Research by Media And Security Team (MAST)
 

      Selected Papers by Areas          Books          Journal Papers         Conference Papers           Patents
 



MAST logo


Research Interests

Meet the Team - visit the MAST home page

Ph.D. Alumni

  1. Yinian Mao(2006): “Securing Multi-layer Communications: A Signal Processing Approach”;  Job at Qualcomm – Security Group;

  2. Guan-Ming Su (2006): “Dynamic Resource Allocation for Multiuser Video Streaming”; Job at Marvell Inc.;

  3. Hongmei Gou (2007): “Digital Forensic Techniques for Graphic Data”; Job at Texas Instrument;

  4. Shan He (2007): “A Joint Coding and Embedding Framework for Multimedia Fingerprinting”; Job at Thomson Corporate Research;

  5. Meng Chen (2007): “Error Control and Concealment of Visual Communications”; Job at PCTEL Inc;

  6. Ashwin Swaminathan (2008): “Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints”; Job at Qualcomm Research.

  7. Avinash Varna (2011): “Multimedia Protection Using Content and Embedded Fingerprints”; Job at Intel DRM group.

  8. Wenjun Lu (2011): “Preserving Trustworthiness and Confidentiality for Online Multimedia”; Job at Google.

  9. Wei-Hong Chuang (2012): “Resiliency Assessment and Enhancement of Intrinsic Fingerprinting”; Job at Amazon R&D.
     



Selected Publications by Topic Areas   
=> Google Citations; ISI ResearcherID (for journal articles)
 

NEW  W-H. Chuang, R. Garg, and M. Wu, "How Secure are Power Network Signature Based Time Stamps?” Proc. of 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, Oct. 2012. [19% acceptance for long paper]

Check this out  R. Garg, A.L. Varna and M. Wu, " 'Seeing' ENF: Natural Time Stamp for Digital Video via Optical Sensing and Signal Processing," Proc. of ACM Multimedia, Scottsdale, Arizona, Nov. 2011. [58/335=17% acceptance rate for long paper; Best Student Paper Award]

A. Swaminathan, M. Wu, and K.J.R. Liu: “Component Forensics: Theory, Methodologies, and Applications,” IEEE Signal Processing Magazine, March 2009.  => provided a roadmap and overview on Non-Intrusive Component/Camera Estimation (NICE); see details in journal papers (TIFS'07, TIFS'08)

H. Gou, A. Swaminathan, and M. Wu: “Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 476-491, September 2009.

C.E. McKay, A. Swaminathan, H. Gou, and M. Wu, “Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'08), Las Vegas, NV, April 2008.
 

Check this out A.L. Varna and M. Wu, " Modeling and Analysis of Correlated Binary Fingerprints for Content Identification,” IEEE Trans. on Info. Forensics and Security, vol. 6, no. 3, Sept. 2011. [PDF]

A.L. Varna, A. Swaminathan, and M. Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", Proc. of ACM Digital Rights Management Workshop, pp. 67-76, Oct. 2008. [PDF]

A. Swaminathan, Y. Mao, and M. Wu: “Robust and Secure Hashing for Images,” IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 215-230, June 2006. [PDF]  (related earlier work on secure hashing; see more security analysis on Unicity Distance in TIFS'07.  PDF here includes corrections of production and abbreviation typos and brief clarifications on security analysis.)
 

Look Inside  A.L. Varna, S. He, A. Swaminathan, and M. Wu: “Fingerprinting Compressed Multimedia Signals,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 330-345, September 2009.

S. He and M. Wu: "Joint Coding and Embedding Techniques for Multimedia Fingerprinting," IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 231-247, June 2006.   => see also TIFS'07 on large-scale video fingerprinting.

H. Gou and M. Wu: "Data Hiding in Curves with Applications to Fingerprinting Maps," IEEE Trans. on Signal Proc., Special Issue on Secure Media, vol. 53, no. 10, pp. 3988-4005, Oct. 2005.

M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, vol. 21, no. 2, pp.15-27, March 2004.  => provided a roadmap and overview; see details in journal papers (TSP'03, JASP'04, TIP'05, TIP'05, SPL'07)
 

W. Lu, A. Swaminathan, A.L. Varna, and M. Wu, "Enabling Search over Encrypted Multimedia Databases", Proc. of SPIE, vol. 7254, Conf. on Media Forensics and Security, January 2009.  [PDF

A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D. Oard, “Confidentiality-Preserving Rank-Ordered Search,” 3rd ACM International Workshop on Storage Security and Survivability (StorageSS 2007), Alexandria, VA, Oct. 2007. [PDF]

Y. Mao and M. Wu: "A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption", IEEE Trans. on Image Processing, vol. 15, no. 7, pp. 2061-2075, July 2006.
 

NEW  R. Garg, A.L. Varna, and M. Wu: “An Efficient Gradient Descent Approach for Secure Localization in Resource Constrained Wireless Sensor Networks,” IEEE Trans. on Info. Forensics and Security, vol. 7, no. 2, pp. 717-730, April 2012.

Look Inside Y. Mao and M. Wu: “Tracing Malicious Relay Nodes in Cooperative Wireless Communications,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 2, pp. 198-212, June 2007.

