PUBLICATIONS

M. Ramkumar, Symmetric Cryptographic Protocols, Springer, August 2014.

H.T Sencar, M. Ramkumar and A.N. Akansu, Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia, Elsevier Academic Press, July 2004.

Book Chapters

  1. M. Ramkumar, "Key Distribution," in Security in Ad Hoc and Sensor Networks, Vol 3, World Scientific (Singapore), Computer and Network Security, pp 29--66, 2010.

Journals

  1. Ayoola, M., Pillai, N., Nanduri, B. B., Rothrock Jr, M. J., Ramkumar, M. (2023). Predicting foodborne pathogens and probiotic taxa within poultry related microbiomes using a machine learning approach. Animal Microbiome (Nov 15;5(1):57).
  2. Ferraro, M., Perkins, A. D., Ramkumar, M., Nanduri, B. B. (2023). Chapter 5: No boundary thinking for transcriptomics and proteomics big data. In Xiuzhen Huang, J H Moore, Yu Zhang (Ed.), Integrative Bioinformatics for Biomedical Big data (vol. Sep 28:67). Cambridge University Press.
  3. Pillai, N., Ayoola, M., Nanduri, B. B., Ramkumar, M. (2022). An ensemble learning approach to identify pastured poultry farm practice variables and soil constituents that promote Salmonella prevalence. Heliyon, 8(11).
  4. Pillai, N., Ramkumar, M., Nanduri, B. B. (2022). Artificial Intelligence Models for Zoonotic Pathogens: A Survey. iMicroorganisms, 10(10) Pillai, N., Ayoola, M., Ramkumar, M., Nanduri, B. B. (2022). Preharvest Environmental and Management Drivers of Multidrug Resistance in Major Bacterial Zoonotic Pathogens in Pastured Poultry Flocks. Microorganisms, 10(9).
  5. F. Wei, S. Tate, M. Ramkumar, S. Mohanty A Scalable Trustworthy Infrastructure for Collaborative Container Repositories , ACM Journal of Distributed Ledger Technologies: Research and Practice, 1(1), pp 1--29, September 2022.
  6. M. Ramkumar, N.Adhikari, Authoritative and Unbiased Responses to Geographic Queries , Scirp Journal of Information Security, 13(3), July 2022.
  7. M. Ramkumar, N.Adhikari, Blockchain Based Redistricting with Public Participation , Scirp Journal of Information Security, 13(3), July 2022.
  8. M. Ramkumar, Executing Large Scale Processes in a Blockchain , Journal of Capital Market Studies, Nov 2018.
  9. A. Velegapalli, M. Ramkumar A Security Architecture for SCADA Systems , Journal of Information Security, Vol. 9 , pp 100-132, Jan 2018.
  10. S.Mohanty, M. Ramkumar, N. Adhikari, OMT: A Dynamic Authenticated Data Structure for Security Kernels , International Journal of Computer Networks & Communications, Vol 8, pp 1-23, July 2016.
  11. M. Ramkumar, Towards a Standard Execution Environment for Security Protocols , Journal Issue on Information and Communications Technology, 2(1), pp 78-90, October 2016.
  12. S.Mohanty, V.Thotakura, M. Ramkumar, An Efficient Trusted Computing Base for MANET Security , Vol 5, No 4, October 2014.
  13. A. Velegapalli, M. Ramkumar, Trustworthy TCB for DNS Servers, International Journal of Network Security, 14(4), July 2012.
  14. V. Thotakura, M. Ramkumar, Collision Resistant Temporally Ordered Routing Algorithm, International Journal of Information Sciences and Computer Engineering, pp 1-8, Vol 1, No 1, 2010.
  15. M. Ramkumar , The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme, IEEE Transactions on Information Forensics and Security (TIFS), pp 39-51, Vol 5, No 1, Mar 2010.
  16. M. Ramkumar, Trustworthy Computing Under Resource Constraints With the DOWN Policy, IEEE Transactions on Secure and Dependable Computing, pp 49-61, Vol 5, No 1, Jan-Mar 2008.
  17. H. T. Sencar, M. Ramkumar, A. N. Akansu, A. Sukerkar, Improved Utilization of Embedding Distortion in Scalar Quantization Based Data Hiding Techniques, Signal Processing (Elsevier) pp 877-890, Volume 87 (5) May 2007.
  18. M. Ramkumar, Broadcast Authentication With Preferred Verifiers, International Journal of Network Security, pp 166-178, Vol 4(2), March 2007.
  19. M. Ramkumar, N. Memon, Secure Collaboration over Message Boards, International Journal of Security and Networks, Vol 1 (1/2), pp 113-123, 2006.
  20. M. Ramkumar, Broadcast Encryption Using Probabilistic Key Distribution and Applications, Journal of Computers, Vol 1 (3), June 2006.
  21. H.T. Sencar, M. Ramkumar, A. N. Akansu, An Overview of Scalar Quantization Based Data Hiding Methods, Signal Processing, 86 (5), pp 893-914, May 2006.
  22. M. Ramkumar, N. Memon, An Efficient Key Predistribution Scheme for Ad Hoc Network Security, IEEE Journal on Selected Areas of Communication, Vol 23 (3), pp 611-621, March 2005.
  23. M. Ramkumar, A.N. Akansu, Optimal Design of Data Hiding Methods Robust to Lossy Compression, IEEE Transactions on Multimedia, Vol 6(6), pp 947 - 951, Dec 2004.
  24. L. Gang, A.N. Akansu, M. Ramkumar, Linear and Nonlinear Oblivious Data Hiding, EURASIP Journal on Applied Signal Processing, No 14, pp 2102 - 2112, Oct 2004.
  25. M. Ramkumar, A.N. Akansu, Robust Protocols for Proving Ownership of Multimedia Content, IEEE Transactions on Multimedia, Vol 6 (3), pp 469--468, June 2004.
  26. M. Ramkumar, A.N. Akansu, Signaling Methods for Multimedia Steganography, IEEE Transactions on Signal Processing, Vol 52 (4), pp 1100--1111, April 2004.
  27. M. Ramkumar, A.N. Akansu, Capacity Estimates for Data Hiding in Compressed Images, IEEE Transactions on Image Processing, Vol 10 (8), pp 1252--1263, August 2001.
  28. M. Ramkumar, G.V. Anand, An FFT-based technique for fast fractal image compression, Signal Processing (63)3, pp. 263-268, 1997
  29. B. Nanduri, M. L. Lawrence, C. R. Boyle, M. Ramkumar, S.C. Burgess, Effects of sub-minimum inhibitory concentration of antibiotics on the Pasteurella Multicoda Proteome, Journal of Proteome Research, 2006.
  30. Nanduri B, Shah P, Ramkumar M, Allen EB, Swiatlo E, Burgess SC, Lawrence ML, Quantitative analysis of Streptococcus Pneumoniae TIGR4 response to in vitro iron restriction by 2-D LC ESI MS/MS, Proteomics, May 2008.

