Publications

[By Type] [By Area][Theses Supervised]

Publications by area

[Cognitive Radio Networks] [Data Hiding, Steganalysis] [Wireless Security, Cryptography and Coding] [Distributed Source-Channel Coding/ Joint Source Channel Coding] [Multimedia Networking] [Source Coding]

Cognitive radio networks:                                                                                                           

[top] [By Type]
 

  1. Z. Jin, S. Anand and K. P. Subbalakshmi, "Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks," Technical Report, 2010.
     

  2. Z. Jin, S. Anand and K. P. Subbalakshmi, ``NEAT: A NEighbor AssisTed Spectrum Decision Protocol for Resilience against Primary User Emulation Attacks, Technical Report 2010.
     

  3. Zituo Jin, S. Anand and K.P. Subbalakshmi, ``Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing", ACM Mobile Computing and Communications Review, Special Issue on Cognitive Radio Technologies and Systems,   volume 13, number 2, pp.: 74-85,April, 2009. [bib]
     

  4. Zituo Jin, S. Anand and K.P. Subbalakshmi, ``Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE International Conference on Communications, Symposium on Selected Areas of Communication, June 2009.
     

  5. Yi Tan, Shamik Sengupta and K.P. Subbalakshmi, ``Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", IEEE International Conference on Communications, 2010.Goce Jakimoski and K.P. Subbalakshmi, ``Towards Secure Spectrum Decision", IEEE International Conference on Communications, Symposium on Selected Areas of Communication, June 2009.
     

  6. S. Anand, Zituo Jin and K.P. Subbalakshmi, ``An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks", IEEE DySPAN, October 2008.
     

  7. Chetan Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi, ``Impact of Constraints on the Complexity of Dynamic Spectrum Assignment, IEEE GLOBECOM - Symposium on Selected Areas of Communications, November 2008.
     

  8. Goce Jakimoski and K.P. Subbalakshmi, ``Denial-of-Service Attacks on Dynamic Spectrum Access Networks" IEEE CogNets Workshop, IEEE International Conference on Communications, May 2008.
     

  9. Chetan Nanjunda and K.P. Subbalakshmi, ``Security Issues in Cognitive Networks", Book Chapter in Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, pp:271-292, ISBN: 978-0-470-06196-1, 2007. [bib]
     

  10. Harikeshwar Kushwaha, R. Chandramouli, and K. P. Subbalakshmi, ``Erasure Tolerant Coding for Cognitive Radios", Book Chapter in Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, Expected 2007.

  11. [bib]
     
  12. Yiping Xing, Harikesh Kushwaha, K.P. Subbalakshmi and R. Chandramouli, ``Codes and Games for Dynamic Spectrum Access'', Book Chapter in Cognitive and Software Defined Radio, Arslan Huseyin Ed., Springer Verlag, Expected 2007.[bib]
     

  13. Yiping Xing, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi, "Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE Transactions on Mobile Computing, Vol. 6, No. 4, pp. 423-433, April 2007.
     

  14. Chetan N. Mathur and K.P. Subbalakshmi, "Digital Signatures for Centralized DSA Networks", First IEEE Workshop on Cognitive Radio Networks, Las Vegas, January 11, 2007. [invited paper]
     

  15. Yiping Xing,  Chetan Nanjunda Mathur,  Mohamed Haleem,  R. Chandramouli and K.P. Subbalakshmi, “Real-Time Secondary Spectrum Sharing with QoS Provisioning”, IEEE Consumer Communications and Networking Conference 2005, Special Session on Agile Radios and Cooperative Networking for Next Generation Wireless Networks. [Best Student Paper Award Winner]


                                                                                                                               
[top]

Data Hiding, Steganography, Steganalysis:                                                                                [top] [By Type]

  1. Palak Amin and K.P. Subbalakshmi, "A Robust Image Watermark Extraction Algorithm for Scaling Attacks", U.S Patent Pending.

  2. Hafiz Malik, R. Chandramouli and K.P. Subbalakshmi, ``Steganalysis: Trends and Challenges", Book Chapter in Multimedia Forensics and Security, Ed. Chang-Tsun Li, Idea Group Publishing, ISBN: 978-1-599904-869-7,June 2008.

  3. H. Malik, K. P. Subbalakshmi, and and R. Chandramouli, ``Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy", Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, vol. 6819, San Jose, CA, USA, January 28-31, 2008.

  4. Ning Liu, Palak Amin, Aruna Ambalavanan and K.P. Subbalakshmi, "An Overview of Digital Watermarking ", in Multimedia Security Technologies for Digital Rights Management, W. Zeng, H. Yu and C. Lin Eds., Elsevier Inc., ISBN:  0123694760, June 2006. [bib]

  5. Ning Liu, Palak Amin and K.P. Subbalakshmi, "Security and Robustness Enhancement for Image Data Hiding", IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 466-474, April 2007.

