- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Advanced Data Compression Techniques
- Biometric Identification and Security
- User Authentication and Security Systems
- Algorithms and Data Compression
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Image and Signal Denoising Methods
- Generative Adversarial Networks and Image Synthesis
- Image Processing Techniques and Applications
- Digital and Cyber Forensics
- Network Security and Intrusion Detection
- Face recognition and analysis
- Spam and Phishing Detection
- Advanced Image and Video Retrieval Techniques
- Advanced Data Storage Technologies
- Advanced Image Processing Techniques
- Music and Audio Processing
- Digital Rights Management and Security
- Misinformation and Its Impacts
- Video Analysis and Summarization
- Privacy, Security, and Data Protection
- Image Processing and 3D Reconstruction
New York University
2016-2025
New York University Shanghai
2024
Institute of Electrical and Electronics Engineers
2023
Signal Processing (United States)
2023
New York University Abu Dhabi
2013-2021
Courant Institute of Mathematical Sciences
2017
SUNY Polytechnic Institute
2004-2015
International Society for Optics and Photonics
2015
Society for Imaging Science and Technology
2015
Liaoning General Aviation Research Institute
2014
We propose a context-based, adaptive, lossless image codec (CALIC). The obtains higher compression of continuous-tone images than other coding techniques in the literature. This high efficiency is accomplished with relatively low time and space complexities. CALIC puts heavy emphasis on data modeling. A unique feature use large number modeling contexts (states) to condition nonlinear predictor adapt varying source statistics. can correct itself via an error feedback mechanism by learning...
We present techniques for steganalysis of images that have been potentially subjected to steganographic algorithms, both within the passive warden and active frameworks. Our hypothesis is schemes leave statistical evidence can be exploited detection with aid image quality features multivariate regression analysis. To this effect metrics identified based on analysis variance (ANOVA) technique as feature sets distinguish between cover-images stego-images. The classifier cover stego-images...
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of user, watermark can be either visible or invisible. The detect any modification made to image indicate specific locations that have been modified. If correct key is specified in extraction procedure, then an output returned showing proper watermark, indicating authentic has not changed since insertion watermark. Any would reflected corresponding error incorrect, if was watermarked,...
Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability invisible watermarking schemes to resolve ownership. show that, in certain applications, rightful ownership cannot be resolved by current alone. Specifically, we attack existing techniques providing counterfeit that can performed on watermarked image allow multiple claims In absence standardization and specific requirements imposed procedures, anyone claim any image. order...
Copy-move forgery is a specific type of image tampering, where part the copied and pasted on another same image. In this paper, we propose new approach for detecting copy-move in digital images, which considerably more robust to lossy compression, scaling rotation manipulations. Also, improve computational complexity duplicated regions, use notion counting bloom filters as an alternative lexicographic sorting, common component most proposed detection schemes. Our experimental results show...
There have been many techniques for hiding messages in images such a manner that the alterations made to image are perceptually indiscernible. However, question whether they result statistically indistinguishable from untampered has not adequately explored. We look at some specific based steganography and show an observer can indeed distinguish between carrying hidden message which do carry message. derive closed form expression of probability detection false alarm terms number bits hidden....
In this paper, we describe a class of attacks on certain block-based oblivious watermarking schemes. We show that techniques embed information into host image in block-wise independent fashion are vulnerable to counterfeiting attack. Specifically, given watermarked image, one can forge the watermark it contains another without knowing secret key used for insertion and some cases even explicitly watermark. demonstrate successful implementations attack few have been proposed literature. also...
In this paper, we present a novel multi-touch gesture-based authentication technique. We take advantage of the surface to combine biometric techniques with gestural input. defined comprehensive set five-finger touch gestures, based upon classifying movement characteristics center palm and fingertips, tested them in user study combining data collection usability questions. Using pattern recognition techniques, built classifier recognize unique gesture an individual. achieved 90% accuracy rate...
This paper studies online signature verification on touch interface-based mobile devices. A simple and effective method for is developed. An represented with a discriminative feature vector derived from attributes of several histograms that can be computed in linear time. The resulting template compact requires constant space. algorithm was first tested the well-known MCYT-100 SUSIG data sets. results show performance proposed technique comparable often superior to state-of-the-art...
