Blind image deconvolution D Kundur, D Hatzinakos IEEE signal processing magazine 13 (3), 43-64, 1996 | 1863 | 1996 |
Digital watermarking for telltale tamper proofing and authentication D Kundur, D Hatzinakos Proceedings of the IEEE 87 (7), 1167-1180, 1999 | 887 | 1999 |
Digital watermarking using multiresolution wavelet decomposition D Kundur, D Hatzinakos Proceedings of the 1998 IEEE International Conference on Acoustics, Speech …, 1998 | 811 | 1998 |
A robust digital image watermarking method using wavelet-based fusion D Kundur, D Hatzinakos Proceedings of International Conference on Image Processing 1, 544-547, 1997 | 593 | 1997 |
Practical data hiding in TCP/IP K Ahsan, D Kundur Proc. Workshop on Multimedia Security at ACM Multimedia 2 (7), 1-8, 2002 | 446 | 2002 |
A novel blind deconvolution scheme for image restoration using recursive filtering D Kundur, D Hatzinakos IEEE transactions on signal processing 46 (2), 375-390, 1998 | 414 | 1998 |
Video fingerprinting and encryption principles for digital rights management D Kundur, K Karthik Proceedings of the IEEE 92 (6), 918-932, 2004 | 327 | 2004 |
Toward robust logo watermarking using multiresolution image fusion principles D Kundur, D Hatzinakos IEEE Transactions on Multimedia 6 (1), 185-198, 2004 | 307 | 2004 |
Blind image deconvolution revisited D Kundur, D Hatzinakos IEEE signal processing magazine 13 (6), 61-63, 1996 | 237 | 1996 |
Towards a framework for cyber attack impact analysis of the electric smart grid D Kundur, X Feng, S Liu, T Zourntos, KL Butler-Purry 2010 First IEEE international conference on smart grid communications, 244-249, 2010 | 234 | 2010 |
Towards a telltale watermarking technique for tamper-proofing D Kundur, D Hatzinakos Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998 | 217 | 1998 |
Analysis and design of secure watermark-based authentication systems C Fei, D Kundur, RH Kwong IEEE transactions on information forensics and security 1 (1), 43-55, 2006 | 179 | 2006 |
Dual domain watermarking for authentication and compression of cultural heritage images Y Zhao, P Campisi, D Kundur IEEE Transactions on image processing 13 (3), 430-448, 2004 | 175 | 2004 |
Statistical invisibility for collusion-resistant digital video watermarking K Su, D Kundur, D Hatzinakos IEEE Transactions on Multimedia 7 (1), 43-51, 2005 | 166 | 2005 |
Towards modelling the impact of cyber attacks on a smart grid D Kundur, X Feng, S Mashayekh, S Liu, T Zourntos, KL Butler-Purry International Journal of Security and Networks 6 (1), 2-13, 2011 | 163 | 2011 |
Practical Internet steganography: data hiding in IP D Kundur, K Ahsan Proc. Texas wksp. security of information systems, 2003 | 159 | 2003 |
Diversity and attack characterization for improved robust watermarking D Kundur, D Hatzinakos IEEE Transactions on Signal Processing 49 (10), 2383-2396, 2001 | 157 | 2001 |
A cyber-physical control framework for transient stability in smart grids A Farraj, E Hammad, D Kundur IEEE Transactions on Smart Grid 9 (2), 1205-1215, 2016 | 147 | 2016 |
A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid S Liu, B Chen, T Zourntos, D Kundur, K Butler-Purry IEEE Transactions on Smart Grid 5 (3), 1183 - 1195, 2014 | 142 | 2014 |
Digital video steganalysis exploiting statistical visibility in the temporal domain U Budhia, D Kundur, T Zourntos IEEE Transactions on Information Forensics and Security 1 (4), 502-516, 2006 | 139 | 2006 |