Research by Media And Security Team (MAST)
 

      Selected Papers by Areas          Books          Journal Papers         Conference Papers           Patents
 



MAST logo


Research Interests


Research and Educational Funding



Selected Publications by Topic Areas   
=> Google Citations; ISI ResearcherID (for journal articles)
 

NEW  C-W. Wong and M. Wu: “Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera,” IEEE Trans. on Info. Forensics and Security, vol. 12, no. 8, pp. 1885-1899, August 2017.

A. Hajj-Ahmad, R. Garg, and M. Wu: “ENF-Based Region-of-Recording Identification for Media Signals,” IEEE Trans. on Info. Forensics and Security, vol. 10, no. 6, pp. 1125-1136, June 2015. See also an IEEE SP Magazine article (Sept. 2016) on the global educational outreach based on this work.

W-H. Chuang, R. Garg, and M. Wu, "How Secure are Power Network Signature Based Time Stamps?” Proc. of 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, Oct. 2012. [19% acceptance for long paper] Extended journal version published in T-IFS, Dec. 2013.

Check this out  R. Garg, A.L. Varna and M. Wu, " 'Seeing' ENF: Natural Time Stamp for Digital Video via Optical Sensing and Signal Processing," Proc. of ACM Multimedia, Scottsdale, Arizona, Nov. 2011. [58/335=17% acceptance rate for long paper; Best Student Paper Award]

A. Swaminathan, M. Wu, and K.J.R. Liu: “Component Forensics: Theory, Methodologies, and Applications,” IEEE Signal Processing Magazine, March 2009.  => provided a roadmap and overview on Non-Intrusive Component/Camera Estimation (NICE); see details in journal papers (TIFS'07, TIFS'08)

H. Gou, A. Swaminathan, and M. Wu: “Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 476-491, September 2009.
 

Check this out A.L. Varna and M. Wu, " Modeling and Analysis of Correlated Binary Fingerprints for Content Identification,” IEEE Trans. on Info. Forensics and Security, vol. 6, no. 3, Sept. 2011. [PDF]

A.L. Varna, A. Swaminathan, and M. Wu, "A Decision Theoretic Framework for Analyzing Hash-based Content Identification Systems", Proc. of ACM Digital Rights Management Workshop, pp. 67-76, Oct. 2008. [PDF]

A. Swaminathan, Y. Mao, and M. Wu: “Robust and Secure Hashing for Images,” IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 215-230, June 2006. [PDF]  (related earlier work on secure hashing; see more security analysis on Unicity Distance in TIFS'07.  PDF here includes corrections of production and abbreviation typos and brief clarifications on security analysis.)
 

A. Kazemipour, J. Liu, P. Kanold, M. Wu, B. Babadi, “Fast and Stable Signal Deconvolution for Compressible State-Space Models,” IEEE Trans. on Biomedical Engineering, vol. 65, no. 1, pp.74-86, January 2018.

Q. Zhu, C-W. Wong, C-H. Fu, and M. Wu, “Fitness Heart Rate Measurement Using Face Videos,” Proc. of IEEE Int. Conf. on Image Processing (ICIP 2017), Beijing, China, Sept. 2017.
 

Look Inside  A.L. Varna, S. He, A. Swaminathan, and M. Wu: “Fingerprinting Compressed Multimedia Signals,” IEEE Trans. on Info. Forensics and Security, vol. 4, no. 3, pp. 330-345, September 2009.

S. He and M. Wu: "Joint Coding and Embedding Techniques for Multimedia Fingerprinting," IEEE Trans. on Info. Forensics and Security, vol. 1, no. 2, pp. 231-247, June 2006.   => see also TIFS'07 on large-scale video fingerprinting.

H. Gou and M. Wu: "Data Hiding in Curves with Applications to Fingerprinting Maps," IEEE Trans. on Signal Proc., Special Issue on Secure Media, vol. 53, no. 10, pp. 3988-4005, Oct. 2005.

M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, vol. 21, no. 2, pp.15-27, March 2004.  => provided a roadmap and overview; see details in journal papers (TSP'03, JASP'04, TIP'05, TIP'05, SPL'07)
 

W. Lu, A. Swaminathan, A.L. Varna, and M. Wu, "Enabling Search over Encrypted Multimedia Databases", Proc. of SPIE, vol. 7254, Conf. on Media Forensics and Security, January 2009.  [PDF

A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D. Oard, “Confidentiality-Preserving Rank-Ordered Search,” 3rd ACM International Workshop on Storage Security and Survivability (StorageSS 2007), Alexandria, VA, Oct. 2007. [PDF]

Y. Mao and M. Wu: "A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption", IEEE Trans. on Image Processing, vol. 15, no. 7, pp. 2061-2075, July 2006.
 