  6. Palak Amin, Ning Liu and K.P. Subbalakshmi, "Statistical Attack Resilient Data Hiding", International Journal of Network Security, Vol.5, No.1, PP.112–120, July 2007.
  7. K.P. Subbalakshmi, R. Chandramouli and N. Ranganathan, "A Sequential Distinguisher for Covert Channel Identification", International Journal of Network Security, Vol.5, No.3, PP.274–282, Nov. 2007.
  8. A. Patel, M. Shah, R. Chandramouli, K.P. Subbalakshmi, "Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences", International Journal of Network Security, International Journal of Network Security,
    Vol 5, no. 1, pp: 41-50, July 2007.

  9. Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli, ``Steganalysis of QIM-Based Data Hiding using Kernel Density Estimation", ACM Multimedia Security Workshop, September 2007.

  10. Palak Amin and K.P. Subbalakshmi, ``Detecting Hidden Messages using Image Power Spectrum", IEEE International Conference on Image Processing Sept. 2007.

  11. Ning Liu and K.P. Subbalakshmi, "Worst Case Attack on Quantization based Data Hiding", IEEE International Symposium on Multimedia, 2006.

  12. Palak Amin, Ning Liu and K.P. Subbalakshmi, "Statistically Secure Digital Image Data Hiding", IEEE Multimedia Signal Processing, China, Oct-Nov 2005, Chapter 13: Multimedia Assurance, ISBN: 0-7803-9289-2, pp.497-500.
  13. Ning Liu, Palak Amin and K.P. Subbalakshmi," Secure Quantizer Based Data Embedding " IEEE Multimedia Signal Processing, China, Oct-Nov 2005, Chapter 13: Multimedia Assurance, ISBN:0-7803-9289-2, pp.509-512.
  14. Ning Liu and K.P. Subbalakshmi, "TCQ-based quantizer design for data hiding in images " IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, January 2005.

  15. Palak Amin and K.P. Subbalakshmi, "Rotation and Cropping Resilient Data Hiding with Zernike Moments" IEEE International Conference on Image Processing, Singapore, October 2004.
  16. Ning Liu and K.P. Subbalakshmi, "Non-Uniform Quantizer Design for Image Data Hiding " IEEE International Conference on Image Processing, Singapore, October 2004.
  17. R. Chandramouli and K.P. Subbalakshmi, "Current Trends in Steganalysis: A Critical Survey", Invited session on Multimedia Security, The Eighth International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, December 2004.[invited paper]
  18. K. P. Subbalakshmi and R. Chandramouli, "A joint source-channel steganography decoding paradigm and it's implications on capacity", The 38th Annual Conference on Information Sciences and Systems, Invited Session on Watermarking and Steganography,, March 2004.[invited paper]
  19. Ning Liu and K.P. Subbalakshmi, "Vector quantization based scheme for data embedding in images " IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, January 2004.
  20. R. Chandramouli and K. P. Subbalakshmi "Active Steganalysis of Spread Spectrum Steganography'' IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, Volume 3, pp 830-833, May 2003.

                                                                                                                                        [top] [By Type]

Wireless Security, Cryptography and Coding, cryptanalysis, joint encryption and compression:      [top] [By Type]

  1. Goce Jakimoski and K.P. Subbalakshmi, ``On Efficient Message Authentication Via Block Cipher Design Techniques", Asiacrypt, December 2007.

  2. Goce Jakimoski and K.P. Subbalakshmi, ``Security of Compressing Encrypted Sources", Asilomar Conference on Signals and Systems, Nov. 4--7, 2007. [invited paper].

  3. Goce Jakimoski and K.P. Subbalakshmi, ``Cryptanalysis of Some Multimedia Encryption Schemes", IEEE Transactions on Multimedia, vol 10., No 3, pp.: 330-338, April 2008.

  4. Mohamed Haleem, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi , "Opportunistic Encryption: A Trade-off between  Security and Throughput in Wireless Networks", IEEE Transactions on Secure and Dependable Computing, Volume 4,  Issue 4,   pp.:313 - 324, Oct.-Dec. 2007.

  5. Mohamed Haleem, K.P. Subbalakshmi and R. Chandramouli, "Joint Encryption and Compression of Correlated Sources'', EURASIP Journal on Information Security (JIS), Special Issue on The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks, Vol. 2007, Article ID 98374, 9 pages, 2007. doi:10.1155/2007/98374.[invited paper]

  6. Goce Jakimoski and K. P. Subbalakshmi, "Discrete Lyapunov Exponent and Differential Cryptanalysis", IEEE Transactions on Circuits and Systems II, pp. 499-501, June 2007. [bib]

  7. Chetan Nanjunda Mathur and K.P. Subbalakshmi, "A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices",  International Journal of Network Security, Vol.5, No.2, pp.205–212, Sept. 2007.

  8. Chetan Nanjunda Mathur, Karthik Narayan, and K. P. Subbalakshmi, "On the Design of Error Correcting Ciphers," EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Network Security, Volume 2006, Article ID 42871, Pages 1–12, DOI 10.1155/WCN/2006/42871.[bib]
  9. Chetan N. Mathur and K. P. Subbalakshmi, "Energy Efficient Wireless Encryption", IEEE GLOBECOM 2006, Symposium on Network and Information Systems Security, November 2006.

