Publications
1999. A rotation, scale and translation resilient public watermark. Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on. 4:2065vol.4-2065vol.4.
2007. In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2001. Modulation and multiplexing techniques for multimedia data hiding. Proc. of SPIE ITcom’01, SPIE vol. 4518
2000. Video access control via multi-level data hiding. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:381-384vol.1-381-384vol.1.
2004. Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
1998. An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2006. Schistosoma mansoni (Platyhelminthes, Trematoda) nuclear receptors: Sixteen new members and a novel subfamily. Gene. 366(2):303-315.
2007. Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
2011. Future link prediction in the blogosphere for recommendation. Proceedings of the International Conference on Weblogs and Social Media (ICWSM).
2003. Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2006. New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
2011. Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
2004. Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
1999. Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
2010. Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
1996. Dynamic view-dependent simplification for polygonal models. Visualization '96. Proceedings.. :327-334.