    Magazines

    1. M. Ramkumar, N. Memon, Making A Mark, SPIE's OE Magazine, pp 20-23, Jan 2003.
    2. M. Ramkumar, DOWN With Trusted Devices, IATAC IAnewsletter, Vol 8 (4) Spring 2006.

    PhD Dissertations

    1. Naresh Adhikari Authoritative and Unbiased Responses to Geographic Queries
    2. Naila Bushra TCB Minimizing Model of Computation
    3. Somya Mohanty Ordered Merkle Tree
    4. Arun Velagapalli Minimal Trusted Computing Base for Critical Infrastructure Protection
    5. Vinay Thotakura Trustworthy Computing Approach for Securing Ad Hoc Routing Protocols
    6. Sivakumar Kulasekaran Secure Ad Hoc Routing Protocols with Detection, Identification and Self-Healing Capabilities

    ePrint Archives

    1. M. Ramkumar, Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications, Cryptology ePrint Archive, July 2008.
    2. M. Ramkumar, Broadcast Encryption with Random Key Pre-distribution Schemes, Cryptology ePrint Archive, May 2005.
    3. M. Ramkumar, I-HARPS: An Efficient Key Pre-distribution Scheme, Cryptology ePrint Archive, May 2005.
    4. M. Ramkumar, Broadcast Authentication With Hashed Random Preloaded Subsets, Cryptology ePrint Archive, May 2005.
    5. M. Ramkumar, N. Memon, Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance, Cryptology ePrint Archive, April 2004.
    6. M. Ramkumar, N. Memon, HARPS: HAshed Random Preloaded Subset Key Distribution, Cryptology ePrint Archive, August 2003.