  10. M. A. Haleem, Chetan N. Mathur, and K. P. Subbalakshmi, "Joint Distributed Compression and Encryption of Correlated Data in Sensor Networks", IEEE MILCOM 2006, October 2006.
  11. Chetan N. Mathur, Karthik Narayan and K. P. Subbalakshmi, "High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive", 4th International Conference on Applied Cryptography and Network Security, June 2006, Lecture Notes in Computer Science, Volume 3989, pp 309-324, ISBN: 3-540-34703-8.
  12. M. A. Haleem, Chetan N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, "On Optimizing the Security-Throughput Trade-off in  Wireless Networks with Adversaries", 4th International Conference on Applied Cryptography and Network Security, June 2006, Lecture Notes in Computer Science, Volume 3989, pp 448-458, ISBN: 3-540-34703-8.
  13. R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, R.N. Uma, "Battery Power-Aware Encryption", ACM Transactions on Information Systems and Security, Volume 9, Issue 2, pp. 162-180, May 2006.

  14. Chetan Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi, “High Diffusion Codes: A Class of Maximum Distance Separable Codes for Error Resilient Block Ciphers”, Second IEEE International Workshop on Adaptive Wireless Networks, GLOBECOM 2005.
                                                                                                                               
    [top] [By Type]

Distributed Joint Source-Channel Coding, Joint Source Channel Coding:                           

[top] [By Type]

  1. Kiran Sampath, R. Chandramouli and K.P. Subbalakshmi, "On  Stochastic Learning  in Predictive Wireless ARQ", Wiley Journal on Wireless Communications and Mobile Computing, Volume 8, Issue 7, September 2008, Pages 871 -- 883, ISSN:1530-8669.

  2. M. A. Haleem and K. P. Subbalakshmi, "Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels", IEEE Data Compression Conference, March 27-29, 2007.

  3. Qingyu Chen and K.P. Subbalakshmi, "Joint Source-Channel Decoder for Data Centric Network Applications", IEE Proceedings Communications, ISSN 1350-2425, vol. 153, no. 6, pp. 871-877, 2006.

  4. Qingyu Chen and K.P. Subbalakshmi, "Joint Source-Channel Decoding for MPEG-4 Video Transmission over Wireless Channels", IEEE Journal on Selected Areas in Communications-Special Issues on Recent Advances in Wireless Multimedia, pp 1780-1789, December 2003.
  5. Qingyu Chen and K. P. Subbalakshmi, "An Integrated Joint Source-Channel Decoder for MPEG-4 Coded Video", IEEE Semi-Annual Vehicular Technology Conference, October 2003.
  6. Siva Somasundaram and K. P. Subbalakshmi "3-D Multiple Description Video Coding for Packet Switched Networks'' IEEE International Conference on Multimedia and Expo, Baltimore, Maryland, July 2003.
  7. R. Chandramouli and K. P. Subbalakshmi "Active Steganalysis of Spread Spectrum Steganography'' IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, Volume 3, pp 830-833, May 2003.
  8. K. P. Subbalakshmi and Jacques Vaisey, "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The Additive Markov Channel Case ", IEEE Transactions on Communications, pp. 1420-1425, September 2003.
  9. K. P. Subbalakshmi and Jacques Vaisey, "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The BSC Case ", IEEE Transactions on Communications, Vol 49, pp 2052-2055, December 2001.
  10. Qingyu Chen and K.P. Subbalakshmi "Trellis Decoding for MPEG-4 Streams Over Wireless Channels " IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara, Vol 5022, pp 810-817 , January 2003.
  11. K. P. Subbalakshmi and Siva Somasundaram "Multiple Description Coding Framework for EBCOT" IEEE International Conference on Image Processing, Rochester, New York, September 2002.
  12. K. P. Subbalakshmi and Qingyu Chen "Joint Source-Channel Decoding for MPEG-4 Coded Video Over Wireless Channels" IASTED International Conference on Wireless and Optical Communications (WOC 2002), Banff, Canada, July 2002.
  13. K. P. Subbalakshmi and Jacques Vaisey, "Joint Source-Channel Decoding for Entropy Coded Image Transmission", The 36th Annual Conference on Information Sciences and Systems, March 2002.
  14. K. P. Subbalakshmi and Jacques Vaisey, "Optimal Decoding of Entropy Coded Markov Sources over Channels with Memory", The 33rd Annual Conference on Information Sciences and Systems, Vol 2, pp. 624-629, March 1999.
  15. K. P. Subbalakshmi and Jacques Vaisey, "Joint Source-Channel Decoding of Entropy Coded Markov Sources over Binary Symmetric Channels", IEEE International Conference on Communications 99, Vol 1, no 4, pp. 446-450, June 1999.
  16. K. P. Subbalakshmi and Jacques Vaisey, "Optimal Decoding of Entropy Coded Memoryless Sources over Binary Symmetric Channels,"IEEE Data Compression Conference, pg. 573, March-April 1998.