Y. Mao, Y. Sun, M. Wu, and K.J.R. Liu: "JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Agreement", ACM/IEEE Trans. on Networking, vol. 14, no. 5, pp. 1128-1140, Oct. 2006.  (earlier version appeared in INFOCOM'2004)

Y. Mao and M. Wu: “Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage,” Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’2005), Alexandria, VA, pp.117-128, Nov. 2005. [PDF]

Look Inside A. Swaminathan, Y. Mao, M. Wu, and Krishnan Kailas: “Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance,” 7th International Information Hiding Workshop (IHW), Barcelona, Spain, and Lecture Notes on Computer Science (LNCS),  vol. 3727, pp.357-371, June 2005. [PDF]
 

Check this out G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, “Multiuser Cross-Layer Resource Allocation for Video Transmission over Wireless Networks,” IEEE Network Magazine, Special Issue on Multimedia over Broadband Wireless Networks, vol. 20, no. 2, pp.21-27, March 2006.   => provided a roadmap and overview; see details in journal papers (CSVT'06, TWC'06, JSTSP'07)

M. Chen, G-M. Su, and M. Wu: “Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing,” IEEE Trans. on Multimedia, vol. 10, no. 5, pp. 910-925, August 2008.   (see also an earlier CSVT'05 work on multiuser resource allocation)

M. Chen, Y-F. Zheng, and M. Wu: "Classification-Based Spatial Error Concealment for Visual Communications," EURASIP Journal on Applied Signal Processing, Special Issue on Video Analysis and Coding for Robust Transmission, 2006.

M. Wu, R. Joyce, H-S. Wong, L. Guan, and S-Y. Kung: "Dynamic Resource Allocation via Video Content and Short-term Traffic Statistics", IEEE Trans. on Multimedia, Special Issue on Multimedia over IP, vol.3, no.2, pp.186-199, June 2001.
 

H. Gou and M. Wu: "Data Hiding in Curves with Applications to Fingerprinting Maps," IEEE Trans. on Signal Proc., Special Issue on Secure Media, vol. 53, no. 10, pp. 3988-4005, Oct. 2005.

M. Wu and B. Liu: "Data Hiding in Binary Image for Authentication and Annotation", IEEE Trans. on Multimedia, vol. 6, no. 4, pp.528-538, August 2004.

M. Wu: "Joint Security and Robustness Enhancement for Quantization Based Embedding," IEEE Trans. on Circuits and Systems for Video Technology, Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp.831-841, August 2003.

M. Wu and B. Liu: "Data Hiding in Image and Video: Part-I – Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685-695, June 2003.  (see also Part-II on designs and applications)

C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, and I.J. Cox: "Rotation, Scale, and Translation Resilient Public Watermarking for Images", IEEE Trans. on Image Processing, vol.10, no.5, pp.767-782, May 2001.

 


Selected Talks



Books and Book Chapters

  1. M. Wu and B. Liu: Multimedia Data Hiding, Springer-Verlag Publisher, ISBN# 0387954260, October 2002.  cites GS (112)
    
  1. K.J.R. Liu, W. Trappe, Z.J. Wang, M. Wu, and H. Zhao: Multimedia Fingerprinting Forensics for Traitor Tracing, EURASIP Book Series on Signal Processing and Communications, Hindawi Publishing Co., ISBN# 9775945186, 2005.  cites GS (34)
 
  1. M. Wu and Q. Sun: “Video Security and Protection,” in The Essential Guide to Video Processing, edited by A. Bovik, Elsevier, 2009.
 


Journal Publications   => ResearcherID

  1. M. Stamm, M. Wu, and K.J.R. Liu: "Information Forensics: An Overview of the First Decade," invited paper for the inaugural issue, IEEE Access, to appear 2013.
     
  2. R. Garg, A.L. Varna, and M. Wu: “An Efficient Gradient Descent Approach for Secure Localization in Resource Constrained Wireless Sensor Networks,” IEEE Trans. on Info. Forensics and Security, vol. 7, no. 2, pp. 717-730, April 2012.
     
  3. A.L. Varna and M. Wu, " Modeling and Analysis of Correlated Binary Fingerprints for Content Identification,” IEEE Trans. on Info. Forensics and Security, vol. 6, no. 3, Sept. 2011. [PDF]
     
  4. A.L. Varna, S. He, A. Swaminathan, and M. Wu: “Fingerprinting Compressed Multimedia Signals,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 330-345, September 2009.  (TIFS Top 20 annual downloads in '09) 
     
  5. H. Gou, A. Swaminathan, and M. Wu: “Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 476-491, September 2009.    
     
  6. A. Swaminathan, M. Wu, and K.J.R. Liu: “Component Forensics: Theory, Methodologies, and Applications,” Special Issue on Digital Forensics, IEEE Signal Processing Magazine, March 2009. 
     
  7. S. He, D. Kirovski, and M. Wu: “High-Fidelity Data Embedding for Image Annotation,” IEEE Trans. on Image Processing, vo. 18, no. 2, February 2009. 
     
  8. M. Chen, G-M. Su, and M. Wu: “Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing,” IEEE Trans. on Multimedia, vol. 10, no. 5, pp. 910-925, August 2008.  
     
  9. A. Swaminathan, M. Wu, and K.J.R. Liu: “Digital Image Forensics via Intrinsic Fingerprints,” IEEE Trans. on Info. Forensics and Security, vol. 3, no. 1, pp.101-117, March 2008. (TIFS Top 4 annual downloads in '08 & '09; Top 1 monthly donwloads in Mar.'09)  cites ISI-J (21); GS (54); GSm (80)
     
  10. S. He and M. Wu: “Adaptive Detection for Group-based Multimedia Fingerprinting,” IEEE Signal Processing Letters, vol. 14, no. 12, pp.964-967, December 2007. 
     
  11. S. He and M. Wu: “Collusion-Resistant Video Fingerprinting for Large User Group,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 4, pp. 697-709, December 2007. 
     
  12. Y. Mao and M. Wu: “Unicity Distance of Robust Image Hashing,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 3, pp. 462-467, September 2007.   (TIFS Top 6 monthly downloads in Nov.'07)  cites ISI-J (13); GS (22)
     
  13. G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, “Joint Uplink and Downlink Optimization for Real-Time Multiuser Video Streaming over WLANs,” IEEE Journal of Selected Topics in Signal Processing, Special Issue on Network-Aware Multimedia Proc. & Communications, vol. 1, no. 2, pp. 280-294, August 2007. 
     
