MULTIMEDIA LAB

Dept. of Computer Science and Engineering

Indian Institute of Technology Guwahati

Journals

2020

[25] P. K. Sharma, S. Basavaraju, A. Sur, "Deep Learning based Image De-raining using Discrete Fourier Transformation", In The Visual Computer International Journal of Computer Graphics (TVCJ), Springer.

[24] P. K. Sharma, S. Basavaraju, A. Sur, "High-Resolution Image De-raining using Conditional GAN with Sub-Pixel Upscaling". In Springer journal of Multimedia Tools and Applications (MTAP), 2020.

[23].Basavaraju Sathisha, and Arijit Sur, "Image Memorability Prediction Using Depth and Motion Cues.", IEEE Transactions on Computational Social Systems (2020).

2019

[22]. Sibaji Gaj, Arijit Sur, Prabin Kumar Bora, "Prediction Mode Based H.265/HEVC Video Watermarking Resisting Re-compression Attack", Multimedia Tools and Applications (2019) - Springer.

[21]. Sathisha Basavaraju, Arijit Sur, "Multiple Instance Learning based Deep CNN for Image Memorability Prediction", Multimedia Tools and Applications (2019) - Springer.

[20]. Ritvik Rawat, Brijesh Singh, Arijit Sur, and Pinaki Mitra, "Steganalysis for Clustering Modification Direction Steganography", Multimedia Tools and Applications (2019) - Springer

[19]. Satish Kumar , Rajesh Devaraj , Arnab Sarkar, and Arijit Sur, "Client-Side QoE Management for SVC Video Streaming: An FSM Supported Design Approach", IEEE Transactions on Network and Service Management

[18]. Sathisha Basavaraju, Sibaji Gaj, Arijit Sur,"Object Memorability Prediction using Deep Learning: Location and Size Bias," Journal of Visual Communication and Image Representation, Elsevier, https://doi.org/10.1016/j.jvcir.2019.01.008

2018

[17]. Rana, S., A Sur, "View Invariant DIBR-3D Image Watermarking Using DT-CWT" , Multimedia Tools and Applications, Springer, https://doi.org/10.1007/s11042-018-7024-z

2017

[16]. S. Kumar, A. Sarkar, A. Sur, "A Resource Allocation Framework for Adaptive Video Streaming Over LTE", Journal of Network and Computer Applications, Elsevier. https://www.sciencedirect.com/science/article/pii/S108480451730276X

[15]. Nilkanta Sahu, Arijit Sur, "SIFT Based Video Watermarking Resistant to Temporal Scaling",Journal of Visual Communication and Image Representation, Elsevier. https://www.sciencedirect.com/science/article/pii/S1047320317300500

2016

[14]. Sibaji Gaj, Aditya Kanetkar, A. Sur, Prabin Kumar Bora "Drift Compensated Robust Watermarking Algorithm for H.265/HEVC Video stream", ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 2016. https://dl.acm.org/citation.cfm?id=3009910

[13]. Sibaji Gaj, AnoopRathor, A. Sur, Prabin Kumar Bora,A Robust Watermarking Scheme against Frame Blending and Projection Attacks", Multimedia Tools and Applications, Springer US, September 2016. https://link.springer.com/article/10.1007/s11042-016-3961-6

[12]. Rana, S., Sur, A.: "Depth Based View Invariant Blind 3D Image Watermarking".ACM Trans. Multimedia Comput. Commun. Application 2016

2015

[11]. Nilkanta Sahu, Shuvendu Rana and Arijit Sur "MCDCT-TF based video watermarking resilient to temporal and quality scaling", Multimedia Tools and Applications, Springer US, 2015

[10]. S. Kumar, A. Sarkar, S. Sriram, A. Sur. "A Three Level LTE Downlink Scheduling Framework for RT VBR Traffic." Computer Networks, Elsevier, August, 2015.

2014

[9]. Swathi Karri and A. Sur, "Steganographic Algorithm Based on Randomization of DCT Kernel," Multimedia Tools and Applications, Springer, 2014

[8]. Sibaji Gaj, Ashish Singh Patel, A. Sur, "Object Based Watermarking for H.264/AVC Video Resistant to RST Attacks", Multimedia Tools and Applications, Springer, 2014

[7]. A. Sur, Sista Venkat Madhav Krishna, Nilkanta Sahu and Shuvendu Rana, "Detection of Motion Vector Based Video Steganography", Multimedia Tools and Applications, Springer, 2014

[6]. Shuvendu Rana, Nilkanta Sahu, and Arijit Sur, “Robust watermarking for resolution and quality scalable video sequence,” Multimedia Tools and Applications, pp. 1–30,2014.

2012

[5]. A. Sur, R. Vignesh, and J. Mukherjee, "Secure Steganography using Randomized Cropping", LNCS Transactions on Data Hiding and Multimedia Security,Springer, Volume 7110/2012, pp. 82-95, 2012.

[4]. A. Sur, R. Vignesh, and J. Mukherjee, "Pixel rearrangement based statistical restoration scheme reducing embedding noise", Multimedia Tools Springer, DOI: 10.1007/s11042-012-1078-0, 2012.

[3]. A. Sur, A. S. Nair, A. Kumar, A. Jain, and S. Nandi "Steganalysis of Network Packet Length Based Data Hiding", Circuits, Systems & Signal Processing, Springer, 2012.

[2]. A. Sur, D. Shyam P. Goel and J. Mukherjee, "An Image Steganographic Algorithm Based on Spatial Desynchronization", Multimedia Tools and Applications, Springer, 2012.

[1]. S. Chakraborty, F. A Barbhuiya, A. Rai, A. Sur, S. Biswas and S. Nandi,"Topology Adaptive Computation of Distributed IDS Set for Detecting Attacks on STP", Journal of Information Assurance and Security.ISSN 1554-1010 Volume 7, pp. 284-295, 2012