Ashwin Swaminathan

According to our database1, Ashwin Swaminathan authored at least 31 papers between 2004 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2011
Information-theoretic database building and querying for mobile Augmented Reality applications.
Proceedings of the 10th IEEE International Symposium on Mixed and Augmented Reality, 2011

2010
Relating Reputation and Money in Online Markets.
TWEB, 2010

2009
Fingerprinting compressed multimedia signals.
IEEE Trans. Information Forensics and Security, 2009

Intrinsic sensor noise features for forensic analysis on scanners and scanned images.
IEEE Trans. Information Forensics and Security, 2009

Essential Pages.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Relating Reputation and Money in On-line Markets.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Enabling search over encrypted multimedia databases.
Proceedings of the Media Forensics and Security I, 2009

Secure image retrieval through feature protection.
Proceedings of the IEEE International Conference on Acoustics, 2009

Tampering identification using Empirical Frequency Response.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints.
PhD thesis, 2008

Digital Image Forensics via Intrinsic Fingerprints.
IEEE Trans. Information Forensics and Security, 2008

A pattern classification framework for theoretical analysis of component forensics.
Proceedings of the IEEE International Conference on Acoustics, 2008

Image acquisition forensics: Forensic analysis to identify imaging source.
Proceedings of the IEEE International Conference on Acoustics, 2008

A decision theoretic framework for analyzing binary hash-based content identification systems.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Nonintrusive Component Forensics of Visual Sensors Using Output Images.
IEEE Trans. Information Forensics and Security, 2007

Confidentiality-preserving rank-ordered search.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Intrinsic fingerprints for image authentication and steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Robust scanner identification based on noise features.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A Component Estimation Framework for Information Forensics.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia.
Proceedings of the International Conference on Image Processing, 2007

Noise Features for Image Tampering Detection and Steganalysis.
Proceedings of the International Conference on Image Processing, 2007

Collusion-Resistant Fingerprinting for Compressed Multimedia Signals.
Proceedings of the IEEE International Conference on Acoustics, 2007

Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Robust and secure image hashing.
IEEE Trans. Information Forensics and Security, 2006

Exploring QIM-based anti-collusion fingerprinting for multimedia.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Image Tampering Identification using Blind Deconvolution.
Proceedings of the International Conference on Image Processing, 2006

Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Security of feature extraction in image hashing.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2004
Image hashing resilient to geometric and filtering operations.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004


  Loading...