Deepa Kundur
University of Toronto
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Deepa Kundur.
IEEE Signal Processing Magazine | 1996
Deepa Kundur; Dimitrios Hatzinakos
The goal of image restoration is to reconstruct the original scene from a degraded observation. This recovery process is critical to many image processing applications. Although classical linear image restoration has been thoroughly studied, the more difficult problem of blind image restoration has numerous research possibilities. We introduce the problem of blind deconvolution for images, provide an overview of the basic principles and methodologies behind the existing algorithms, and examine the current trends and the potential of this difficult signal processing problem. A broad review of blind deconvolution methods for images is given to portray the experience of the authors and of the many other researchers in this area. We first introduce the blind deconvolution problem for general signal processing applications. The specific challenges encountered in image related restoration applications are explained. Analytic descriptions of the structure of the major blind deconvolution approaches for images then follows. The application areas, convergence properties, complexity, and other implementation issues are addressed for each approach. We then discuss the strengths and limitations of various approaches based on theoretical expectations and computer simulations.
Proceedings of the IEEE | 1999
Deepa Kundur; Dimitrios Hatzinakos
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specific frequencies of the image that have been modified. This allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proofing and authentication.
international conference on acoustics speech and signal processing | 1998
Deepa Kundur; Dimitrios Hatzinakos
We present a novel technique for the digital watermarking of still images based on the concept of multiresolution wavelet fusion. The algorithm is robust to a variety of signal distortions. The original unmarked image is not required for watermark extraction. We provide analysis to describe the behaviour of the method for varying system parameter values. We compare our approach with another transform domain watermarking method. Simulation results show the superior performance of the technique and demonstrate its potential for the robust watermarking of photographic imagery.
international conference on image processing | 1997
Deepa Kundur; Dimitrios Hatzinakos
We present an approach for still image watermarking in which the watermark embedding process employs multiresolution fusion techniques and incorporates a model of the human visual system (HVS). The original unmarked image is required to extract the watermark. Simulation results demonstrate the high robustness of the algorithm to such image degradations as JPEG compression, additive noise and linear filtering.
Proceedings of the IEEE | 2004
Deepa Kundur; Kannan Karthik
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. Necessary design tradeoffs for algorithm development are highlighted for multicast communication environments. We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications.
IEEE Transactions on Signal Processing | 1998
Deepa Kundur; Dimitrios Hatzinakos
We present a novel blind deconvolution technique for the restoration of linearly degraded images without explicit knowledge of either the original image or the point spread function. The technique applies to situations in which the scene consists of a finite support object against a uniformly black, grey, or white background. This occurs in certain types of astronomical imaging, medical imaging, and one-dimensional (1-D) gamma ray spectra processing, among others. The only information required are the nonnegativity of the true image and the support size of the original object. The restoration procedure involves recursive filtering of the blurred image to minimize a convex cost function. We prove convexity of the cost function, establish sufficient conditions to guarantee a unique solution, and examine the performance of the technique in the presence of noise. The new approach is experimentally shown to be more reliable and to have faster convergence than existing nonparametric finite support blind deconvolution methods. For situations in which the exact object support is unknown, we propose a novel support-finding algorithm.
IEEE Transactions on Multimedia | 2004
Deepa Kundur; Dimitrios Hatzinakos
This paper presents a novel robust watermarking approach called FuseMark based on the principles of image fusion for copy protection or robust tagging applications. We consider the problem of logo watermarking in still images and employ multiresolution data fusion principles for watermark embedding and extraction. A human visual system model based on contrast sensitivity is incorporated to hide a higher energy hidden logo in salient image components. Watermark extraction involves both characterization of attacks and logo estimation using a rake-like receiver. Statistical analysis demonstrates how our extraction approach can be used for watermark detection applications to decrease the problem of false negative detection without increasing the false positive detection rate. Simulation results verify theoretical observations and demonstrate the practical performance of FuseMark.
IEEE Signal Processing Magazine | 1996
Deepa Kundur; Dimitrios Hatzinakos
The article discusses the major approaches, such as projection based blind deconvolution and maximum likelihood restoration, we overlooked previously (see ibid., no.5, 1996). We discuss them for completeness along with some other works found in the literature. As the area of blind image restoration is a rapidly growing field of research, new methods are constantly being developed.
IEEE Transactions on Signal Processing | 2001
Deepa Kundur; Dimitrios Hatzinakos
We consider the use of novel communication tool sets to improve the performance of robust watermarking systems. In particular, we relate the effects of attacks on the watermark to signal interference in a fading environment and employ diversity transmission and channel estimation principles to improve performance. A nonstationary parallel binary symmetric channel (BSC) model of the watermark channel is introduced to more accurately characterize signal tampering and, hence, extract the watermark. Analysis of the system sheds light on novel strategies and domains to embed information to improve the performance of robust data hiding schemes. Simulation and testing verify our theoretical observations.
international conference on smart grid communications | 2010
Deepa Kundur; Xianyong Feng; Shan Liu; Takis Zourntos; Karen L. Butler-Purry
This paper presents a framework for cyber attack impact analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid entity relationships are modeled as directed graphs. Each node of the graph has associated state information that is governed by dynamical system equations that model the physics of the interaction (for electrical grid components) or functionality (for cyber grid elements). We illustrate how cause-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems.