Lakshmanan Nataraj
Lakshmanan Nataraj
Trimble Inc.
Verified email at - Homepage
Cited by
Cited by
Malware images: visualization and automatic classification
L Nataraj, S Karthikeyan, G Jacob, BS Manjunath
Proceedings of the 8th International Symposium on Visualization for Cyber …, 2011
Hybrid lstm and encoder–decoder architecture for detection of image forgeries
JH Bappy, C Simons, L Nataraj, BS Manjunath, AK Roy-Chowdhury
IEEE transactions on image processing 28 (7), 3286-3300, 2019
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
L Nataraj, V Yegneswaran, P Porras, J Zhang
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence …, 2011
Detecting GAN generated fake images using co-occurrence matrices
L Nataraj, TM Mohammed, S Chandrasekaran, A Flenner, JH Bappy, ...
arXiv preprint arXiv:1903.06836, 2019
Exploiting spatial structure for localizing manipulated image regions
JH Bappy, AK Roy-Chowdhury, J Bunk, L Nataraj, BS Manjunath
Proceedings of the IEEE international conference on computer vision, 4970-4979, 2017
Detection and localization of image forgeries using resampling features and deep learning
J Bunk, JH Bappy, TM Mohammed, L Nataraj, A Flenner, BS Manjunath, ...
2017 IEEE conference on computer vision and pattern recognition workshops …, 2017
Detection of seam carving and localization of seam insertions in digital images
A Sarkar, L Nataraj, BS Manjunath
Proceedings of the 11th ACM workshop on Multimedia and security, 107-116, 2009
SigMal: A Static Signal Processing Based Malware Triage
D Kirat, L Nataraj, G Vigna, BS Manjunath
Annual Computer Security Applications Conference (ACSAC) 2013, 2013
Digital image forgery detection using artificial neural network and auto regressive coefficients
ES Gopi, N Lakshmanan, T Gokul, S KumaraGanesh
2006 Canadian Conference on Electrical and Computer Engineering, 194-197, 2006
SPAM: Signal Processing to Analyze Malware
L Nataraj, BS Manjunath
IEEE Signal Processing Magazine 33 (2), 105-117, 2016
SARVAM: Search And RetrieVAl of Malware
L Nataraj, D Kirat, BS Manjunath, G Vigna
Annual Computer Security Applications Conference (ACSAC) Workshop on Next …, 2013
Detection, attribution and localization of gan generated images
M Goebel, L Nataraj, T Nanjundaswamy, TM Mohammed, ...
arXiv preprint arXiv:2007.10466, 2020
Adding gaussian noise to “denoise” JPEG for detecting image resizing
L Nataraj, A Sarkar, BS Manjunath
2009 16th IEEE International Conference on Image Processing (ICIP), 1493-1496, 2009
Boosting Image Forgery Detection using Resampling Features and Copy-move analysis
TM Mohammed, J Bunk, L Nataraj, JH Bappy, A Flenner, BS Manjunath, ...
Electronic Imaging 2018, 2018
SATTVA: SpArsiTy inspired classificaTion of malware VAriants
L Nataraj, S Karthikeyan, BS Manjunath
ACM Workshop on Information Hiding and Multimedia Security (IH and MMSEC) 2015, 2015
Malware detection using frequency domain-based image visualization and deep learning
TM Mohammed, L Nataraj, S Chikkagoudar, S Chandrasekaran, ...
arXiv preprint arXiv:2101.10578, 2021
A signal processing approach to malware analysis
L Nataraj
University of California, Santa Barbara, 2015
Improving re-sampling detection by adding noise
L Nataraj, A Sarkar, BS Manjunath
Media Forensics and Security II 7541, 177-187, 2010
Resampling forgery detection using deep learning and a-contrario analysis
A Flenner, L Peterson, J Bunk, TM Mohammed, L Nataraj, BS Manjunath
arXiv preprint arXiv:1803.01711, 2018
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme
A Sarkar, L Nataraj, BS Manjunath, U Madhow
2008 15th IEEE International Conference on Image Processing, 1292-1295, 2008
The system can't perform the operation now. Try again later.
Articles 1–20