Publications
2004. Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
1998. An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2010. Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2007. Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
2003. Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
2011. Future link prediction in the blogosphere for recommendation. Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
2011. Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
2004. Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
1999. Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
1999. Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
2006. Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
2003. Multimedia Data Hiding.
2007. Robust Visual Tracking Using the Time-Reversibility Constraint. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2003. Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
2007. Community response grids for older adults: Motivations, usability, and sociability. Proceedings of the 13th Americas Conference on Information Systems.
2003. Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
2002. A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.