Check out my Google Scholar page
Publications
Detecting GAN generated Fake images using Co-Occurrence Matrices
L. Nataraj, T.M. Mohammed, B.S. Manjunath, S. Chandrasekaran, A. Flenner, J.H. Bappy, A.K. Roy-Chowdhury
Electronic Imaging 2019
Deep Learning Methods for Event Verification and Image Repurposing Detection
M. Goebel, A. Flenner, L. Nataraj, B.S. Manjunath,
Electronic Imaging 2019
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
J.H. Bappy, C. Simons, L. Nataraj, B.S. Manjunath, A.K. Roy-Chowdhury
IEEE Transactions on Image Processing 2019
Boosting Image Forgery Detection using Resampling Detection and Copy-move Analysis
T.M. Mohammed, J. Bunk, L. Nataraj, J.H. Bappy, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury, L. Peterson
Electronic Imaging 2018
Resampling Forgery Detection using Deep Learning and A-contrario Analysis
A. Flenner, J. Bunk, T.M. Mohammed, L. Nataraj, B.S. Manjunath,
Electronic Imaging 2018
Exploiting Spatial Structures for Localizing Manipulated Image Regions
J.H. Bappy, A.K. Roy-Chowdhury, J. Bunk, L. Nataraj, B.S. Manjunath,
International Conference on Computer Vision 2017 (ICCV 2017)
Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury, L. Peterson
CVPR Workshop on Media Forensics 2017
SPAM: Signal Processing to Analyze Malware
L Nataraj, BS Manjunath
IEEE Signal Processing Magazine, Vol. 33 (2), 2016
SATTVA: SpArsiTy inspired classificaTion of malware VAriants
L Nataraj, S Karthikeyan, BS Manjunath
ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
Annual Computer Security Applications Conference (ACSAC) Workshop on Next Generation Malware Attacks and Defense (NGMAD) 2013
SigMal: A Static Signal Processing Based Malware Triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Annual Computer Security Applications Conference (ACSAC) 2013
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras, J Zhang
Proceedings of the 4th ACM workshop on Security and Artificial Intelligence and Computer Security (AISec) 2011
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
Proceedings of the 8th International Symposium on Visualization for Cyber Security (VizSec) 2011
Precise localization of key-points to identify local regions for robust data hiding
L Nataraj, A Sarkar, BS Manjunath
17th IEEE International Conference on Image Processing (ICIP) 2010, 3681-3684
Improving re-sampling detection by adding noise
L Nataraj, A Sarkar, BS Manjunath
IS&T/SPIE Electronic Imaging 2010, 75410I-75410I-11
Adding Gaussian noise to “denoise” JPEG for detecting image resizing,
L Nataraj, A Sarkar, BS Manjunath
16th IEEE International Conference on Image Processing (ICIP) 2009, 1493-1496
Detection of seam carving and localization of seam insertions in digital images,
A Sarkar, L Nataraj, BS Manjunath
Proceedings of the 11th ACM Workshop on Multimedia and Security (MMSEC) 2009, 107-116
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme,
A Sarkar, L Nataraj, BS Manjunath, U Madhow
15th IEEE International Conference on Image Processing (ICIP) 2008
Brain computer interface analysis using wavelet transforms and auto regressive coefficients,
ES Gopi, R Sylvester Vijay, V Rangarajan, L Nataraj
International Conference on Electrical and Computer Engineering (ICECE) 2006
Digital image forgery detection using artificial neural network and auto regressive coefficients,
ES Gopi, N Lakshmanan, T Gokul, S KumaraGanesh, PR Shah,
Canadian Conference on Electrical and Computer Engineering (CCECE) 2006
Technical Reports
Detecting Packed Executables based on Raw Binary Data
L Nataraj, G Jacob, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2010
Robust Key-point based Data Hiding
A Sarkar, L Nataraj, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2009
Publications
Detecting GAN generated Fake images using Co-Occurrence Matrices