  14. Y. Mao and M. Wu: “Tracing Malicious Relay Nodes in Cooperative Wireless Communications,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 2, pp. 198-212, June 2007. (TIFS Top 20 annual downloads in '07)  
     
  15. A. Swaminathan, M. Wu, and K.J.R. Liu: “Nonintrusive Component Forensics of Visual Sensors Using Output Images,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 91-106, March 2007.  (TIFS Top 12 highest cited paper)   cites ISI-J (41); GS (63); GSm (133)
     
  16. Z. Han, G-M. Su, A. Kwasinski, M. Wu and K.J.R. Liu: "Distortion Management of Real-time MPEG-4 FGS Video Over Downlink Multi-code CDMA Networks", IEEE Trans. on Wireless Communications, vol. 5, no. 11, pp.3056-3067, Nov. 2006. 
     
  17. G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, "A Scalable Multiuser Framework for Video Over OFDM Networks: Fairness and Efficiency", IEEE Trans. on Circuits and Systems for Video Technologies, vol. 16, no. 10, pp.1217-1231, Oct. 2006. 
     
  18. Y. Mao, Y. Sun, M. Wu, and K.J.R. Liu: "JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Agreement", ACM/IEEE Trans. on Networking, vol. 14, no. 5, pp. 1128-1140, Oct. 2006.  cites ISI-J (12); GS (19); GSm (35)
     
  19. M. Chen, Y-F. Zheng, and M. Wu: "Classification-Based Spatial Error Concealment for Visual Communications," EURASIP Journal on Applied Signal Processing, Special Issue on Video Analysis and Coding for Robust Transmission, 2006. 
     
  20. Y. Mao and M. Wu: "A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption", IEEE Trans. on Image Processing, vol. 15, no. 7, pp. 2061-2075, July 2006.  cites ISI-J (25); GS (59); GSm (116)
     
  21. S. He and M. Wu: "Joint Coding and Embedding Techniques for Multimedia Fingerprinting," IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 231-247, June 2006. (TIFS Top 10 highly cited paper)  cites ISI-J (34); GS (69); GSm (102)
     
  22. A. Swaminathan, Y. Mao, and M. Wu: “Robust and Secure Hashing for Images,” IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 215-230, June 2006. [PDF]  (TIFS Top 4 highly cited paper; PDF here includes corrections of production and abbreviation typos and brief clarifications on security analysis.)  cites ISI-J (69); GS (135); GSm (180)
     
  23. G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, “Multiuser Cross-Layer Resource Allocation for Video Transmission over Wireless Networks,” IEEE Network Magazine, Special Issue on Multimedia over Broadband Wireless Networks, vol. 20, no. 2, pp.21-27, March 2006. 
     
  24. H. Gou and M. Wu: "Data Hiding in Curves with Applications to Fingerprinting Maps," IEEE Trans. on Signal Proc., Special Issue on Secure Media, vol. 53, no. 10, pp. 3988-4005, Oct. 2005.  cites ISI-J (14); GS (36); GSm (54)
     
  25. G-M. Su and M. Wu: "Efficient Bandwidth Resource Allocation for Low-Delay Multiuser Video Streaming," IEEE Trans. on Circuits and Systems for Video Technologies, vol. 15, no. 9, pp. 1124-1137, Sept. 2005.  cites ISI-J (13); GS(25)
     
  26. Z. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu: “Anti-Collusion Forensics of Multimedia Fingerprinting Using Orthogonal Modulation,” IEEE Trans. on Image Proc., vol. 14, no. 6, pp.804-821, June 2005.  cites ISI-J (46); GS (125); GSm (162)
     
  27. H. Zhao, M. Wu, Z. Wang, and K.J.R. Liu: "Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting," IEEE Trans. on Image Proc., vol. 14, no. 5, pp.646-661, May 2005.  cites ISI-J (50); GS (94); GSm (134)
     
  28. Z. Wang, M. Wu, W. Trappe, and K.J.R. Liu: "Group-Oriented Fingerprinting for Multimedia Forensics", EURASIP Journal on Applied Signal Processing, Special Issue on Multimedia Security and Rights Management, vol.2004:14, pp.2153-2173, October 2004. [Received 2004 EURASIP Best Paper Award]   cites ISI-J (24); GS (64)
     
  29. M. Wu and B. Liu: "Data Hiding in Binary Image for Authentication and Annotation", IEEE Trans. on Multimedia, vol. 6, no. 4, pp.528-538, August 2004. (TMM Top 20 highly cited paper)   cites ISI-J (88); GS (205); GSm (374)
     
  30. M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, vol. 21, no. 2, pp.15-27, March 2004.   cites ISI-J (69); GS (151)
     
  31. M. Wu: "Joint Security and Robustness Enhancement for Quantization Based Embedding," IEEE Trans. on Circuits and Systems for Video Technology, Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp.831-841, August 2003.   cites ISI-J (20); GS (28)
     
  32. M. Wu, H. Yu, and B. Liu: "Data Hiding in Image and Video: Part-II – Designs and Applications", IEEE Trans. on Image Proc., vol.12, no.6, pp.696-705, June 2003.   cites ISI-J (29); GS (51); GSm (96)
     
  33. M. Wu and B. Liu: "Data Hiding in Image and Video: Part-I – Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685-695, June 2003.   cites ISI-J (63); GS (110); GSm (146)
     
