Husrev T. Sencar

Orcid: 0000-0001-6910-6194

According to our database1, Husrev T. Sencar authored at least 75 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Semantic Ranking for Automated Adversarial Technique Annotation in Security Text.
CoRR, 2024

2023
A3T: accuracy aware adversarial training.
Mach. Learn., September, 2023

ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Impact of Adversarial Training on Robustness and Generalizability of Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Video Source Characterization Using Encoding and Encapsulation Characteristics.
IEEE Trans. Inf. Forensics Secur., 2022

Ten Years after ImageNet: A 360° Perspective on AI.
CoRR, 2022

Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior.
CoRR, 2022

Camera Model Identification Using Container and Encoding Characteristics of Video Files.
CoRR, 2022

GREENER: Graph Neural Networks for News Media Profiling.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Estimating Uniqueness of I-Vector-Based Representation of Human Voice.
IEEE Trans. Inf. Forensics Secur., 2021

Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments.
IEEE Trans. Inf. Forensics Secur., 2021

Source Camera Verification for Strongly Stabilized Videos.
IEEE Trans. Inf. Forensics Secur., 2021

A Survey on Predicting the Factuality and the Bias of News Media.
CoRR, 2021

BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection.
Proceedings of the IEEE Security and Privacy Workshops, 2021

PRNU Estimation from Encoded Videos Using Block-Based Weighting.
Proceedings of the Media Watermarking, 2021

2020
Jpg<i>Scraper</i>: An Advanced Carver for JPEG Files.
IEEE Trans. Inf. Forensics Secur., 2020

Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation.
IEEE Trans. Inf. Forensics Secur., 2020

Estimating Uniqueness of Human Voice UsingI-Vector Representation.
CoRR, 2020

2019
Source Camera Attribution from Strongly Stabilized Videos.
CoRR, 2019

Tackling In-Camera Downsizing for Reliable Camera ID Verification.
Proceedings of the Media Watermarking, 2019

2018
Extracting Prnu Noise from H.264 Coded Videos.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Towards measuring uniqueness of human voice.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Fast camera fingerprint matching in very large databases.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets.
Comput. Commun., 2016

2015
Carving Orphaned JPEG File Fragments.
IEEE Trans. Inf. Forensics Secur., 2015

Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing.
IEEE Trans. Inf. Forensics Secur., 2015

Recent advances in counter PRNU based source attribution and beyond.
Proceedings of the Media Watermarking, 2015

2014
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution.
IEEE Trans. Inf. Forensics Secur., 2014

A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures.
Speech Commun., 2014

A semi-automatic deshredding method based on curve matching.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Towards automatic detection of child pornography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Audio codec identification from coded and transcoded audios.
Digit. Signal Process., 2013

Methods for identifying traces of compression in audio.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Seam-carving based anonymization against image & video source attribution.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

A cost-effective decision tree based approach to steganalysis.
Proceedings of the Media Watermarking, 2013

2012
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization.
IEEE Trans. Inf. Forensics Secur., 2012

Classification of audios containing speech and music.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

Classification of audio codecs based on coding characteristics.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

2011
Audio codec identification through payload sampling.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Content-Based Video Copy Detection - A Survey.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Efficient techniques for sensor fingerprint matching in large image and video databases.
Proceedings of the Media Forensics and Security II, 2010

How to Measure Biometric Information?
Proceedings of the 20th International Conference on Pattern Recognition, 2010

An Ensemble of Classifiers Approach to Steganalysis.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Identification and recovery of JPEG files with missing fragments.
Digit. Investig., 2009

A study of the robustness of PRNU-based camera identification.
Proceedings of the Media Forensics and Security I, 2009

Flatbed scanner identification based on dust and scratches over scanner platen.
Proceedings of the IEEE International Conference on Acoustics, 2009

An efficient and robust method for detecting copy-move forgery.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust.
IEEE Trans. Inf. Forensics Secur., 2008

Detecting file fragmentation point using sequential hypothesis testing.
Digit. Investig., 2008

Classification of digital camera-models based on demosaicing artifacts.
Digit. Investig., 2008

Video copy detection based on source device characteristics: a complementary approach to content-based methods.
Proceedings of the 1st ACM SIGMM International Conference on Multimedia Information Retrieval, 2008

2007
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks.
IEEE Trans. Inf. Forensics Secur., 2007

Improved utilization of embedding distortion in scalar quantization based data hiding techniques.
Signal Process., 2007

A new approach to countering ambiguity attacks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Improvements on Sensor Noise Based Source Camera Identification.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Tamper Detection Based on Regularity of Wavelet Transform Coefficients.
Proceedings of the International Conference on Image Processing, 2007

New Features to Identify Computer Generated Images.
Proceedings of the International Conference on Image Processing, 2007

Detecting Malicious Behavior in Cooperative Diversity.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography.
Trans. Data Hiding Multim. Secur., 2006

An overview of scalar quantization based data hiding methods.
Signal Process., 2006

Performance study of common image steganography and steganalysis techniques.
J. Electronic Imaging, 2006

Identifying Digital Cameras Using CFA Interpolation.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Cover Selection for Steganographic Embedding.
Proceedings of the International Conference on Image Processing, 2006

Digital Image Forensics for Identifying Computer Generated and Digital Camera Images.
Proceedings of the International Conference on Image Processing, 2006

2005
Benchmarking steganographic and steganalysis techniques.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A secure biometric authentication scheme based on robust hashing.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Source camera identification based on CFA interpolation.
Proceedings of the 2005 International Conference on Image Processing, 2005

PSteg: steganographic embedding through patching.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Watermarking and ownership problem: a revisit.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

2004
Blind source camera identification.
Proceedings of the 2004 International Conference on Image Processing, 2004

An analysis of quantization based embedding-detection techniques.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
Improvements on data hiding for lossy compression.
Proceedings of the IEEE International Conference on Acoustics, 2002

1999
Fast video segmentation using encoding cost data.
Proceedings of the Storage and Retrieval for Image and Video Databases VII, 1999

Preprocessing tool for compressed video editing.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999


  Loading...