L. Nataraj, T.M. Mohammed, B.S. Manjunath, S. Chandrasekaran, A. Flenner, J.H. Bappy, A.K. Roy-Chowdhury
Electronic Imaging 2019
Deep Learning Methods for Event Verification and Image Repurposing Detection
M. Goebel, A. Flenner, L. Nataraj, B.S. Manjunath,
Electronic Imaging 2019
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
J.H. Bappy, C. Simons, L. Nataraj, B.S. Manjunath, A.K. Roy-Chowdhury
IEEE Transactions on Image Processing 2019
Boosting Image Forgery Detection using Resampling Detection and Copy-move Analysis
T.M. Mohammed, J. Bunk, L. Nataraj, J.H. Bappy, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury, L. Peterson
Electronic Imaging 2018
Resampling Forgery Detection using Deep Learning and A-contrario Analysis
A. Flenner, J. Bunk, T.M. Mohammed, L. Nataraj, B.S. Manjunath,
Electronic Imaging 2018
Exploiting Spatial Structures for Localizing Manipulated Image Regions
J.H. Bappy, A.K. Roy-Chowdhury, J. Bunk, L. Nataraj, B.S. Manjunath,
International Conference on Computer Vision 2017 (ICCV 2017)
Detection and Localization of Image Forgeries using Resampling Features and Deep Learning
J. Bunk, J.H. Bappy, T.M. Mohammed, L. Nataraj, A. Flenner, B.S. Manjunath, S. Chandrasekaran, A.K. Roy-Chowdhury, L. Peterson
CVPR Workshop on Media Forensics 2017
SPAM: Signal Processing to Analyze Malware
L Nataraj, BS Manjunath
IEEE Signal Processing Magazine, Vol. 33 (2), 2016
SATTVA: SpArsiTy inspired classificaTion of malware VAriants
L Nataraj, S Karthikeyan, BS Manjunath
ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
Annual Computer Security Applications Conference (ACSAC) Workshop on Next Generation Malware Attacks and Defense (NGMAD) 2013
SigMal: A Static Signal Processing Based Malware Triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Annual Computer Security Applications Conference (ACSAC) 2013
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras, J Zhang
Proceedings of the 4th ACM workshop on Security and Artificial Intelligence and Computer Security (AISec) 2011
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
Proceedings of the 8th International Symposium on Visualization for Cyber Security (VizSec) 2011
Precise localization of key-points to identify local regions for robust data hiding
L Nataraj, A Sarkar, BS Manjunath
17th IEEE International Conference on Image Processing (ICIP) 2010, 3681-3684
Improving re-sampling detection by adding noise
L Nataraj, A Sarkar, BS Manjunath
IS&T/SPIE Electronic Imaging 2010, 75410I-75410I-11
Adding Gaussian noise to “denoise” JPEG for detecting image resizing,
L Nataraj, A Sarkar, BS Manjunath
16th IEEE International Conference on Image Processing (ICIP) 2009, 1493-1496
Detection of seam carving and localization of seam insertions in digital images,
A Sarkar, L Nataraj, BS Manjunath
Proceedings of the 11th ACM Workshop on Multimedia and Security (MMSEC) 2009, 107-116
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme,
A Sarkar, L Nataraj, BS Manjunath, U Madhow
15th IEEE International Conference on Image Processing (ICIP) 2008
Brain computer interface analysis using wavelet transforms and auto regressive coefficients,
ES Gopi, R Sylvester Vijay, V Rangarajan, L Nataraj
International Conference on Electrical and Computer Engineering (ICECE) 2006
Digital image forgery detection using artificial neural network and auto regressive coefficients,
ES Gopi, N Lakshmanan, T Gokul, S KumaraGanesh, PR Shah,
Canadian Conference on Electrical and Computer Engineering (CCECE) 2006
Technical Reports
Detecting Packed Executables based on Raw Binary Data
L Nataraj, G Jacob, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2010
Robust Key-point based Data Hiding
A Sarkar, L Nataraj, BS Manjunath
Technical Report, Vision Research Lab, UCSB, 2009