Lakshman Nataraj's Homepage
  • Home
  • Research
  • Publications
  • Professional
  • Projects
  • Photos
  • Videos
  • Podcasts
  • Blog
  • Contact
Check out my Google Scholar page
Publications

Detecting GAN generated Fake images using Co-Occurrence Matrices
L. Nataraj, T.M. Mohammed, B.S. Manjunath, S. Chandrasekaran, A. Flenner, J.H. Bappy, A.K. Roy-Chowdhury
Electronic Imaging 2019

Deep Learning Methods for Event Verification and Image Repurposing Detection
M. Goebel, A. Flenner, L. Nataraj, B.S. Manjunath,
Electronic Imaging 2019


Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
J.H. Bappy, C. Simons, L. Nataraj, B.S. Manjunath, A.K. Roy-Chowdhury
IEEE Transactions on Image Processing 2019 


Boosting Image Forgery Detection using Resampling Detection and Copy-move Analysis
T.M. Mohammed, J. Bunk, L. Nataraj, J.H. Bappy, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury, L. Peterson
Electronic Imaging 2018

Resampling Forgery Detection using Deep Learning and A-contrario Analysis
A. Flenner, J. Bunk, T.M. Mohammed, L. Nataraj, B.S. Manjunath,
Electronic Imaging 2018


Exploiting Spatial Structures for Localizing Manipulated Image Regions
J.H. Bappy, A.K. Roy-Chowdhury, J. Bunk,  L. Nataraj, B.S. Manjunath,
International Conference on Computer Vision 2017 (ICCV 2017)


Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury, L. Peterson
CVPR Workshop on Media Forensics 2017 

SPAM: Signal Processing to Analyze Malware
L Nataraj, BS Manjunath
IEEE Signal Processing Magazine, Vol. 33 (2), 2016

​SATTVA: SpArsiTy inspired classificaTion of malware VAriants
L Nataraj, S Karthikeyan, BS Manjunath
ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015

SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
Annual Computer Security Applications Conference (ACSAC) Workshop on Next Generation Malware Attacks and Defense (NGMAD) 2013

SigMal: A Static Signal Processing Based Malware Triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Annual Computer Security Applications Conference (ACSAC) 2013

A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras, J Zhang
Proceedings of the 4th ACM workshop on Security and Artificial Intelligence and Computer Security (AISec) 2011

Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
Proceedings of the 8th International Symposium on Visualization for Cyber Security (VizSec) 2011

Precise localization of key-points to identify local regions for robust data hiding
L Nataraj, A Sarkar, BS Manjunath
17th IEEE International Conference on Image Processing (ICIP) 2010, 3681-3684

Improving re-sampling detection by adding noise
L Nataraj, A Sarkar, BS Manjunath
IS&T/SPIE Electronic Imaging 2010, 75410I-75410I-11

Adding Gaussian noise to “denoise” JPEG for detecting image resizing,
L Nataraj, A Sarkar, BS Manjunath
16th IEEE International Conference on Image Processing (ICIP) 2009, 1493-1496

Detection of seam carving and localization of seam insertions in digital images,
A Sarkar, L Nataraj, BS Manjunath
Proceedings of the 11th ACM Workshop on Multimedia and Security (MMSEC) 2009, 107-116

Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme,
A Sarkar, L Nataraj, BS Manjunath, U Madhow
15th IEEE International Conference on Image Processing (ICIP) 2008

Brain computer interface analysis using wavelet transforms and auto regressive coefficients,
ES Gopi, R Sylvester Vijay, V Rangarajan, L Nataraj
International Conference on Electrical and Computer Engineering (ICECE) 2006

Digital image forgery detection using artificial neural network and auto regressive coefficients,
ES Gopi, N Lakshmanan, T Gokul, S KumaraGanesh, PR Shah,
Canadian Conference on Electrical and Computer Engineering (CCECE) 2006

Technical Reports

Detecting Packed Executables based on Raw Binary Data
L Nataraj, G Jacob, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2010

Robust Key-point based Data Hiding
A Sarkar, L Nataraj, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2009