 

Multimedia Networking:                                                                                                                             [top] [By Type]

  1. Siva Somsundaram, K.P. Subbalakshmi and R.N. Uma "MDC and Path Diversity in Video Streaming" IEEE International Conference on Image Processing, Singapore, October 2004.
  2. Siva Somasundaram and K.P. Subbalakshmi "Exploiting Path Diversity and Forward Error Correction for Robust Transmission of Images" 23rd Picture Coding Symposium, pp 259-262, Saint-Malo, France, April 2003.[invited paper]
  3. Derek Soeder, K. P. Subbalakshmi and R.N. Uma, "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media", 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2002), July 2002
  4. Derek Soeder, Siva Somasundaram, K.P. Subbalakshmi and R.N. Uma "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media",XXXIII Annual Conference of the Operational Research Society of Italy, AIRO: Italian Association of Operations Research (Operations and Decision Sciences) L'Aquila, Italy, September 2002.

Source coding:                                                                                                                                   [top] [By Type]

  1. K.P. Subbalakshmi, "Lossless Image Compression", in Lossless Compression Handbook, Khalid Sayood Ed., Academic Press Series in Communications, Networking, and Multimedia, 2003, ISBN 0-12-620861-1. [bib]

  2. Siva Somasundaram and K.P. Subbalakshmi "A Novel 3D Scalable Video Compression Algorithm" IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara, Vol 5022, pp 966-971.  January 2003.

  3. A. Makur and K.P. Subbalakshmi, "Variable Dimension VQ Encoding and Codebook Design,"IEEE Transactions on Communications, vol 45, no 8, pp 897 - 900, August 1997. [bib]

           

 

 

 

 

 

 

Publications by type

[Patents]  [Book Chapters]  [Journal Articles]  [Conference Articles] [theses] [Other 

(Click on [bib] to see complete reference in bibtex format. To go directly to list of all bibtex entries click here   

Patents [top] [By Area]

  1. Palak Amin and K.P. Subbalakshmi, "A Robust Image Watermark Extraction Algorithm for Scaling Attacks", U.S Patent Pending.

[top] [By Area]

Publications

Invited Book Chapters                                                                                     [top]

  1. Hafiz Malik, R. Chandramouli and K.P. Subbalakshmi, ``Steganalysis: Trends and Challenges", in Multimedia Forensics and Security, Ed. Chang-Tsun Li, Idea Group Publishing, Multimedia Forensics and Security, Ed. Chang-Tsun Li, Idea Group Publishing, ISBN:
    978-1-599904-869-7,June 2008.
     

  2. Chetan Nanjunda and K.P. Subbalakshmi, ``Security Issues in Cognitive Networks", Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, pp:271-292, ISBN: 978-0-470-06196-1, 2007. [bib]
     

  3. Harikeshwar Kushwaha, R. Chandramouli, and K. P. Subbalakshmi, ``Erasure Tolerant Coding for Cognitive Radios", Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, pp:315-332, ISBN: 978-0-470-06196-1, 2007..

  4. [bib]
     
  5. Yiping Xing, Harikesh Kushwaha, K.P. Subbalakshmi and R. Chandramouli, ``Codes and Games for Dynamic Spectrum Access'', in Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems, Arslan Huseyin Ed., Springer Verlag, ISBN: 978-1-4020-
    5541-6, 2007,(invited)
    .
    [bib]
     

  6. M.A. Haleem and K.P. Subbalakshmi, "Global Systems for Mobile Communications", in The Handbook of Computer Networks, Volume II, LANs, MANs, WANs, The Internet, Global, Cellular and Wireless Networks, John Wiley and Sons Inc., In Progress.[bib]
     

  7. Ning Liu, Palak Amin, Aruna Ambalavanan and K.P. Subbalakshmi, "An Overview of Digital Watermarking ", in Multimedia Security Technologies for Digital Rights Management, W. Zeng, H. Yu and C. Lin Eds., Elsevier Inc., ISBN:  0123694760, June 2006. [bib]
     

  8. K.P. Subbalakshmi, "Lossless Image Compression", in Lossless Compression Handbook, Khalid Sayood Ed., Academic Press Series in Communications, Networking, and Multimedia, 2003, ISBN 0-12-620861-1. [bib]

[top] [By Area]

Journal Articles                                                                                       [top] [By Area]

  1. Zituo Jin, S. Anand and K.P. Subbalakshmi, ``Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing", ACM Mobile Computing and Communications Review, Special Issue on Cognitive Radio Technologies and Systems, To Appear.
     

  2. Goce Jakimoski and K.P. Subbalakshmi, ``Cryptanalysis of Some Multimedia Encryption Schemes", IEEE Transactions on Multimedia, vol 10., No 3, pp.: 330-338, April 2008.
     