  34. W. Trappe, M. Wu, Z. Wang, and K.J.R. Liu: "Anti-collusion Fingerprinting for Multimedia", IEEE Trans. on Signal Processing, Special issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, vol. 51, no. 4, pp.1069-1087, April 2003. [Received 2005 IEEE Signal Processing Society Best Paper Award]    cites ISI-J (134); GS (264) 
     
  35. M. Wu, R. Joyce, H-S. Wong, L. Guan, and S-Y. Kung: "Dynamic Resource Allocation via Video Content and Short-term Traffic Statistics", IEEE Trans. on Multimedia, Special Issue on Multimedia over IP, vol.3, no.2, pp.186-199, June 2001.  cites ISI-J (21); GS (48)
     
  36. C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, and I.J. Cox: "Rotation, Scale, and Translation Resilient Public Watermarking for Images", IEEE Trans. on Image Processing, vol.10, no.5, pp.767-782, May 2001. (TIP Top 50 highly cited paper)     cites ISI-J (247); GS (483)
     

Conference Publications

  1. R. Garg, A. Hajj-Ahmad and M. Wu, "Geo-Location Estimation from Electrical Network Frequency Signals," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2013), Vancouver, Canada, to appear May 2013.
  2. H. Su, R. Garg, A. Hajj-Ahmad and M. Wu, "Geo-Location Estimation from Electrical Network Frequency Signals," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2013), Vancouver, Canada, to appear May 2013.
  3. R. Garg, A.L. Varna, and M. Wu: "Modeling and Analysis of Electric Network Frequency Signal for Timestamp Verification," Proc. of IEEE Workshop on Info. Forensics and Security (WIFS), Tenerife, Spain, Dec. 2012. [30% acceptance rate for regular paper]
  4. A. Hajj-Ahmad, R. Garg and M. Wu: "Instantaneous Frequency Estimation and Localization for ENF Signals," Proc. of Annual Summit and Conf. of the Asia-Pacific Signal and Info. Processing Association (APSIPA), Invited Paper, Dec. 2012.
     
  5. W-H. Chuang, R. Garg, and M. Wu, "How Secure are Power Network Signature Based Time Stamps?” Proc. of 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, Oct. 2012. [19% acceptance for long paper]
  6. W. Lu and M. Wu, "Reduced-Reference Quality Assessment for Retargeted Images," Proc. of IEEE Int. Conf. on Image Processing (ICIP'12), Orlando, FL, Oct. 2012.
  7. Hui Su, W-H. Chuang, W. Lu, and M. Wu, "Evaluating the Quality of Individual SIFT Features," Proc. of IEEE Int. Conf. on Image Processing (ICIP'12), Orlando, FL, Oct. 2012.
  8. W-H. Chuang and M. Wu, "Robustness of Color Interpolation Identification against Anti-Forensic Operations," Proc. of Information Hiding Workshop (IH'12), Berkeley, CA, May 2012.
  9. R. Garg, A.L. Varna and M. Wu, "A Gradient Descent Based Approach to Secure Localization in Mobile Sensor Networks," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2012), Kyoto, Japan, March 2012.
     
  10. R. Garg, A.L. Varna and M. Wu, " 'Seeing' ENF: Natural Time Stamp for Digital Video via Optical Sensing and Signal Processing," Proc. of ACM Multimedia, Scottsdale, Arizona, Nov. 2011. [58/335=17% acceptance rate for long paper; ranked top 3; Best Student Paper Award]
  11. W. Lu and M. Wu, "Seam Carving Estimation Using Forensic Hash," long paper accepted by ACM Multimedia Security Workshop (MM&Sec), Buffalo, NY, Oct. 2011.
  12. W-H. Chuang and M. Wu, "Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video," IEEE Int. Conf. on Image Processing (ICIP'11), Brussels, Belgium, Sept. 2011.
  13. W. Lu, A.L. Varna, and M. Wu, “Secure Video Processing: Problems and Challenges,” Invited Paper, Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, May 2011.
  14. A.L. Varna and M. Wu, “Modeling Temporal Correlations in Content Fingerprints,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2011), Prague, Czech Republic, May 2011.
     
  15. W-H. Chuang and M. Wu, "Semi Non-Intrusive Training for Cell-Phone Camera Model Linkage," Proc. of IEEE Int. Workshop on Information Forensics and Security (WIFS 2011), Seattle, WA, December 2010. [28% acceptance rate]
  16. W. Lu and M. Wu, "Multimedia Forensic Hash based on Visual Words," IEEE Int. Conf. on Image Processing (ICIP'10), Hong Kong, Sept. 2010.
  17. W-C. Chuang, A.L. Varna, and M. Wu, "Performance Impact of Ordinal Ranking on Content Fingerprinting," IEEE Int. Conf. on Image Processing (ICIP'10), Hong Kong, Sept. 2010.
  18. W. Lu, A.L. Varna, and M. Wu, "Security Analysis for Privacy Preserving Search of Multimedia," IEEE Int. Conf. on Image Processing (ICIP'10), Hong Kong, Sept. 2010.
  19. R. Garg, A.L. Varna, and M. Wu, "Gradient Descent Approach for Secure Localization in Resource Constrained Wireless Sensor Networks," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2010), pp. 1854-1857, Dallas, TX, March 2010. [PDF]
     
