Personal information

No personal information available

Activities

Works (24)

Deep Learning Methods for Event Verification and Image Repurposing Detection

Electronic Imaging 2019
2019 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Detecting GAN generated Fake Images using Co-occurrence Matrices

Electronic Imaging 2019
2019 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

IEEE Transactions on Image Processing
2019 | Journal article
Source: Self-asserted source
Lakshmanan Nataraj

Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

Electronic Imaging 2018
2018 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis

Electronic Imaging 2018
2018 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Detection and localization of image forgeries using resampling features and deep learning

Computer Vision and Pattern Recognition Workshops (CVPRW), 2017 IEEE Conference on
2017 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Exploiting spatial structure for localizing manipulated image regions

Proceedings of the IEEE International Conference on Computer Vision
2017 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

SPAM: Signal Processing to Analyze Malware

IEEE Signal Processing Magazine
2016 | Journal article
Source: Self-asserted source
Lakshmanan Nataraj

A signal processing approach to malware analysis

2015 | Dissertation or Thesis
Source: Self-asserted source
Lakshmanan Nataraj

Features We trust!

IEEE International Conference on Image Processing (ICIP) 2015
2015 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

SATTVA: SpArsiTy inspired classificaTion of malware VAriants

ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015
2015 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

SARVAM: Search And RetrieVAl of Malware

Annual Computer Security Applications Conference (ACSAC) Workshop on Next Generation Malware Attacks and Defense (NGMAD)
2013 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

SigMal: A Static Signal Processing Based Malware Triage

Annual Computer Security Applications Conference (ACSAC) 2013
2013 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

A comparative assessment of malware classification using binary texture analysis and dynamic analysis

Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence
2011 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Malware images: visualization and automatic classification

Proceedings of the 8th International Symposium on Visualization for Cyber Security
2011 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Detecting Packed Executables based on Raw Binary Data

Technical Report, Vision Research Lab, UCSB
2010 | Book chapter
Source: Self-asserted source
Lakshmanan Nataraj

Improving re-sampling detection by adding noise

Media Forensics and Security II
2010 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Precise localization of key-points to identify local regions for robust data hiding

Image Processing (ICIP), 2010 17th IEEE International Conference on
2010 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Robust Key-point based Data Hiding

University of California, Santa Barbara
2010 | Report
Source: Self-asserted source
Lakshmanan Nataraj

Adding gaussian noise to “denoise” JPEG for detecting image resizing

Image Processing (ICIP), 2009 16th IEEE International Conference on
2009 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Detection of seam carving and localization of seam insertions in digital images

Proceedings of the 11th ACM workshop on Multimedia and security
2009 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme

Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on
2008 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Brain computer interface analysis using wavelet transforms and auto regressive coefficients

Electrical and Computer Engineering, 2006. ICECE'06. International Conference on
2006 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Digital image forgery detection using artificial neural network and auto regressive coefficients

Electrical and Computer Engineering, 2006. CCECE'06. Canadian Conference on
2006 | Conference paper
Source: Self-asserted source
Lakshmanan Nataraj

Peer review (1 review for 1 publication/grant)

Review activity for Artificial intelligence review. (1)