Video fingerprinting and encryption principles for digital rights management D Kundur, K Karthik Proceedings of the IEEE 92 (6), 918-932, 2004 | 326 | 2004 |
A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs P Das, K Karthik, BC Garai Pattern Recognition 45 (9), 3373-3388, 2012 | 104 | 2012 |
Voltage compensation and harmonic suppression using series active and shunt passive filters K Karthik, JE Quaicoe 2000 Canadian Conference on Electrical and Computer Engineering. Conference …, 2000 | 35 | 2000 |
Decryption key design for joint fingerprinting and decryption in the sign bit plane for multicast content protection. K Karthik, D Hatzinakos Int. J. Netw. Secur. 4 (3), 254-265, 2007 | 16 | 2007 |
Transparent hashing in the encrypted domain for privacy preserving image retrieval K Karthik, S Kashyap Signal, Image and Video Processing 7, 647-664, 2013 | 15 | 2013 |
Authenticating encrypted data S Kashyap, K Karthik 2011 National Conference on Communications (NCC), 1-5, 2011 | 10 | 2011 |
Image quality assessment based outlier detection for face anti-spoofing K Karthik, BR Katika 2017 2nd international conference on communication systems, computing and IT …, 2017 | 8 | 2017 |
A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes. K Karthik, D Hatzinakos Security and Management, 83-89, 2007 | 6 | 2007 |
Face anti-spoofing by identity masking using random walk patterns and outlier detection BR Katika, K Karthik Pattern Analysis and Applications 23 (4), 1735-1754, 2020 | 5 | 2020 |
Face anti-spoofing based on sharpness profiles K Karthik, BR Katika 2017 IEEE international conference on industrial and information systems …, 2017 | 5 | 2017 |
Investigation on the muzzle of a pig as a biometric for breed identification S Chakraborty, K Karthik, S Banik Proceedings of 3rd International Conference on Computer Vision and Image …, 2020 | 4 | 2020 |
Purple fringing aberration detection based on content-adaptable thresholds K Karthik, P Malik Proceedings of First International Conference on Smart System, Innovations …, 2018 | 4 | 2018 |
Multimedia Encoding for Access Control with Traitor Tracing: Balancing Secrecy, Privacy and Traceability K Karthik, D Hatzinakos AV Akademikerverlag, 2012 | 4 | 2012 |
Joint fingerprinting and decryption for multimedia content tracing in wireless networks K Karthik, D Kundur, D Hatzinakos Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2004 | 4 | 2004 |
Iterative content adaptable purple fringe detection P Malik, K Karthik Signal, Image and Video Processing 12, 181-188, 2018 | 3 | 2018 |
Key search and adaptation based on association rules for backward secrecy K Karthik Workshop on Information Forensics and Security (WIFS 2015), 2016 | 3 | 2016 |
Secure fingerprint embedding based on modified GDFT based parametric transform N Suresh, K Karthik 2011 International Conference on Image Information Processing, 1-6, 2011 | 3 | 2011 |
Methodologies for access control and fingerprinting of multimedia K Karthik Dissertation Abstracts International 68 (01), 2006 | 3 | 2006 |
Graph synthesis for pig breed classification from muzzle images S Chakraborty, K Karthik, S Banik IEEE Access 9, 127240-127258, 2021 | 2 | 2021 |
Identity independent face anti-spoofing based on random scan patterns K Karthik, BR Katika International Conference on Pattern Recognition and Machine Intelligence, 3-12, 2019 | 2 | 2019 |