    Conferences

    1. Pillai, N., Nanduri, B. B., Rothrock Jr, M. J., Chen, Z., Ramkumar, M. (2023). Towards Optimal Microbiome to Inhibit Multidrug Resistance. no (pp. (CIBCB) (pp. 1-9). IEEE). Eindhoven: IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB).
    2. Pillai, N., Nanduri, B., Rothrock, M. J., Chen, Z., Ramkumar, M. (2023). Towards Optimal Microbiome to Inhibit Multidrug Resistance. 2023 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB) (pp. 1--9).
    3. N. Adhikari, M. Ramkumar, Monitoring Integrity of IoT Network Topography using a Blockchain Network, The 2022 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'22) July 2022, Las Vegas.
    4. N. Adhikari, N. Bushra, M. Ramkumar, Blockchain-based Redistricting Evaluation Protocol, 15th International Conference on Cyber Warfare and Security (ICCWS). Old Dominion University (ODU), Norfolk, Virginia, USA, 12 March- 13 March 2020.
    5. N. Bushra, N. Adhikari, M. Ramkumar, Scalable Verification of NP Problems in a Blockchain, 15th International Conference on Cyber Warfare and Security (ICCWS). Old Dominion University (ODU), Norfolk, Virginia, USA, 12 March- 13 March 2020.
    6. N. Bushra, N. Adhikari, M. Ramkumar, Secure Queryable Dynamic Graphs using Blockchains, IEEE Trust Privacy and Security 2019, Los Angeles, CA, Dec 12-14 2019.
    7. N. Adhikari, N.Bushra, M. Ramkumar, Redistricting using Blockchain Networks, IEEE Trust Privacy and Security 2019, Los Angeles, CA, Dec 12-14 2019.
    8. N. Adhikari, N.Bushra, M. Ramkumar, Complete Merkle Hash Trees for Large Dynamic Spatial Data, The 2019 International Conference on Computational Science and Computational Intelligence (CSCI'19: December 05-07, 2019, Las Vegas, USA)
    9. M.Ramkumar, Scalable Computing In a Blockchain, The 2018 IEEE Sarnoff Symposium, Newark, NJ, Sep 23-24 2018.
    10. N. Bushra, N. Adhikari, M.Ramkumar, TMMC: A TCB Minimizing Model of Computation, The Sixth International Symposium on Security in Computing and Communications (SSCC-18), Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2018), Bangalore, India, Sep 19-22, 2018.
    11. M.Ramkumar, A Blockchain System Integrity Model, The 17th International Conference on Security and Management (SAM'18), Las Vegas, USA, July 30-Aug 2, 2018.
    12. M.Ramkumar, Minimal TCB for System-Model Execution, The 2017 International Conference on Security and Management (SAM'17: July 17-20, 2017, Las Vegas, USA).
    13. N. Adhikari, N. Bushra, M.Ramkumar, Secure Queryable Dynamic Maps,The 16th International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE'17: July 17-20, 2017, Las Vegas, USA).
    14. M.Ramkumar, Cybersecurity: Its all About the Assumptions, National Cyber Summit 2016, Huntsville, AL, June 2016.
    15. M.Ramkumar, S. Mohanty, Reliable Assurance Protocols for Information Systems, INTERNET 2015, St. Julians, Malta, Oct 2015.
    16. M.Ramkumar, Mirror Network: A Holistic Approach for Assuring Information Systems, SAM 2015, Las Vegas, NV, Jul 2015.
    17. M.Ramkumar, S. Mohanty, A Trustworthy Assurance-as-a-Service Architecture, Workshop on Cryptography and Information Security, Track 5 ICS 2014, Taichung, Taiwan, Dec 2014.
    18. Mohanty. S, Velagapalli. A, Ramkumar. M, An Efficient TCB for a Generic Content Distribution System, CyberC 2012, Sanya, China, Oct 2012.