  20. W. Lu, A.L. Varna, and M. Wu, "Forensic Hash for Multimedia Information", Proc. of SPIE, vol. 7541, Conf. on Media Forensics and Security, January 2010. [PDF]
  21. A.L. Varna, W-H. Chuang, and M. Wu, "A Framework for Theoretical Analysis of Content Fingerprinting", Proc. of SPIE, vol. 7541, Conf. on Media Forensics and Security, January 2010. [PDF]
  22. A.L. Varna and M. Wu, "Modeling Content Fingerprints Using Markov Random Fields", Proc. of IEEE Int. Workshop on Information Forensics and Security (WIFS'09), pp. 111-115, London, UK, December 2009. [PDF]
  23. W-H. Chuang, A.L. Varna, and M. Wu, "Modeling and Analysis of Ordinal Ranking in Content Fingerprinting," Proc. of IEEE Int. Workshop on Information Forensics and Security (WIFS'09), pp. 116-120, London, UK, December 2009. [PDF]
  24. A.L. Varna and M. Wu, "Theoretical Modeling and Analysis of Content Identification", invited paper in Special Session on Content Identification/Fingerprints, IEEE International Conference on Multimedia and Expo (ICME), July 2009. [PDF]
     
  25. W. Lu, A.L. Varna, A. Swaminathan, and M. Wu, "Secure Image Retrieval Through Feature Protection," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'09), Taipei, Taiwan, April 2009. [PDF]
  26. W-H. Chuang, A. Swaminathan, and M. Wu, "Tampering Identification Using Empirical Frequency Response," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'09), Taipei, Taiwan, April 2009. [PDF]
  27. W. Lu, A. Swaminathan, A.L. Varna, and M. Wu, "Enabling Search over Encrypted Multimedia Databases", Proc. of SPIE, vol. 7254, Conf. on Media Forensics and Security, January 2009.  [PDF]
  28. A.L. Varna, A. Swaminathan, and M. Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", Proc. of ACM Digital Rights Management Workshop, pp. 67-76, Oct. 2008. [PDF]
  29. M. Taylor, C-E. Yin, M. Wu, and G. Qu: “A Hardware-Assisted Data Hiding Based Approach in Building High Performance Secure Execution Systems,” Proc. of IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, June 2008.
     
  30. C.E. McKay, A. Swaminathan, H. Gou, and M. Wu, “Image Acquisition Forensics: Forensic Analysis to Identify Imaging Source,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'08), Las Vegas, NV, April 2008.
  31. A. Swaminathan, M. Wu, and K.J.R. Liu, “A Pattern Classification Framework for Theoretical Analysis of Component Forensics,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'08), Las Vegas, NV, April 2008.
  32. W. Luo, M. Wu, and J. Huang, “MPEG Recompression Detection Based on Block Artifacts,” SPIE Conference on Security, Forensics, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 6819, January 2008.
  33. A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D. Oard, “Confidentiality-Preserving Rank-Ordered Search,” 3rd ACM International Workshop on Storage Security and Survivability (StorageSS 2007), Alexandria, VA, Oct. 2007. [PDF]
  34. 70. A. Swaminathan, M. Wu, and K.J.R. Liu, “A Component Estimation Framework for Information Forensics,” Proc. of IEEE Workshop on Multimedia Signal Processing (MMSP'07), Chania, Crete, Greece, Oct. 2007.
     
  35. H. Gou, A. Swaminathan, and M. Wu, “Noise Features for Image Tampering Detection and Steganalysis,” Proc. of IEEE Int. Conf. on Image Processing (ICIP'07), San Antonio, TX, Sept. 2007.
  36. H. Gou and M. Wu, “Improving Embedding Payload in Binary Images with ‘Super-Pixels’,” Proc. of IEEE Int. Conf. on Image Processing (ICIP'07), San Antonio, TX, Sept. 2007.
  37. A.L. Varna, S. He, A. Swaminathan, and M. Wu, “Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia,” Proc. of IEEE Int. Conf. on Image Processing (ICIP'07), San Antonio, TX, Sept. 2007.
  38. M. Wu, A. Swaminathan, and Y. Mao, “A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing,” Proc. of IEEE Workshop on Statistical Signal Processing (SSP’07), Madison, Wisconsin, August 2007.
  39. A. Swaminathan, M. Wu, and K.J.R. Liu, “Optimization of Input Pattern for Semi Non-Intrusive Component Forensics of Digital Cameras,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'07), Honolulu, Hawaii, April 2007.
     
  40. S. He, D. Kirovski, and M. Wu, “Colluding Fingerprinted Video Using The Gradient Attack,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'07), Honolulu, Hawaii, April 2007.
  41. S. He and M. Wu, “Collusion-Resistant Dynamic Fingerprinting For Multimedia,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'07), Honolulu, Hawaii, April 2007.
  42. A.L. Varna, S. He, A. Swaminathan, M. Wu, H. Lu, and Z. Lu, “Collusion-Resistant Fingerprinting For Compressed Multimedia Signals,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'07), Honolulu, Hawaii, April 2007.
  43. H. Gou, A. Swaminathan, and M. Wu, “Robust scanner identification based on noise features,” SPIE Conference on Security, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 6505, February 2007.
  44. A. Swaminathan, M. Wu, and K.J.R. Liu: “Forensic Analysis via Intrinsic Fingerprints,” SPIE Conference on Security, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 6505, February 2007.
     
  45. A. Swaminathan, M. Wu, and K.J.R. Liu: “Image Tampering Identification Using Blind Deconvolution,” IEEE Int. Conf. on Image Processing (ICIP'06), Atlanta, Georgia, pp. 2311-2314, Oct. 2006.
  46. S. He and M. Wu: “Collusion-Resistant Video Fingerprinting for Large User Group,” IEEE Int. Conf. on Image Processing (ICIP'06), Atlanta, Georgia, pp. 2303-2306, Oct. 2006.
  47. G-M. Su, M. Chen, and M. Wu: “Cross-Path PDMA-based Error Protection for Streaming Multiuser Video over Multiple Paths,” IEEE Int. Conf. on Image Processing (ICIP'06), Atlanta, Georgia, pp. 21-24, Oct. 2006.
  48. M. Chen, G-M. Su, and M. Wu: “Robust Distributed Multi-Point Video Conferencing over Error-Prone Channels,” Proc. of IEEE International Conference on Multimedia & Expo (ICME'06), Toronto, Canada, July 2006.
  49. Y. Mao and M. Wu: “Security Issues in Cooperative Communications: Tracing Adversarial Relay," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'06), Toulouse, France, vol.4, pp. 69-72, May 2006.
     