  3. Mohamed Haleem, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi , "Opportunistic Encryption: A Trade-off between  Security and Throughput in Wireless Networks", IEEE Transactions on Secure and Dependable Computing, pp. 313 - 324, Volume 4,  Issue 4,  Oct.-Dec. 2007.
     

  4. Mohamed Haleem, K.P. Subbalakshmi and R. Chandramouli, "Joint Encryption and Compression of Correlated Sources'', EURASIP Journal on Information Security (JIS), Special Issue on The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks, Vol. 2007, Article ID 98374, 9 pages, 2007. doi:10.1155/2007/98374 [invited paper].
     

  5. Kiran Sampath, R. Chandramouli and K.P. Subbalakshmi, "On  Stochastic Learning  in Predictive Wireless ARQ", Wiley Journal on Wireless Communications and Mobile Computing, Volume 8, Issue 7, September 2008, Pages 871{883, ISSN:1530-8669.
     
  6. Goce Jakimoski and K. P. Subbalakshmi, "Discrete Lyapunov Exponent and Differential Cryptanalysis", IEEE Transactions on Circuits and Systems II, pp. 499-501, June 2007. [bib]
     
  7. Ning Liu, Palak Amin and K.P. Subbalakshmi, "Security and Robustness Enhancement for Image Data Hiding", IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 466-474, April 2007.
     
  8. Yiping Xing, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi, "Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE Transactions on Mobile Computing, Vol. 6, No. 4, pp. 423-433, April 2007.
     
  9. Chetan Nanjunda Mathur and K.P. Subbalakshmi, "A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices",  International Journal of Network Security, Vol.5, No.2, pp.205–212, Sept. 2007.
     
  10. Palak Amin, Ning Liu and K.P. Subbalakshmi, "Statistical Attack Resilient Data Hiding", International Journal of Network Security, Vol.5, No.1, PP.112–120, July 2007.
     
  11. K.P. Subbalakshmi, R. Chandramouli and N. Ranganathan, "A Sequential Distinguisher for Covert Channel Identification", International Journal of Network Security, Vol.5, No.3, PP.274–282, Nov. 2007.
     
  12. Chetan Nanjunda Mathur, Karthik Narayan, and K. P. Subbalakshmi, "On the Design of Error Correcting Ciphers," EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Network Security, Volume 2006, Article ID 42871, Pages 1–12, DOI 10.1155/WCN/2006/42871.[bib]
     
  13. R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, R.N. Uma, "Battery Power-Aware Encryption", ACM Transactions on Information Systems and Security, Volume 9, Issue 2, pp. 162-180, May 2006.
     
  14. A. Patel, M. Shah, R. Chandramouli, K.P. Subbalakshmi, "Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences", International Journal of Network Security, Vol.5, No. 1, pp.: 45{50, July 2007.
     
  15. Qingyu Chen and K.P. Subbalakshmi, "Joint Source-Channel Decoder for Data Centric Network Applications", IEE Proceedings Communications, ISSN 1350-2425, vol. 153, no. 6, pp. 871-877, 2006.
     
  16. R. Chandramouli, K.P. Subbalakshmi, and N. Ranganathan, "Stochastic Channel-Adaptive Rate Control for Wireless Video Transmission,", Special issue on Video Objects:Representation, Creation, Coding, Transmission, Manipulation and Retrieval, Pattern Recognition Letters [invited], Volume 25, Issue 7, pp 793-806, May 2004.
     
  17. Qingyu Chen and K.P. Subbalakshmi, "Joint Source-Channel Decoding for MPEG-4 Video Transmission over Wireless Channels", IEEE Journal on Selected Areas in Communications-Special Issues on Recent Advances in Wireless Multimedia, pp 1780-1789, December 2003.
     
  18. K. P. Subbalakshmi and Jacques Vaisey, "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The Additive Markov Channel Case ", IEEE Transactions on Communications, pp. 1420-1425, September 2003.
     
  19. K. P. Subbalakshmi and Jacques Vaisey, "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The BSC Case ", IEEE Transactions on Communications, Vol 49, pp 2052-2055, December 2001.
     
  20. A. Makur and K.P. Subbalakshmi, "Variable Dimension VQ Encoding and Codebook Design,"IEEE Transactions on Communications, vol 45, no 8, pp 897 - 900, August 1997. [bib]

[top] [By Area]

Conference Articles                                                                                          [top] [By Area]

  1. Yi Tan, Shamik Sengupta and K.P. Subbalakshmi, ``Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", IEEE International Conference on Communications, 2010.

  2. Zituo Jin, S. Anand and K.P. Subbalakshmi, ``Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE International Conference on Communications, Symposium on Selected Areas of Communication, June 2009.

  3. Goce Jakimoski and K.P. Subbalakshmi, ``Towards Secure Spectrum Decision", IEEE International Conference on Communications, Symposium on Selected Areas of Communication, June 2009.

