Lakshmanan Nataraj

Orcid: 0000-0002-4510-7237

According to our database1, Lakshmanan Nataraj authored at least 31 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CIMGEN: Controlled Image Manipulation by Finetuning Pretrained Generative Models on Limited Data.
CoRR, 2024

2023
Resampling Estimation Based RPC Metadata Verification in Satellite Imagery.
IEEE Trans. Inf. Forensics Secur., 2023

2022
MalGrid: Visualization of Binary Features in Large Malware Corpora.
Proceedings of the IEEE Military Communications Conference, 2022

SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

2021
Seam Carving Detection and Localization using Two-Stage Deep Neural Networks.
CoRR, 2021

Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices.
CoRR, 2021

OMD: Orthogonal Malware Detection using Audio, Image, and Static Features.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Holistic Image Manipulation Detection using Pixel Cooccurrence Matrices.
Proceedings of the Media Watermarking, 2021

Detection, Attribution and Localization of GAN Generated Images.
Proceedings of the Media Watermarking, 2021

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions.
Proceedings of the Media Watermarking, 2021

Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2019
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries.
IEEE Trans. Image Process., 2019

Detecting GAN generated Fake Images using Co-occurrence Matrices.
Proceedings of the Media Watermarking, 2019

Deep Learning Methods for Event Verification and Image Repurposing Detection.
Proceedings of the Media Watermarking, 2019

2018
Boosting Image Forgery Detection using Resampling Features and Copy-move Analysis.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

2017
Exploiting Spatial Structure for Localizing Manipulated Image Regions.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
SPAM: Signal Processing to Analyze Malware [Applications Corner].
IEEE Signal Process. Mag., 2016

SPAM: Signal Processing to Analyze Malware.
CoRR, 2016

2015
SATTVA: SpArsiTy inspired classificaTion of malware VAriants.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Features we trust!
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2013
SigMal: a static signal processing based malware triage.
Proceedings of the Annual Computer Security Applications Conference, 2013

2011
Malware images: visualization and automatic classification.
Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011

A comparative assessment of malware classification using binary texture analysis and dynamic analysis.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Improving re-sampling detection by adding noise.
Proceedings of the Media Forensics and Security II, 2010

Precise localization of key-points to identify local regions for robust data hiding.
Proceedings of the International Conference on Image Processing, 2010

2009
Detection of seam carving and localization of seam insertions in digital images.
Proceedings of the Multimedia and Security Workshop, 2009

Adding Gaussian noise to "denoise" JPEG for detecting image resizing.
Proceedings of the International Conference on Image Processing, 2009

2008
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme.
Proceedings of the International Conference on Image Processing, 2008


  Loading...