  50. A. Swaminathan, M. Wu, and K.J.R. Liu: “Non-intrusive Forensic Analysis of Visual Sensors Using Output Images,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'06), Toulouse, France, vol. 5, pp.401-404, May 2006.
  51. A. Swaminathan, M. Wu, and K.J.R. Liu: “Component Forensics for Digital Camera: A Non-intrusive Approach,” Proc. of Conf. on Info. Sciences and Systems (CISS), invited paper, Princeton, NJ, pp. 1194-1199, March 2006.
  52. A. Swaminathan, S. He, and M. Wu: “Exploring QIM based Anti-Collusion Fingerprinting for Multimedia,” SPIE Conference on Security, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 6072, pp. 698-709, January 2006.
  53. H. Gou and M. Wu: “Fingerprinting Digital Elevation Maps,” SPIE Conference on Security, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 6072, pp. 373-384, January 2006.
  54. Y. Mao and M. Wu: “Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage,” Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’2005), Alexandria, VA, pp.117-128, Nov. 2005.
     
  55. S. He and M. Wu: “Performance Study on Multimedia Fingerprinting Employing Traceability Codes,” International Workshop on Digital Watermarking (IWDW’05), Siena, Italy, and Lecture Notes on Computer Science (LNCS), vol. 3710, pp.84-96, Sept. 2005.
  56. S. He and M. Wu: "Building Efficient and Effective Multimedia Fingerprinting via Joint Coding and Embedding," Proc. of ACM Multimedia and Security Workshop, New York City, NY, pp.127-136, Aug. 2005.
  57. A. Swaminathan, Y. Mao, M. Wu, and Krishnan Kailas: “Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance,” 7th International Information Hiding Workshop (IHW), Barcelona, Spain, and Lecture Notes on Computer Science (LNCS),  vol. 3727, pp.357-371, June 2005.
  58. A. Swaminathan, Y. Mao and M. Wu: “Security of Feature Extraction in Image Hashing,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05), vol. 2, pp. 1041– 1044, Philadelphia, PA, March 2005.  [Received ICASSP’05 Student Paper Award]
  59. S. He and M. Wu: “Improving Collusion Resistance of Error Correcting Code Based Multimedia Fingerprinting,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05), vol. 2, pp. 1029 – 1032, Philadelphia, PA, March 2005.
     
  60. H. Gou and M. Wu: “Robust Digital Fingerprinting for Curves,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05), vol. 2, pp. 529-532, Philadelphia, PA, March 2005.
  61. G-M. Su, Z. Han, M. Wu, and K.J.R. Liu: “Joint Uplink and Downlink Optimization for Video Conferencing over Wireless LAN,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05), vol. 2, pp 1101-1104, Philadelphia, PA, March 2005.
  62. S. He and M. Wu: “Group-Oriented Joint Coding and Embedding Technique for Multimedia Fingerprinting,” SPIE Conference on Security, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 5681, pp. 96-105, January 2005.
  63. M. Wu, J. Fridrich, M. Goljan, and H. Gou: “Handling Uneven Embedding Capacity in Binary Images: A Revisit,” SPIE Conference on Security, Watermarking and Steganography, San Jose, CA, Proc. of SPIE, vol. 5681, pp. 194-205, January 2005.
    3727, pp.357-371, June 2005.
  64. G-M. Su, Z. Han, M. Wu, and K.J.R. Liu: "Dynamic Distortion Control for 3-D Embedded Wavelet Video over Multiuser OFDM Networks," Proc. of IEEE International Conference on Global Communications (Globecom'04), vol. 2, pp.650-654, Dallas, Texas, Dec. 2004.
     
  65. H. Gou and M. Wu: "Fingerprinting Curves," International Workshop on Digital Watermarking (IWDW'04), Seoul, Korea, invited paper, in Lecture Notes on Computer Science (LNCS) vol. 3304, pp.13-28, Oct. 2004.
  66. H. Gou and M. Wu: "Data Hiding in Curves for Collusion-Resistant Digital Fingerprinting," Proc. of IEEE International Conference on Image Processing (ICIP'04), pp. 51-54, Singapore, Oct. 2004.
  67. Y. Mao and M. Wu: "Security Evaluation for Communication-Friendly Encryption of Multimedia," Proc. of IEEE International Conf. on Image Processing (ICIP'04), Special Session on Multimedia Security Issues in Streaming and Mobile Applications, pp. 569-572, Singapore, Oct. 2004.
  68. A. Swaminathan, Y. Mao and M. Wu: “Image Hashing Resilient to Geometric and Filtering Operations,” Proc. of IEEE Workshop on Multimedia Signal Processing (MMSP'04), pp.355-358, Siena, Italy, Sept. 2004.
  69. G-M. Su and M. Wu: "Efficient Bandwidth Resource Allocation for Low-Delay Multiuser MPEG-4 Video Transmission," Proc. of IEEE Inter. Conf. on Communications (ICC'04), Multimedia Technologies and Services Symposium, vol. 3, pp.1308-1312, Paris, France, Jun. 2004.
     