R. Garg, A.L. Varna, and M. Wu: “An Efficient Gradient Descent Approach for Secure Localization in Resource Constrained Wireless Sensor Networks,” IEEE Trans. on Info. Forensics and Security, vol. 7, no. 2, pp. 717-730, April 2012.

Look Inside Y. Mao and M. Wu: “Tracing Malicious Relay Nodes in Cooperative Wireless Communications,” IEEE Trans. on Info. Forensics and Security, vol. 2, no. 2, pp. 198-212, June 2007.

Y. Mao, Y. Sun, M. Wu, and K.J.R. Liu: "JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Agreement", ACM/IEEE Trans. on Networking, vol. 14, no. 5, pp. 1128-1140, Oct. 2006.  (earlier version appeared in INFOCOM'2004)

Y. Mao and M. Wu: “Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage,” Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’2005), Alexandria, VA, pp.117-128, Nov. 2005. [PDF]

Look Inside A. Swaminathan, Y. Mao, M. Wu, and Krishnan Kailas: “Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance,” 7th International Information Hiding Workshop (IHW), Barcelona, Spain, and Lecture Notes on Computer Science (LNCS),  vol. 3727, pp.357-371, June 2005. [PDF]
 

Check this out G-M. Su, Z. Han, M. Wu, and K.J.R. Liu, “Multiuser Cross-Layer Resource Allocation for Video Transmission over Wireless Networks,” IEEE Network Magazine, Special Issue on Multimedia over Broadband Wireless Networks, vol. 20, no. 2, pp.21-27, March 2006.   => provided a roadmap and overview; see details in journal papers (CSVT'06, TWC'06, JSTSP'07)

M. Chen, G-M. Su, and M. Wu: “Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing,” IEEE Trans. on Multimedia, vol. 10, no. 5, pp. 910-925, August 2008.   (see also an earlier CSVT'05 work on multiuser resource allocation)

M. Chen, Y-F. Zheng, and M. Wu: "Classification-Based Spatial Error Concealment for Visual Communications," EURASIP Journal on Applied Signal Processing, Special Issue on Video Analysis and Coding for Robust Transmission, 2006.

M. Wu, R. Joyce, H-S. Wong, L. Guan, and S-Y. Kung: "Dynamic Resource Allocation via Video Content and Short-term Traffic Statistics", IEEE Trans. on Multimedia, Special Issue on Multimedia over IP, vol.3, no.2, pp.186-199, June 2001.
 

H. Gou and M. Wu: "Data Hiding in Curves with Applications to Fingerprinting Maps," IEEE Trans. on Signal Proc., Special Issue on Secure Media, vol. 53, no. 10, pp. 3988-4005, Oct. 2005.

M. Wu and B. Liu: "Data Hiding in Binary Image for Authentication and Annotation", IEEE Trans. on Multimedia, vol. 6, no. 4, pp.528-538, August 2004.

M. Wu: "Joint Security and Robustness Enhancement for Quantization Based Embedding," IEEE Trans. on Circuits and Systems for Video Technology, Special Issue on Authentication, Copyright Protection, and Information Hiding, vol. 13, no. 8, pp.831-841, August 2003.

M. Wu and B. Liu: "Data Hiding in Image and Video: Part-I – Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685-695, June 2003.  (see also Part-II on designs and applications)

C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, and I.J. Cox: "Rotation, Scale, and Translation Resilient Public Watermarking for Images", IEEE Trans. on Image Processing, vol.10, no.5, pp.767-782, May 2001.

 


Selected Talks



Books and Book Chapters

  1. M. Wu and B. Liu: Multimedia Data Hiding, Springer-Verlag Publisher, ISBN# 0387954260, October 2002.  cites GS (112)
    
  1. K.J.R. Liu, W. Trappe, Z.J. Wang, M. Wu, and H. Zhao: Multimedia Fingerprinting Forensics for Traitor Tracing, EURASIP Book Series on Signal Processing and Communications, Hindawi Publishing Co., ISBN# 9775945186, 2005.  cites GS (34)
 
  1. M. Wu and Q. Sun: “Video Security and Protection,” in The Essential Guide to Video Processing, edited by A. Bovik, Elsevier, 2009.
 


