canada}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Water-filling for Watermarking? Inproceedings Proc. IEEE International Conference on Multimedia and Expo (ICME), pp. 1287-1290, New York City, New York, 2000. @inproceedings{KunICME00, title = {Water-filling for Watermarking?}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunICME00.pdf http://dx.doi.org/10.1109/ICME.2000.871002}, year = {2000}, date = {2000-08-01}, booktitle = {Proc. IEEE International Conference on Multimedia and Expo (ICME)}, pages = {1287-1290}, address = {New York City, New York}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Implications for High Capacity Data Hiding in the Presence of Lossy Compression Inproceedings Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC), pp. 16-21, Las Vegas, Nevada, 2000. Links | BibTeX | Tags: drm, forensics @inproceedings{KunITCC00, title = {Implications for High Capacity Data Hiding in the Presence of Lossy Compression}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunITCC00.pdf http://dx.doi.org/10.1109/ITCC.2000.844177}, year = {2000}, date = {2000-03-01}, booktitle = {Proc. IEEE International Conference on Information Technology: Coding and Computing (ITCC)}, pages = {16-21}, address = {Las Vegas, Nevada}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D; Leung, H Robust Classification of Blurred Imagery Journal Article IEEE Transactions on Image Processing, 9 (2), pp. 243-255, 2000. @article{KunHatLeuTIP00, title = {Robust Classification of Blurred Imagery}, author = {D Kundur and D Hatzinakos and H Leung}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatLeuTIP00.pdf http://dx.doi.org/10.1109/83.821737}, year = {2000}, date = {2000-02-01}, journal = {IEEE Transactions on Image Processing}, volume = {9}, number = {2}, pages = {243-255}, keywords = {fusion}, pubstate = {published}, tppubtype = {article} } |
1999 |
Kundur, D; Hatzinakos, D Attack Characterization for Effective Watermarking Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 240-244, Kobe, Japan, 1999. @inproceedings{KunHatICIP99, title = {Attack Characterization for Effective Watermarking}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP99.pdf http://dx.doi.org/10.1109/ICIP.1999.822892}, year = {1999}, date = {1999-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {4}, pages = {240-244}, address = {Kobe, Japan}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D Improved Digital Watermarking through Diversity and Attack Characterization Inproceedings Proc. Workshop on Multimedia Security at ACM Multimedia `99, pp. 53-58, Orlando, Florida, 1999. @inproceedings{KunMMSec99, title = {Improved Digital Watermarking through Diversity and Attack Characterization}, author = {D Kundur}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunMMSec99.pdf}, year = {1999}, date = {1999-10-01}, booktitle = {Proc. Workshop on Multimedia Security at ACM Multimedia `99}, pages = {53-58}, address = {Orlando, Florida}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression Inproceedings Tescher, A G (Ed.): Proc. SPIE Multimedia Systems and Applications II, pp. 29-42, Boston, Massachusetts, 1999. @inproceedings{KunHatSPIE99, title = {Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression}, author = {D Kundur and D Hatzinakos}, editor = {A G Tescher}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatSPIE99.pdf http://dx.doi.org/10.1117/12.371227}, year = {1999}, date = {1999-09-01}, booktitle = {Proc. SPIE Multimedia Systems and Applications II}, volume = {3845}, pages = {29-42}, address = {Boston, Massachusetts}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Digital Watermarking for Telltale Tamper-Proofing and Authentication Journal Article Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 87 (7), pp. 1167-1180, 1999. Links | BibTeX | Tags: drm, forensics @article{KunHatProcIEEE99, title = {Digital Watermarking for Telltale Tamper-Proofing and Authentication}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatProcIEEE99.pdf http://dx.doi.org/10.1109/5.771070}, year = {1999}, date = {1999-07-01}, journal = {Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information}, volume = {87}, number = {7}, pages = {1167-1180}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {article} } |
1998 |
Kundur, D; Hatzinakos, D Improved Robust Watermarking through Attack Characterization Journal Article Optics Express Special Issue on Digital Watermarking, 3 (12), pp. 485-490, 1998. @article{KunHatOE98, title = {Improved Robust Watermarking through Attack Characterization}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatOE98.pdf http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-3-12-485}, year = {1998}, date = {1998-12-07}, journal = {Optics Express Special Issue on Digital Watermarking}, volume = {3}, number = {12}, pages = {485-490}, keywords = {drm}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D Semi-Blind Image Restoration Based on Telltale Watermarking Inproceedings Proc. Asilomar Conference on Signals, Systems and, Computers, pp. 933-937, Pacific Grove, California, 1998. @inproceedings{KunHatAsilomar98, title = {Semi-Blind Image Restoration Based on Telltale Watermarking}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatAsil98.pdf http://dx.doi.org/10.1109/ACSSC.1998.751399}, year = {1998}, date = {1998-11-01}, booktitle = {Proc. Asilomar Conference on Signals, Systems and, Computers}, volume = {2}, pages = {933-937}, address = {Pacific Grove, California}, keywords = {bir}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D On the use of Lyapunov Criteria to Analyze the Convergence of Blind Deconvolution Algorithms Journal Article IEEE Transactions on Signal Processing, 26 (10), pp. 2918-2925, 1998. @article{KunHatTSP98b, title = {On the use of Lyapunov Criteria to Analyze the Convergence of Blind Deconvolution Algorithms}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatTSP98b.pdf http://dx.doi.org/10.1109/78.726806}, year = {1998}, date = {1998-11-01}, journal = {IEEE Transactions on Signal Processing}, volume = {26}, number = {10}, pages = {2918-2925}, keywords = {bir}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D Towards a Telltale Watermarking Technique for Tamper-Proofing Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 409-413, 1998. Links | BibTeX | Tags: drm, forensics @inproceedings{KunHatICIP98, title = {Towards a Telltale Watermarking Technique for Tamper-Proofing}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP98.pdf http://dx.doi.org/10.1109/ICIP.1998.723403}, year = {1998}, date = {1998-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {2}, pages = {409-413}, keywords = {drm, forensics}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Digital Watermarking using Multiresolution Wavelet Decomposition Inproceedings Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2969-2972, Seattle, Washington, 1998. @inproceedings{KunHatICASSP98, title = {Digital Watermarking using Multiresolution Wavelet Decomposition}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICASSP98.pdf http://dx.doi.org/10.1109/ICASSP.1998.678149}, year = {1998}, date = {1998-05-01}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {5}, pages = {2969-2972}, address = {Seattle, Washington}, keywords = {drm}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D A Novel Blind Deconvolution Scheme for Image Restoration using Recursive Filtering Journal Article IEEE Transactions on Signal Processing, 46 (2), pp. 375-390, 1998. @article{KunHatTSP98a, title = {A Novel Blind Deconvolution Scheme for Image Restoration using Recursive Filtering}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatTSP98a.pdf http://dx.doi.org/10.1109/78.655423}, year = {1998}, date = {1998-02-01}, journal = {IEEE Transactions on Signal Processing}, volume = {46}, number = {2}, pages = {375-390}, keywords = {bir}, pubstate = {published}, tppubtype = {article} } |
1997 |
Kundur, D; Hatzinakos, D A Robust Digital Image Watermarking Method using Wavelet-Based Fusion Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 544-547, Santa Barbara, California, 1997. Links | BibTeX | Tags: drm, fusion @inproceedings{KunHatICIP97, title = {A Robust Digital Image Watermarking Method using Wavelet-Based Fusion}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP97.pdf http://dx.doi.org/10.1109/ICIP.1997.647970}, year = {1997}, date = {1997-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {1}, pages = {544-547}, address = {Santa Barbara, California}, keywords = {drm, fusion}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D; Leung, H A Novel Approach to Robust Blind Classification of Remote Sensing Imagery Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 130-133, Santa Barbara, California, 1997. @inproceedings{KunHatLeuICIP97, title = {A Novel Approach to Robust Blind Classification of Remote Sensing Imagery}, author = {D Kundur and D Hatzinakos and H Leung}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatLeuICIP97.pdf http://dx.doi.org/10.1109/ICIP.1997.632017}, year = {1997}, date = {1997-10-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {3}, pages = {130-133}, address = {Santa Barbara, California}, keywords = {fusion}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D; Leung, H A Novel Approach to Multispectral Blind Image Fusion Inproceedings Dasarathy, B V (Ed.): Proc. SPIE Sensor Fusion: Architectures, Algorithms and Applications, pp. 83-93, 1997. @inproceedings{KunHatLeuSPIE97, title = {A Novel Approach to Multispectral Blind Image Fusion}, author = {D Kundur and D Hatzinakos and H Leung}, editor = {B V Dasarathy}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatLeuSPIE97.pdf http://dx.doi.org/10.1117/12.276116}, year = {1997}, date = {1997-04-01}, booktitle = {Proc. SPIE Sensor Fusion: Architectures, Algorithms and Applications}, volume = {3067}, pages = {83-93}, keywords = {fusion}, pubstate = {published}, tppubtype = {inproceedings} } |
1996 |
Kundur, D; Hatzinakos, D Blind Image Deconvolution Revisited Journal Article IEEE Signal Processing Magazine, 13 (6), pp. 61-63, 1996. @article{KunHatSPM96b, title = {Blind Image Deconvolution Revisited}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatSPM96b.pdf http://dx.doi.org/10.1109/79.543976}, year = {1996}, date = {1996-11-01}, journal = {IEEE Signal Processing Magazine}, volume = {13}, number = {6}, pages = {61-63}, keywords = {bir}, pubstate = {published}, tppubtype = {article} } |
Kundur, D; Hatzinakos, D On the Global Asymptotic Stability of the NAS-RIF Algorithm for Blind Image Restoration Inproceedings Proc. IEEE International Conference on Image Processing (ICIP), pp. 73-76, Lausanne, Switzerland, 1996. @inproceedings{KunHatICIP96c, title = {On the Global Asymptotic Stability of the NAS-RIF Algorithm for Blind Image Restoration}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICIP96.pdf http://dx.doi.org/10.1109/ICIP.1996.560372}, year = {1996}, date = {1996-09-01}, booktitle = {Proc. IEEE International Conference on Image Processing (ICIP)}, volume = {3}, pages = {73-76}, address = {Lausanne, Switzerland}, keywords = {bir}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Blind Image Restoration via Recursive Filtering using Deterministic Constraints Inproceedings Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2283-2286, Atlanta, Georgia, 1996. @inproceedings{KunHatICASSP96, title = {Blind Image Restoration via Recursive Filtering using Deterministic Constraints}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatICASSP96.pdf http://dx.doi.org/10.1109/ICASSP.1996.547737}, year = {1996}, date = {1996-05-01}, booktitle = {Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {4}, pages = {2283-2286}, address = {Atlanta, Georgia}, keywords = {bir}, pubstate = {published}, tppubtype = {inproceedings} } |
Kundur, D; Hatzinakos, D Blind Image Deconvolution Journal Article IEEE Signal Processing Magazine, 13 (3), pp. 43-64, 1996. @article{KunHatSPM96b, title = {Blind Image Deconvolution}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatSPM96a.pdf http://dx.doi.org/10.1109/79.489268}, year = {1996}, date = {1996-05-01}, journal = {IEEE Signal Processing Magazine}, volume = {13}, number = {3}, pages = {43-64}, keywords = {bir}, pubstate = {published}, tppubtype = {article} } |
1995 |
Kundur, D; Hatzinakos, D A Novel Recursive Filtering Method for Blind Image Restoration Inproceedings Proc. IASTED International Conference on Signal and Image Processing (SIP), pp. 428-431, Las Vegas, Nevada, 1995. @inproceedings{KunHatSIP95, title = {A Novel Recursive Filtering Method for Blind Image Restoration}, author = {D Kundur and D Hatzinakos}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/KunHatSIP95.pdf}, year = {1995}, date = {1995-11-01}, booktitle = {Proc. IASTED International Conference on Signal and Image Processing (SIP)}, pages = {428-431}, address = {Las Vegas, Nevada}, keywords = {bir}, pubstate = {published}, tppubtype = {inproceedings} } |
1993 |
Bardakjian, B L; Kundur, D; Wright, N Wiener Kernel Characterization of the Electrical Properties of Nerve Axons Inproceedings Proc. IEEE Engineering in Medicine and Biology 15th Annual Conference (EMBC), pp. 511-512, San Diego, California, 1993. Links | BibTeX | Tags: biological @inproceedings{BarKunWriEMBC93, title = {Wiener Kernel Characterization of the Electrical Properties of Nerve Axons}, author = {B L Bardakjian and D Kundur and N Wright}, url = {http://www.comm.utoronto.ca/~dkundur/pub_pdfs/BarKunWriEMBC93.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=978663}, year = {1993}, date = {1993-10-01}, booktitle = {Proc. IEEE Engineering in Medicine and Biology 15th Annual Conference (EMBC)}, volume = {1}, pages = {511-512}, address = {San Diego, California}, keywords = {biological}, pubstate = {published}, tppubtype = {inproceedings} } |