Min Wu
Min Wu is a Distinguished University Professor in the Department of Electrical and Computer Engineering. She is also the Associate Dean for Graduate Affairs in the A. James Clark School of Engineering, a Distinguished Scholar-Teacher and has an appointment in the Institute for Systems Research.
Wu leads the Media and Security Team (MAST) at UMD with main research interests in information security and forensics and multimedia signal processing.
Wu has authored two books and holds eight U.S. patents. Two of her journal papers were honored with best paper awards from the IEEE Signal Processing Society and EURASIP, respectively.
She received an NSF CAREER award in 2002, a University of Maryland George Corcoran Education Award in 2003, an ONR Young Investigator award in 2005, and a University of Maryland's College of Engineering Junior Faculty Teaching Award, and an IEEE Mac Van Valkenburg Early Career Teaching Award in 2009. Wu was selected for a TR100 award by the MIT Technology Review Magazine in 2004 as one of the 100 top young innovators whose contributions to emerging technologies will profoundly influence the world, and received a Computer World “40 under 40” Young Innovator Award in 2007 as one of 40 innovative IT people under the age of 40.
She is the president of the IEEE Signal Processing Society (2022 to 2025), and the first woman of color to hold the leadership position in the organization's 73-year history. Before that, she served as the IEEE SPS's vice president-finance (2010 to 2012) and chair of the IEEE Technical Committee on Information Forensics and Security (2012 to 2013). Wu has also served as area editor for IEEE Signal Processing Magazine, where she was responsible for creating its monthly "Inside Signal Processing eNewsletter," and is involved in several other technical committees, journals and conferences. She was elected as an IEEE Fellow for contributions to multimedia security and forensics.
Before coming to the University of Maryland in 2001, she worked with NEC Research Institute and Signafy, Inc. in 1998, and with Panasonic Information & Networking Laboratories in 1999. She was a visiting associate professor at Stanford University from 2007 to 2008.
Wu received her B.E. degree in electrical engineering (automation) and a B.A. degree in economics from Tsinghua University in Beijing, China, in 1996, and a doctorate degree in electrical engineering from Princeton University in 2001.
Go here to view Wu's academic publications on Google Scholar.
Publications
2011
2011. Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
2011. Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
2011. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. Information Forensics and Security, IEEE Transactions on. 6(3):1146-1159.
2011. Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
2011. Modeling temporal correlations in content fingerprints. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :1860-1863.
2011. "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
2010
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
2010. Method for concealing data in curves of an image. : 11/221,727(7817817)
2010. Gradient descent approach for secure localization in resource constrained wireless sensor networks. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :1854-1857.
2010. Method for fingerprinting multimedia content. 11/326,313(7814564)
2010. Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
2010. System and Method for Confidentiality-Preserving Rank-Ordered Search. 12/608,724
2009
2009. Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
2009. Fingerprinting Compressed Multimedia Signals. Information Forensics and Security, IEEE Transactions on. 4(3):330-345.
2009. Modeling and analysis of content identification. Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on. :1528-1531.
2009. High-Fidelity Data Embedding for Image Annotation. Image Processing, IEEE Transactions on. 18(2):429-435.
2009. Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
2009. Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
2009. Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.
2009. Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.
2009. Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
2008
2008. Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
2008. A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2008. Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.
2008. Image acquisition forensics: Forensic analysis to identify imaging source. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1657-1660.
2008. Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing. Multimedia, IEEE Transactions on. 10(5):910-925.
2007
2007. Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
2007. Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
2007. Joint Uplink and Downlink Optimization for Real-Time Multiuser Video Streaming Over WLANs. Selected Topics in Signal Processing, IEEE Journal of. 1(2):280-294.
2007. Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
2007. A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
2007. Colluding Fingerprinted Video using the Gradient Attack. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-161-II-164-II-161-II-164.
2007. Collusion-Resistant Dynamic Fingerprinting for Multimedia. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-289-II-292-II-289-II-292.
2007. Collusion-Resistant Fingerprinting for Compressed Multimedia Signals. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-165-II-168-II-165-II-168.
2007. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
2007. Adaptive Detection for Group-Based Multimedia Fingerprinting. Signal Processing Letters, IEEE. 14(12):964-967.
2007. Collusion-Resistant Video Fingerprinting for Large User Group. Information Forensics and Security, IEEE Transactions on. 2(4):697-709.
2007. Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
2007. Improving Embedding Payload in Binary Imageswith "Super-Pixels". Image Processing, 2007. ICIP 2007. IEEE International Conference on. 3:III-277-III-280-III-277-III-280.
2007. Noise Features for Image Tampering Detection and Steganalysis. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 6:VI-97-VI-100-VI-97-VI-100.
2006
2006. Joint coding and embedding techniques for MultimediaFingerprinting. Information Forensics and Security, IEEE Transactions on. 1(2):231-247.
2006. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 15(7):2061-2075.
2006. Classification-based spatial error concealment for visual communications. EURASIP J. Appl. Signal Process.. 2006:257-257.
2006. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
2006. A Scalable Multiuser Framework for Video Over OFDM Networks: Fairness and Efficiency. Circuits and Systems for Video Technology, IEEE Transactions on. 16(10):1217-1231.
2006. Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
2006. Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
2006. Multiuser cross-layer resource allocation for video transmission over wireless networks. Network, IEEE. 20(2):21-27.
2006. Multiuser distortion management of layered video over resource limited downlink multicode-CDMA. Wireless Communications, IEEE Transactions on. 5(11):3056-3067.
2006. Cross-Path PDMA-Based Error Protection for Streaming Multiuser Video over Multiple Paths. Image Processing, 2006 IEEE International Conference on. :21-24.
2006. JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw.. 14(5):1128-1140.
2006. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
2005
2005. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Image Processing, IEEE Transactions on. 14(6):804-821.
2005. Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
2005. Joint uplink and downlink optimization for video conferencing over wireless LAN. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1101-ii/1104Vol.2-ii/1101-ii/1104Vol.2.
2005. Building efficient and effective multimedia fingerprints via joint coding and embedding. Proceedings of the 7th workshop on Multimedia and security. :127-136.
2005. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
2005. An interactive and team approach to multimedia design curriculum. Signal Processing Magazine, IEEE. 22(6):14-19.
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2005. Improving collusion resistance of error correcting code based multimedia fingerprinting. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1029-ii/1032Vol.2-ii/1029-ii/1032Vol.2.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2005. Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
2005. Efficient bandwidth resource allocation for low-delay multiuser video streaming. Circuits and Systems for Video Technology, IEEE Transactions on. 15(9):1124-1137.
2004
2004. Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
2004. Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.
2004. Distortion management of real-time MPEG-4 video over downlink multicode CDMA networks. Communications, 2004 IEEE International Conference on. 5:3071-3075Vol.5-3071-3075Vol.5.
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2004. Dynamic distortion control for 3-D embedded wavelet video over multiuser OFDM networks. Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE. 2:650-654Vol.2-650-654Vol.2.