  4. S. Anand, Zituo Jin and K.P. Subbalakshmi, ``An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks", IEEE DySPAN, October 2008.

  5. Chetan Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi, ``Impact of Constraints on the Complexity of Dynamic Spectrum Assignment", IEEE GLOBECOM - Symposium on Selected Areas of Communications, 2008.

  6. Goce Jakimoski and K.P. Subbalakshmi, ``Denial-of-Service Attacks on Dynamic Spectrum Access Networks" IEEE CogNets Workshop, IEEE International Conference on Communications, May 2008.

  7. H. Malik, K. P. Subbalakshmi, and and R. Chandramouli, ``Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy", Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, vol. 6819, San Jose, CA, USA, January 28-31, 2008.

  8. Goce Jakimoski and K.P. Subbalakshmi, ``On Efficient Message Authentication Via Block Cipher Design Techniques", Asiacrypt, December 2007.

  9. Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli, ``Steganalysis of QIM-Based Data Hiding using Kernel Density Estimation", ACM Multimedia Security Workshop, September 2007.

  10. Goce Jakimoski and K.P. Subbalakshmi, ``Security of Compressing Encrypted Sources", Asilomar Conference on Signals and Systems, Nov. 4--7, 2007. [invited paper]

  11. Palak Amin and K.P. Subbalakshmi, ``Detecting Hidden Messages using Image Power Spectrum", IEEE International Conference on Image Processing Sept. 2007.

  12. M. A. Haleem and K. P. Subbalakshmi, "Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels", IEEE Data Compression Conference, March 27-29, 2007.

  13. Chetan N. Mathur and K.P. Subbalakshmi, "Digital Signatures for Centralized DSA Networks", First IEEE Workshop on Cognitive Radio Networks, Las Vegas, January 11, 2007. [invited paper]

  14. Ning Liu and K.P. Subbalakshmi, "Worst Case Attack on Quantization based Data Hiding", IEEE International Symposium on Multimedia, 2006.

  15. Chetan N. Mathur and K. P. Subbalakshmi, "Energy Efficient Wireless Encryption", IEEE GLOBECOM 2006, Symposium on Network and Information Systems Security, November 2006.