    19. Velagapalli. A, Mohanty. S, Ramkumar. M, (Aug 2012). An Efficient TCB for a Generic Data Dissemination System. IEEE International conference on Communications in China, Communication Theory and Security Symposium, August 2012, Beijing, China.
    20. Mohanty, S., Ramkumar, M. Securing File Storage in an Untrusted Server Using a Minimal Trusted Computing Base, International Conference on Cloud Computing and Services (CLOSER), Noordwijkerhout, May 2011, The Netherlands.
    21. Velagapalli, A., & Ramkumar, M. An Efficient Trusted Computing Base (TCB) for a SCADA System Monitor, Tenth International Information and Telecommunication Technologies Conference (I2TS), Sep 2011, Floripa, Brazil.
    22. Velagapalli, A., & Ramkumar, M. Minimizing the TCB for Securing SCADA Systems, ACM's 7th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), Oak Ridge, TN.
    23. V. Thotakura, M. Ramkumar, Minimal TCB For MANET Nodes, 6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), Niagara Falls, ON, Canada, September 2010.
    24. K.Sivakumar, M. Ramkumar, Obtaining Non-repudiable Proof of Active Attacks in DSR, The 9th International Information and Telecommunication Technologies Symposium (I2TS'2010), Rio de Janeiro, Brazil.
    25. V.Thotakura, M. Ramkumar, Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols, The 9th International Information and Telecommunication Technologies Symposium (I2TS'2010), Rio de Janeiro, Brazil.
    26. M. Ramkumar On the Complexity of Key Predistribution Schemes, IEEE Dependable Network Computing and Mobile Systems, Niagara Falls, Sep 2009.
    27. K.Sivakumar, M. Ramkumar Private Logical Neighborhoods for Wireless Ad Hoc Networks, ACM Q2SWinet, Oct 2009.
    28. M. Ramkumar Proxy Aided Key Pre-distribution Schemes for Sensor Networks, IEEE NSP 2008, Austin, TX, Dec 2008.
    29. K.A. Sivakumar, M. Ramkumar Improving the Resilience of Ariadne, IEEE SPAWN 2008, Newport Beach, CA, June 2008.
    30. M. Ramkumar On the Scalability of a "Nonscalable" Key Distribution Scheme, IEEE SPAWN 2008, Newport Beach, CA, June 2008.
    31. B. Gaines, M. Ramkumar A Framework for Dual Agent Routing Protocols for MANETs, IEEE Globecom 2008, New Orleans, LA, Nov 2008.
    32. K.A. Sivakumar, M. Ramkumar An Efficient Secure Route Discovery Protocol for DSR, IEEE Globecom 2007, Washington, DC, Nov 2007.
    33. K.A. Sivakumar, M. Ramkumar Safeguarding Mutable Fields in the AODV Route Discovery Process, the Sixteenth IEEE ICCCN-07, Honolulu, HI, Aug 2007.
    34. M. Ramkumar A Family of Efficient Key Predistribution Schemes for Pairwise Authentication, Eighth IEEE IA Workshop, West Point, NY, Jun 2007.>
    35. M. Ramkumar On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies, IEEE Globecom 2006, San Francisco, CA, Nov 2006.
    36. M. Ramkumar I-HARPS: An efficient key predistribution scheme for mobile computing applications, IEEE Globecom 2006, San Francisco, CA, Nov 2006.
    37. K.A. Sivakumar, M. Ramkumar On the effect of one-way links on route discovery in DSR, the Fifteenth IEEE ICCCN-06, Arlington, VA, Oct 2006.
    38. M. Ramkumar An efficient broadcast authentication scheme for ad hoc routing protocols,, IEEE ICC 2006, Istanbul, Turkey, Jun 2006.
    39. M. Ramkumar Securing ad hoc networks with "asymmetric" probabilistic key predistribution schemes, Seventh IEEE IA Workshop, West Point, NY, Jun 2006.
    40. M. Ramkumar On Broadcast Encryption with Random Key Pre-distribution Schemes,, First International Conference on Information Systems Security (ICISS), Dec 2005, Kolkata, India.