  70. G-M. Su, Z. Han, A. Kwasinski, M. Wu, K.J.R. Liu, and N. Farvardin: "Distortion Management of Real-time MPEG-4 FGS Video over Downlink Multicode CDMA Networks", Proc. of IEEE Inter. Conf. on Communications (ICC'04), Wireless Communications Symposium, vol. 5, pp.3071-3075, Paris, France, Jun. 2004.
  71. S. He and M. Wu: "Performance Study on ECC-based Collusion-Resistant Multimedia Fingerprinting," Proc. of Conferences on Information Sciences and Systems (CISS’04), invited paper, pp.827-832, Princeton, NJ, March 2004.
  72. Y. Mao, Y. Sun, M. Wu, and K.J.R. Liu: "Dynamic Join-Exit Amortization and Scheduling for Time-Efficient Group Key Agreement", Proc. of IEEE Infocom '2004, vol. 4, pp.2617-2627, Hong Kong, March 2004. [Acceptance rate 18.4% out of 1420]
  73. M. Wu: "Distortion Compensated Lookup-Table Embedding: Joint Security and Robustness Enhancement for Quantization Based Data Hiding", Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE, vol. 5306, pp. 610-621, Jan. 2004.
  74. M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Multimedia Fingerprinting: A Unified Framework", Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE, vol. 5306, pp.748-759, Jan. 2004.
     
  75. M. Chen, M. Wu, and Y-F. Zheng: "Classification-Based Spatial Error Concealment for Images," Proc. of IEEE International Conference on Image Processing (ICIP'03), vol. 2, pp. 675-678, Barcelona, Spain, Sept. 2003.
  76. M. Wu: "Joint Security and Robustness Enhancement for Quantization Based Embedding," Proc. of IEEE International Conference on Image Processing (ICIP'03), vol. 2, pp.14-17, Barcelona, Spain, Sept. 2003.
  77. Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu: "Anti-Collusion of Group-Oriented Fingerprinting," Proc. of IEEE International Conference on Multimedia & Expo (ICME'03), vol. 2, pp.217-220, Baltimore, MD, July 2003.
  78. H. Zhao, M. Wu, Z.J. Wang, and K.J.R. Liu: "Performance of Detection Statistics Under Collusion Attacks on Independent Multimedia Fingerprints," Proc. of IEEE International Conference on Multimedia & Expo (ICME'03), vol. 1, pp.205-208, Baltimore, MD, July 2003.
  79. Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu: "Resistance of Orthogonal Gaussian Fingerprints to Collusion Attacks," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'03), invited paper, Special Session on Multimedia Security and Rights Management, vol. 4, pp.724-727, Hong Kong, April 2003.
     
  80. H. Zhao, M. Wu, Z.J. Wang, and K.J.R. Liu: "Nonlinear Collusion Attacks on Independent Fingerprints For Multimedia," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'03), vol. 5, pp. 664-667, Hong Kong, April 2003.
  81. M. Wu and Y. Mao: "Communication-Friendly Encryption of Multimedia", Proc. of IEEE Multimedia Signal Processing Workshop (MMSP'02), pp.292-295, St. Thomas, U.S. Virgin Islands, Dec. 2002.
  82. W. Trappe, M. Wu, and K.J.R. Liu: "Anti-Collusion Codes: Multi-User and Multimedia Perspectives," Proc. of IEEE International Conference on Image Processing (ICIP'02), vol.2, pp.149-152, Rochester, NY, Sept. 2002.
  83. X-L. Wu and M. Wu: "A Recognition Algorithm for Chinese Characters With Diverse Fonts", Proc. of IEEE International Conference on Image Processing (ICIP'02), vol.3, pp.981-984, Rochester, NY, Sept. 2002.
  84. W. Trappe, M. Wu, and K.J.R. Liu: "Joint Coding and Embedding for Collusion-Resistant Fingerprinting," invited paper, Proc. of EUSIPCO 2002, invited paper, special session on Security Issues in Digital Watermarking, Toulouse, France, Sept. 2002.
     
  85. W. Trappe, M. Wu, and K.J.R. Liu: "Collusion-Resistant Fingerprinting for Multimedia," Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'02), vol.4, pp.3309-3312, Orlando, FL, May 2002.
  86. P. Yin, M. Wu, and B. Liu: "A Robust Error Resilient Approach for MPEG Video Transmission Over Internet", Proc. of SPIE, vol.4671, Inter. Conference on Visual Comm. & Image Processing (VCIP'02), pp.103-111, San Jose, CA, Jan. 2002.
  87. S. Craver, M. Wu, and B. Liu: "What Can We Reasonably Expect from Watermark?", Proc. of IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, pp.223-226, New Paltz, NY, Oct. 2001.
  88. M. Wu and B. Liu: "Modulation and Multiplexing Techniques for Multimedia Data Hiding", Invited paper, Proc. of SPIE, vol. 4518, Multimedia Systems and Applications IV, pp.228-238, ITcom'01 Conference, Denver, CO, Aug. 2001.
  89. S.A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, and E.W. Felten: "Reading Between the Lines: Lessons from the SDMI Challenge", Proc. of 10th Usenix Security Symposium, Washington, DC, Aug. 2001. Also was accepted by the 4th Info. Hiding Workshop.
     
  90. M. Wu, S.A. Craver, E.W. Felten, and B. Liu: "Analysis of Attacks on SDMI Audio Watermarks", Proc. of IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP'01), vol.3, pp.1369-1372, Salt Lake City, UT, May 2001.
  91. H-S. Wong, M. Wu, R. Joyce, L. Guan, and S-Y. Kung: "A Neural Network Approach For Predicting Network Resource Requirement in Video Transmission", IEEE Pacific Rim Conference on Multimedia (PCM'00), pp. 116-119, Sydney, Australia, Dec. 2000.
  92. P. Yin, M. Wu, and B. Liu: "Video Transcoding by Reducing Spatial Resolution", Proc. of IEEE International Conference on Image Processing (ICIP'00), vol.1, pp.972-975, Vancouver, Canada, Sept. 2000.
  93. M. Wu, R. Joyce, and S-Y. Kung: "Dynamic Resource Allocation via Video Content and Short-term Traffic Statistics", Proc. of IEEE International Conference on Image Processing (ICIP'00), invited paper, vol.3, pp.58-61, Vancouver, Canada, Sept. 2000.
  94. M. Wu and H. Yu: "Video Access Control via Multi-level Data Hiding", Proc. of IEEE International Conference on Multimedia & Expo (ICME'00), vol.1, pp.381-384, New York City, NY, Aug. 2000.
     
  95. M. Wu, E. Tang, and B. Liu: "Data Hiding in Binary Image", Proc. of IEEE International Conf. on Multimedia & Expo (ICME'00), vol.1, pp.393-396, New York City, NY, Aug. 2000.
  96. C-Y. Lin, M. Wu, J.A. Bloom, M.L. Miller, I.J. Cox, and Y-M. Lui: "Rotation, Scale, and Translation Resilient Public Watermarking for Images," Proc. of SPIE, vol. 3971, Security and Watermarking of Multimedia Contents II, pp.90-98, Electronic Imaging Conferences (EI'00), San Jose, CA, Jan. 2000.
  97. M. Wu and B. Liu: "Attacks on Digital Watermarks", Proc. of 33rd Asilomar Conference on Signals, Systems, and Computers, vol.2, pp.1508-1512, Pacific Grove, CA, Oct. 1999.
  98. M. Wu and B. Liu: "Digital Watermarking Using Shuffling", Proc. of IEEE International Conference on Image Processing (ICIP'99), vol.1, pp.291-295, Kobe, Japan, Oct. 1999.
  99. M. Wu, H. Yu, and A. Gelman: "Multi-level Data Hiding for Digital Image and Video", Proceedings of SPIE, vol. 3845, Multimedia Systems and Applications II, pp.10-21, Photonics East Conference, Boston, MA, Sept. 1999.
     
  100. M. Wu, W. Wolf, and B. Liu: "An Algorithm for Wipe Detection", Proc. of IEEE International Conference on Image Processing (ICIP'98), vol.1, pp.893-897, Chicago, IL, Oct. 1998.
  101. M. Wu and B. Liu: "Watermarking for Image Authentication", Proc. of IEEE International Conference on Image Processing (ICIP'98), vol.2, pp.437-441, Chicago, IL, Oct. 1998. cites GS (279)
  102. X-L. Wu and M. Wu: "An Experimental System of Multi-font Multi-Language Character Recognition", Proc. of National Conf. on Character Recognition and Document Analysis, China, pp.59-66, Sept. 1996 (in Chinese).
  103. M. Wu: "An OCR Approach Based on Peripheral Direction Contributivity and Orthogonal Experimental Analysis", Proc. of 1st Symposium of Undergraduate Research in Science and Technology, pp.44-51, Tsinghua University, Beijing, April 1996 (in Chinese).
     

Patents   (issuedcitations)

  1. J. Bloom, M. Miller, I. Cox, M. Wu, C-Y. Lin, and Y-M. Lui: "Rotation, Scale, and Translation Resilient Public Watermarking for Images Using a Log-polar Fourier Transform," US Patent 6,282,300, issued Aug. 28, 2001. (Cited by 78 patents)
     
  2. M. Wu and B. Liu: "Watermarking Scheme for Image Authentication," US Patent 6,285,775, issued Sept. 4, 2001. (Cited by 126 patents)
     
  3. H. Yu, M. Wu, X. Li, and A. Gelman: "Methods and Apparatus for Multi-layer Data Hiding," US Patent 6,456,726, issued Sept. 24, 2002. (Cited by 45 patents)
     
  4. M. Wu and H. Yu: "Human Visual Model for Data Hiding," US Patent 6,611,608, issued Aug. 26, 2003.  (Cited by 20 patents)
     
  5. M. Wu, R. Joyce, A. Vetro, H-S. Wong, L. Guan, and S-Y. Kung: "Dynamic Network Resource Allocation Using Multimedia Content Features and Traffic Features," US Patent 6,947,378, issued Sept. 20, 2005.   (Cited by 1 patent)

     
  6. M. Wu and H. Gou: “Method for concealing data in curves of an image," U.S. Patent 7,817,817, provisional filing Sept. 2004, formal filing Sept. 2005, issued on Oct. 19, 2010.
     
  7. S. He and M. Wu: “Method for fingerprinting multimedia content," U.S. Patent 7,814,564, provisional filing Jan. 2005, formal filing Jan. 2006, issued on Oct. 12, 2010. (Licensed to industry in North and Latin America by UMD)
     
  8. M. Wu, A. Swaminathan, and Y. Mao: “Data Hiding in Compiled Program Binaries for Supplementing Computer Functionality,” U.S. Patent 7,840,789, provisional filing June 2005, formal filing June 2006, issued on Nov. 23, 2010.

     
  9. A. Swaminathan, M. Wu, and K.J.R. Liu: “Non-intrusive Component Forensics for Visual Sensors and Devices,” filed March 2006.
     
  10. A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D. Oard, “Confidentiality-Preserving Rank-Ordered Search,” filed Oct. 2007.

 


Last updated: December 2011.

Paper citation statistics are as of summer 2011:  ISI-J (citation of journal articles per ISI Web of Science),  GS (citation per Harzing's Publish or Perish based on Google Scholar search results), GSm (merging citations per Google Scholar of a journal article with citations of its preceding conference publications).  Some GS citation numbers may reflect merging multiple entries for the same paper. Patent citations by other patent are according to USPTO database.

Back to Min's Home Page