  16. M. A. Haleem, Chetan N. Mathur, and K. P. Subbalakshmi, "Joint Distributed Compression and Encryption of Correlated Data in Sensor Networks", IEEE MILCOM 2006, October 2006.
  17. Chetan N. Mathur, Karthik Narayan and K. P. Subbalakshmi, "High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive", 4th International Conference on Applied Cryptography and Network Security, June 2006, Lecture Notes in Computer Science, Volume 3989, pp 309-324, ISBN: 3-540-34703-8.
  18. M. A. Haleem, Chetan N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, "On Optimizing the Security-Throughput Trade-off in  Wireless Networks with Adversaries", 4th International Conference on Applied Cryptography and Network Security, June 2006, Lecture Notes in Computer Science, Volume 3989, pp 448-458, ISBN: 3-540-34703-8.
  19. Yiping Xing,  Chetan Nanjunda Mathur,  Mohamed Haleem,  R. Chandramouli and K.P. Subbalakshmi, "Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE International Conference on Communication, 2006.
  20. Chetan Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi, “High Diffusion Codes: A Class of Maximum Distance Separable Codes for Error Resilient Block Ciphers”, Second IEEE International Workshop on Adaptive Wireless Networks, GLOBECOM 2005.
  21. Yiping Xing,  Chetan Nanjunda Mathur,  Mohamed Haleem,  R. Chandramouli and K.P. Subbalakshmi, “Real-Time Secondary Spectrum Sharing with QoS Provisioning”, IEEE Consumer Communications and Networking Conference 2005, Special Session on Agile Radios and Cooperative Networking for Next Generation Wireless Networks. [Best Student Paper Award Winner]
  22. Palak Amin, Ning Liu and K.P. Subbalakshmi, "Statistically Secure Digital Image Data Hiding", IEEE Multimedia Signal Processing 2005, China, Oct-Nov 2005, Chapter 13: Multimedia Assurance, ISBN: 0-7803-9289-2, pp.497-500.
  23. Ning Liu, Palak Amin and K.P. Subbalakshmi," Secure Quantizer Based Data Embedding " IEEE Multimedia Signal Processing 2005, China, Oct-Nov 2005, Chapter 13: Multimedia Assurance, ISBN:0-7803-9289-2, pp.509-512.
  24. Qingyu Chen and K. P. Subbalakshmi, "Distributed Joint Source-Channel Decoding for Correlated Markov Sources", IEEE Data Compression Conference, pp 453, March 2005.
  25. Ning Liu and K.P. Subbalakshmi, "TCQ-based quantizer design for data hiding in images " IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, January 2005.
  26. Siva Somsundaram, K.P. Subbalakshmi and R.N. Uma "MDC and Path Diversity in Video Streaming" IEEE International Conference on Image Processing, Singapore, October 2004.
  27. Palak Amin and K.P. Subbalakshmi, "Rotation and Cropping Resilient Data Hiding with Zernike Moments" IEEE International Conference on Image Processing, Singapore, October 2004.
  28. Ning Liu and K.P. Subbalakshmi, "Non-Uniform Quantizer Design for Image Data Hiding " IEEE International Conference on Image Processing, Singapore, October 2004.
  29. R. Chandramouli and K.P. Subbalakshmi, "Current Trends in Steganalysis: A Critical Survey", Invited session on Multimedia Security, The Eighth International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, December 2004.[invited paper]
  30. K. P. Subbalakshmi and R. Chandramouli, "A joint source-channel steganography decoding paradigm and it's implications on capacity", The 38th Annual Conference on Information Sciences and Systems, Invited Session on Watermarking and Steganography,, March 2004.[invited paper]
  31. Ning Liu and K.P. Subbalakshmi, "Vector quantization based scheme for data embedding in images " IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, January 2004.
  32. Qingyu Chen and K. P. Subbalakshmi, "An Integrated Joint Source-Channel Decoder for MPEG-4 Coded Video", IEEE Semi-Annual Vehicular Technology Conference, October 2003.
  33. Siva Somasundaram and K. P. Subbalakshmi "3-D Multiple Description Video Coding for Packet Switched Networks'' IEEE International Conference on Multimedia and Expo, Baltimore, Maryland, July 2003.
  34. R. Chandramouli and K. P. Subbalakshmi "Active Steganalysis of Spread Spectrum Steganography'' IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, Volume 3, pp 830-833, May 2003.
  35. Siva Somasundaram and K.P. Subbalakshmi "Exploiting Path Diversity and Forward Error Correction for Robust Transmission of Images" 23rd Picture Coding Symposium, pp 259-262, Saint-Malo, France, April 2003.[invited paper]
  36. Qingyu Chen and K.P. Subbalakshmi "Trellis Decoding for MPEG-4 Streams Over Wireless Channels " IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara, Vol 5022, pp 810-817 , January 2003.
  37. Siva Somasundaram and K.P. Subbalakshmi "A Novel 3D Scalable Video Compression Algorithm" IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara, Vol 5022, pp 966-971.  January 2003.
  38. K. P. Subbalakshmi and Siva Somasundaram "Multiple Description Coding Framework for EBCOT" IEEE International Conference on Image Processing, Rochester, New York, September 2002.
  39. K. P. Subbalakshmi and Qingyu Chen "Joint Source-Channel Decoding for MPEG-4 Coded Video Over Wireless Channels" IASTED International Conference on Wireless and Optical Communications (WOC 2002), Banff, Canada, July 2002.
  40. Derek Soeder, K. P. Subbalakshmi and R.N. Uma, "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media", 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2002), July 2002
  41. Derek Soeder, Siva Somasundaram, K.P. Subbalakshmi and R.N. Uma "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media",XXXIII Annual Conference of the Operational Research Society of Italy, AIRO: Italian Association of Operations Research (Operations and Decision Sciences) L'Aquila, Italy, September 2002.
  42. K. P. Subbalakshmi and Jacques Vaisey, "Joint Source-Channel Decoding for Entropy Coded Image Transmission", The 36th Annual Conference on Information Sciences and Systems, March 2002.
  43. K. P. Subbalakshmi and Jacques Vaisey, "Optimal Decoding of Entropy Coded Markov Sources over Channels with Memory", The 33rd Annual Conference on Information Sciences and Systems, Vol 2, pp. 624-629, March 1999.
  44. K. P. Subbalakshmi and Jacques Vaisey, "Joint Source-Channel Decoding of Entropy Coded Markov Sources over Binary Symmetric Channels", IEEE International Conference on Communications 99, Vol 1, no 4, pp. 446-450, June 1999.
  45. K. P. Subbalakshmi and Jacques Vaisey, "Optimal Decoding of Entropy Coded Memoryless Sources over Binary Symmetric Channels,"IEEE Data Compression Conference, pg. 573, March-April 1998.

[top] [By Area]

theses supervised                                                                                                                [top] [By Area]

  1. Dr. Chetan Nanjunda Mathur, Ph.D, A Mathematical Framework for Combining Error Correction and Encryption (winner of the Best Dissertation Award, Cp.E, 2007), May 2007
  2.  Dr. Ning Liu, Data-Hiding: Quantization and Game Theoretic Approaches (winner of the Best Dissertation Award, Cp.E, 2006)
  3.  Dr. Siva Somasundaram, Ph.D, Multiple Description Coding and Applications to Video Networking, October 2005
  4.  Dr. Qingyu Chen Ph.D, Joint Source-Channel Decoding in the Distributed and Non-Distributed Environments , July 2005.
  5.  Karthik Narayan, M.S, On the Design of Secure Error Resilient Diffusion Layers for Block Ciphers, May 2005.
  6.  Fatema Jiruwala, M.S,(Jointly with Prof. R. Chandramouli), Moment Preserving Data-Hiding: Analysis and Experiments, December 2004
  7.  Chetan Nanjunda, M.S,(Jointly with Prof. R. Chandramouli), On the Design of Error-Resilient Ciphers, 2004.