Journal Publications

See the list and DOI links on ORCID.


Highlights on Refereed Conference Publications

See the full publicatoin list and links on Google Scholar.

  1. Y. Mao, Y. Sun, M. Wu, and K.J.R. Liu: "Dynamic Join-Exit Amortization and Scheduling for Time-Efficient Group Key Agreement", Proc. of IEEE Infocom '2004, vol. 4, pp.2617-2627, Hong Kong, March 2004. [Acceptance rate 18.4% out of 1420]

  2. A. Swaminathan, Y. Mao and M. Wu: “Security of Feature Extraction in Image Hashing,” Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05), vol. 2, pp. 1041– 1044, Philadelphia, PA, March 2005. (Received Student Paper Award)

  3. A. Swaminathan, Y. Mao, M. Wu, and Krishnan Kailas: “Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance,” 7th International Information Hiding Workshop (IHW), Barcelona, Spain, and Lecture Notes on Computer Science (LNCS), vol. 3727, pp.357-371, June 2005. [Acceptance rate 31%]

  4. Y. Mao and M. Wu: “Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage,” Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’2005), Alexandria, VA, pp.117-128, Nov. 2005. [Acceptance rate 33%]

  5. W-H. Chuang, A.L. Varna, and M. Wu, "Modeling and Analysis of Ordinal Ranking in Content Fingerprinting," Proc. of IEEE Int. Workshop on Information Forensics and Security (WIFS'09), pp. 116-120, London, UK, December 2009. [30% acceptance rate]

  6. A.L. Varna and M. Wu, "Modeling Content Fingerprints Using Markov Random Fields", Proc. of IEEE Int. Workshop on Information Forensics and Security (WIFS'09), pp. 111-115, London, UK, December 2009. [30% acceptance rate]

  7. W-H. Chuang and M. Wu, "Semi Non-Intrusive Training for Cell-Phone Camera Model Linkage," Proc. of IEEE Int. Workshop on Information Forensics and Security (WIFS 2010), Seattle, WA, December 2010. [28% acceptance rate for regular paper]

  8. R. Garg, A.L. Varna and M. Wu, " 'Seeing' ENF: Natural Time Stamp for Digital Video via Optical Sensing and Signal Processing," long paper accepted by ACM Multimedia, Scottsdale, Arizona, Nov. 2011. [58/338=17% acceptance rate; Top 3 paper; Best Student Paper Award]

  9. W-H. Chuang, R. Garg, and M. Wu, “How Secure are Power Network Signature Based Time Stamps?” Proc. of 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, Oct. 2012. [81/423=19% acceptance rate for long paper]

  10. R. Garg, A.L. Varna, and M. Wu: “Modeling and Analysis of Electric Network Frequency Signal for Timestamp Verification,” Proc. of IEEE Workshop on Info. Forensics and Security (WIFS), Tenerife, Spain, Dec. 2012. [30% acceptance rate for regular paper]

  11. H. Su, A. Hajj-Ahmad, and M. Wu, “Exploiting Rolling Shutter for ENF Signal Extraction From Video,” Proc. of IEEE Int. Conf. on Image Processing (ICIP 2014), Paris, France, Oct. 2014. [Top 10% Paper Award]

  12. M. Wu, F.M. Quintão Pereira, J. Liu, H.S. Ramos, M.S. Alvim, and L.B. Oliveira, “New Directions: Proof-Carrying Sensing – Towards Real-World Authentication in Cyber-Physical Systems,” Proceedings of ACM Conf. on Embedded Networked Sensor Systems (SenSys), Delft, Netherlands, to appear Nov. 2017, 6 pages. (25% acceptance rate)



Meet the Team - visit the MAST home page

Ph.D. Alumni

  1. Yinian Mao(2006): “Securing Multi-layer Communications: A Signal Processing Approach”;  Job at Qualcomm – Security Group;

  2. Guan-Ming Su (2006): “Dynamic Resource Allocation for Multiuser Video Streaming”; Job at Marvell Inc.;

  3. Hongmei Gou (2007): “Digital Forensic Techniques for Graphic Data”; Job at Texas Instrument;

  4. Shan He (2007): “A Joint Coding and Embedding Framework for Multimedia Fingerprinting”; Job at Thomson Corporate Research;

  5. Meng Chen (2007): “Error Control and Concealment of Visual Communications”; Job at PCTEL Inc;

  6. Ashwin Swaminathan (2008): “Multimedia Forensic Analysis via Intrinsic and Extrinsic Fingerprints”; Job at Qualcomm Research.