Digital watermarks have previously been proposed for the purposes of copy protection and deterrence multimedia content. In deterrence, a content owner (seller) inserts unique watermark into before it is sold to buyer. If buyer sells unauthorized copies watermarked content, then these can be traced unlawful reseller (original buyer) using detection algorithm. One problem with such an approach that original whose has found on claim was created or caused (for example, by security breach)...
Graphical passwords are an alternative to alphanumeric in which users click on images authenticate themselves rather than type strings. We have developed one such system, called PassPoints, and evaluated it with human users. The results of the evaluation were promising respect rmemorability graphical password. In this study we expand our factors testing by studying two issues: effect tolerance, or margin error, clicking password points image used system. tolerance study, show that accurate...
An interesting problem in digital forensics is that given a image, would it be possible to identify the camera model which was used obtain image. In this paper we look at simplified version of by trying distinguish between images captured limited number models. We propose features could classifier source an image blind manner. also provide experimental results and show reasonable accuracy distinguishing from two five different models using proposed features.
In this work, we focus our interest on blind source camera identification problem by extending results in the direction of M. Kharrazi et al. (2004). The interpolation color surface an image due to use a filter array (CFA) forms basis paper. We propose identify based traces proprietary algorithm deployed digital camera. For purpose, set characteristics are defined and then used conjunction with support vector machine multi-class classifier determine originating also provide initial...
article Free Access Share on Protecting digital media content Authors: Nasir Memon Northern Illinois Univ., De Kalb KalbView Profile , Ping Wah Wong Hewlett-Packard, Cupertino, CA CAView Authors Info & Claims Communications of the ACMVolume 41Issue 7July 1998 pp 35–43https://doi.org/10.1145/278476.278485Online:01 July 1998Publication History 177citation2,592DownloadsMetricsTotal Citations177Total Downloads2,592Last 12 Months73Last 6 weeks34 Get Citation AlertsNew Alert added!This alert has...
Secure storage of biometric templates has become an increasingly important issue in authentication systems. We study how secure sketch, a recently proposed error-tolerant cryptographic primitive, can be applied to protect the templates. identify several practical issues that are not addressed existing theoretical framework, and show subtleties evaluating security propose general framework design analyze sketch for templates, give concrete construction face biometrics as example. bounds have...
We develop a model to identify the most likely regions for users click in order create graphical passwords PassPoints system. A password is sequence of points, chosen by user an image that displayed on screen. Our predicts probabilities points; this enables us predict entropy point given image. The allows evaluate automatically whether well suited system, and analyze possible dictionary attacks against compare predictions provided our results experiments involving human users. At stage, are...
Identification and verification of a video clip via its fingerprint find applications in browsing, database search security. For this purpose, the sequence must be collapsed into short using robust hash function based on signal processing operations. We propose two algorithms for both discrete cosine transform (DCT), one classical basis set other novel randomized (RBT). The robustness randomness properties proposed functions are investigated detail. It is found that these resistant to...
Techniques and methodologies for validating the authenticity of digital images testing presence doctoring manipulation operations on them has recently attracted attention. We review three categories forensic features discuss design classifiers between doctored original images. The performance with respect to selected controlled manipulations as well uncontrolled is analyzed. tools image detection are treated under feature fusion decision scenarios.
We present a novel technique for steganalysis of images that have been subjected to embedding by steganographic algorithms. The seventh and eighth bit planes in an image are used the computation several binary similarity measures. basic idea is correlation between as well texture characteristics within will differ stego cover image. These telltale marks construct classifier can distinguish images. also provide experimental results using some latest proposed scheme found complementary...
In this paper, we introduce tamper detection techniques based on artifacts created by color filter array (CFA) processing in most digital cameras. The are computing a single feature and simple threshold classifier. efficacy of the approach was tested over thousands authentic, tampered, computer generated images. Experimental results demonstrate reasonably low error rates.
Digital single lens reflex cameras suffer from a well-known sensor dust problem due to interchangeable lenses that they deploy. The particles settle in front of the imaging create persistent pattern all captured images. In this paper, we propose novel source camera identification method based on detection and matching these dust-spot characteristics. Dust spots image are detected (Gaussian) intensity loss model shape properties. To prevent false detections, parameter-dependent...
This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints a user are enrolled. A number consumer electronic devices, such as smartphones, beginning to incorporate fingerprint sensors for authentication. The embedded in these devices generally small and resulting images are, therefore, limited size. To compensate size, often acquire impressions single finger during enrollment ensure that at least one them will successfully...