 

Other Articles and Editorials                                                                                                [top] [By Area]

  1. R. Chandramouli, Ananthram Swami, John Chapin and K. P. Subbalakshmi,``Dynamic Spectrum Access for Wireless Networking", Editorial, EURASIP Journal on Advances in Signal Processing, Sepcial Issue on Dynamic Spectrum Access for Wireless Networking, vol. 2009, Article ID 630912, 2 pages, 2009. doi:10.1155/2009/630912.

  2. K.P. Subbalakshmi, "Current Trends in Multimedia Communications and Computing", in Proceedings IEEE International Conference on Information Technology: Coding and Computing, 2-4 April 2001 Page(s):249 - 249.

  3. R. Chandramouli and K.P. Subbalakshmi, "Wireless LAN: Issues and Challenges", in Ticker, Wall Street Technology Association Magazine, 2001.

[top] [By Area]

Bibliography Entries:

@ARTICLE{JinAnaSub09-MC2R,
    author={Z. Jin and S. Anand and K. P. Subbalakshmi},
    title={Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing},
    journal={ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Special Issue on Cognitive Radio Technologies and Systems},
    volume={13},
    number={2},
    pages={74-85},
    year={2009},
    month={April}
}

@INBOOK{CogNetSec-07,
AUTHOR = {Chetan Nanjunda and K.P. Subbalakshmi},
editor = {Qusay H. Mahmoud},
TITLE = {Cognitive Networks: Towards Self-Aware Networks},
CHAPTER = {Security Issues in Cognitive Networks},
PUBLISHER = {Wiley},
YEAR = {2007}
}
[top]

@INBOOK{CogNetCodes-07,
AUTHOR = {Harikeshwar Kushwaha and R. Chandramouli, and K. P. Subbalakshmi},
editor = {Qusay H. Mahmoud},
TITLE = {Cognitive Networks: Towards Self-Aware Networks},
CHAPTER = {Erasure Tolerant Coding for Cognitive Radios},
PUBLISHER = {Wiley},
YEAR = {2007}
}
[top]

@INBOOK{DySpAcCodes-07,
AUTHOR = {Yiping Xing, Harikeshwar Kushwaha and R. Chandramouli and K. P. Subbalakshmi},
editor = {Arslan Huseyin},
TITLE = {Cognitive and Software Defined Radio},
CHAPTER = {Codes and Games for Dynamic Spectrum Access},
PUBLISHER = {Springer Verlag},
YEAR = {2007}
}
[top]


@INBOOK{GSM,
AUTHOR = {M.A. Haleem and K.P. Subbalakshmi},
editor = {Arslan Huseyin},
TITLE = {The Handbook of Computer Networks,Volume II, {LANs, MANs, WANs,} The Internet, Global, Cellular and Wireless Networks},
CHAPTER = {Global Systems for Mobile Communications},
PUBLISHER = {John Wiley and Sons}
}
[top]


@INBOOK{DRM-06,
AUTHOR = {Ning Liu and Palak Amin and Aruna Ambalavanan and K.P. Subbalakshmi},
editor = {W. Zeng and H. Yu and C. Lin},
TITLE = {Multimedia Security Technologies for Digital Rights Management},
CHAPTER = {An Overview of Digital Watermarking},
PUBLISHER = {Elsevier Inc.},
Year = {2006},
Month = {June},
Number = {ISBN:  0123694760}
}
[top]


@INBOOK{kps-lossless-03,
AUTHOR = {K.P. Subbalakshmi},
editor = {Khalid Sayood},
TITLE = {Lossless Compression Handbook},
CHAPTER = {Lossless Image Compression},
PUBLISHER = {Academic Press},
series = {Communications, Networking, and Multimedia},
Year = {2003},
Number = {ISBN 0-12-620861-1}
}
[top]

@ARTICLE{JakSub,
AUTHOR = {G. Jakimoski and K. Subbalakshmi},
TITLE = {Discrete Lyapunov Exponent and Differential Cryptanalysis},
JOURNAL = {IEEE Transactions on Circuits and Systems II}
}[top]
@article{MatNarSub06,
author = {Mathur, Chetan Nanjunda and Narayan, Karthik and Subbalakshmi, K. P.},
title = {On the Design of Error-Correcting Ciphers},
journal = {EURASIP Journal on Wireless Communications and Networking},
year = {2006},
volume = {2006},
pages = {Article ID 42871, 12 pages},
note = {doi:10.1155/WCN/2006/42871}
}[top]
 
@ARTICLE{MakSub97,
AUTHOR = {A. Makur and K. Subbalakshmi},
TITLE = {Variable Dimension Vector Quantization},
JOURNAL = {IEEE Transactions on Communications},
YEAR = {1997},
volume = {45},
pages = {897-899},
month = {August}
}[top]

html hit counter