  7. Avinash Varna (2011): “Multimedia Protection Using Content and Embedded Fingerprints”; Job at Intel DRM group.

  8. Wenjun Lu (2011): “Preserving Trustworthiness and Confidentiality for Online Multimedia”; Job at Google.

  9. Wei-Hong Chuang (2012): “Resiliency Assessment and Enhancement of Intrinsic Fingerprinting”; Job at Amazon R&D.
     

  10. Ravi Garg (“Time and Location Forensics for Multimedia,” 2013; Job at Intel).

  11. Hui Su (“Temporal and Spatial Alignment of Multimedia Signals,” 2014; Job at Google).

  12. Adi Hajj-Ahmad (“Intrinsically Embedded Signatures for Multimedia Forensics,” 2016; Job at GE Digital – Data Science).

  13. Chau-Wai Wong (“Micro Signal Extraction and Analytics,” 2017; Job at Origin Wireless Inc., and now on faculty of North Carolina State Univ.).

  14. Abbas Kazemipour (“Compressed Sensing Beyond the IID and Static Domains: Theory, Algorithms and Applications,” 2017, jointly advised with B. Babadi; currently on postdoc training at Stanford Univ.).



Patents  

  1. J. Bloom, M. Miller, I. Cox, M. Wu, C-Y. Lin, and Y-M. Lui: "Rotation, Scale, and Translation Resilient Public Watermarking for Images Using a Log-polar Fourier Transform," US Patent 6,282,300, issued Aug. 28, 2001.
     
  2. M. Wu and B. Liu: "Watermarking Scheme for Image Authentication," US Patent 6,285,775, issued Sept. 4, 2001.
     
  3. H. Yu, M. Wu, X. Li, and A. Gelman: "Methods and Apparatus for Multi-layer Data Hiding," US Patent 6,456,726, issued Sept. 24, 2002.
     
  4. M. Wu and H. Yu: "Human Visual Model for Data Hiding," US Patent 6,611,608, issued Aug. 26, 2003. 
     
  5. M. Wu, R. Joyce, A. Vetro, H-S. Wong, L. Guan, and S-Y. Kung: "Dynamic Network Resource Allocation Using Multimedia Content Features and Traffic Features," US Patent 6,947,378, issued Sept. 20, 2005.  

     
  6. M. Wu and H. Gou: “Method for concealing data in curves of an image," U.S. Patent 7,817,817, provisional filing Sept. 2004, formal filing Sept. 2005, issued on Oct. 19, 2010.
     
  7. S. He and M. Wu: “Method for fingerprinting multimedia content," U.S. Patent 7,814,564, provisional filing Jan. 2005, formal filing Jan. 2006, issued on Oct. 12, 2010. (Licensed to industry in North and Latin America by UMD)
     
  8. M. Wu, A. Swaminathan, and Y. Mao: “Data Hiding in Compiled Program Binaries for Supplementing Computer Functionality,” U.S. Patent 7,840,789, provisional filing June 2005, formal filing June 2006, issued on Nov. 23, 2010.

  9. R. Garg, A.L. Varna, A. Hajj-Ahmad, and M. Wu, “Environmental Signatures for Forensic Analysis and Alignment of Media Recordings,” U.S. Patent 9,363,467, filed Nov. 2011 and Nov. 2013 under US20140147097A1, issued June 7, 2016.

  10. M. Wu, A. Hajj-Ahmad, and H. Su, “Techniques to Extract ENF Signals from Video Image Sequences Exploiting the Rolling Shutter Mechanism and a New Video Synchronization Approach,” provisional filed May 2014, formal filing May 2015 under US20150356992A1, authorized to be issued Jan. 2018.

  11. A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D. Oard, “Confidentiality-Preserving Rank-Ordered Search,” filed Oct. 2007 and Dec. 2013, U.S. patent application# US 14/104,652 and US20170235736A1.

  12. M. Wu and C-W. Wong, “Counterfeit Detection Scheme Using Paper Surfaces and Mobile Cameras,” provisional filed Nov. 2015, formal filing Nov. 2016, U.S. & International patent application# PCT/US2016/061875.

 


Last updated: January 2018.

Patent citations by other patents and patent applications are according to the USPTO database and Google Patents database.

Back to Min's Home Page