    41. M. Ramkumar, N. Memon A Hierarchical Key Pre-distribution Scheme,. IEEE Electro/Information Technolgy Conference (EIT 2005), Lincoln, NE, May 2005.
    42. M. Ramkumar, N. Memon A DRM Based on Renewable Broadcast Encryption,, Visual Communications and Image Processing (VCIP), Beijing, China, July 2005. 
    43. M. Ramkumar Safe Renewal of a Random Key Pre-distribution Scheme for Trusted Devices, 6th IEEE Information Assurance Workshop, West Point, NY, June 2005. 
    44. M. Ramkumar, N. Memon KPI: A Security Infrastructure for Trusted Devices , NDSS Pre-conference Workshop, San Diego, CA, Feb 2005 . 
    45. M. Ramkumar, N. Memon An Efficient Random Key Pre-distribution Scheme , IEEE Globecom 2004, Dallas, TX, Nov 2004. 
    46. Y. Zhang, M. Ramkumar, N. Memon Information Flow Based Routing Algorithms for Wireless Sensor Networks , IEEE Globecom 2004, Dallas, TX, Nov 2004. 
    47. I. Avcibaž, S. Bayram, N. Memon, M. Ramkumar, B. Sankur A Classifier Design For Detecting Image Manipulations , ICIP2004: Intern. Conference on Image Processing, Sept. 2004, Singapore.>
    48. M. Ramkumar, N. Memon Preloaded Key Distribution Schemes for Ad Hoc Networks , International Conference on Computing, Communications and Control Technologies (CCCT) 2004, Austin, TX, Aug 2004. 
    49. M. Ramkumar, N. Memon On the Security of Random Key Pre-distribution Schemes, 5th Annual IEEE Information Assurance Workshop, West Point, NY, June 2004. 
    50. M. Ramkumar, N. Memon A System for Digital Rights Management Using Key Pre-distribution, Proc ICME 2004, Taipei, Taiwan, June 2004. 
    51. H. T.  Sencar, M. Ramkumar, A. N. Akansu, An Analysis of Quantization Based Embedding-Detection Techniques, Proc ICASSP 2004, Montreal, Canada, May 2004. 
    52. M. Ramkumar, N. Memon, Multiple Authorship Protocol For Watermarking, 38th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, March 2004. 
    53. M. Ramkumar, N. Memon, R. Simha, Pre-Loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-Hoc Networks, Globecom 2003, San Francisco, CA, Dec 2003.
    54. H. T.  Sencar, M. Ramkumar, A. N. Akansu, A New Perspective for Embedding-Detection Methods with Distortion Compensation and Thresholding processing techniques, Proc ICIP 2003. 
    55. H. T.  M. Ramkumar, N. Memon, ESIMS - An Efficient Key Predistribution Scheme, Five Minute Talks at the IEEE Symposium on Security and Privacy May 12, 2003. 
    56. H. T.  Sencar, M. Ramkumar, A. N. Akansu, Multiple Codebook Information Hiding Based on Minimum Distortion Criterion, Proc of CISS, March 2003.
    57. H. T.  Sencar, M. Ramkumar, A. N. Akansu, Multiple Codebook Information Hiding, Proc of CISS, Mar 2002.
    58. H. T.  Sencar, M. Ramkumar, A. N. Akansu, A Robust Type-III Data Hiding Technique Against Cropping and Resizing Attacks, IEEE ISCAS 2002, Scottsdale, AZ, May 2002.
    59. H. T.  Sencar, A. N. Akansu, M. Ramkumar, Improvements on Data Hiding for Lossy Compression, IEEE ICASSP 2002, Orlando, FL, May 2002.
    60. L. Gang, A. N. Akansu, and M. Ramkumar, Security and Synchronization in Watermark Sequence, IEEE Proc. of ICASSP,  Orlando, Florida, May 2002.
    61. L. Gang, A. N. Akansu, and M. Ramkumar, Random Sequence Selection in Watermarking,  Proc.  International Conf. on Imaging Science, Systems, and Technology, NV, July  2001.
    62. L. Gang, A. N. Akansu, and M. Ramkumar, Performance Analysis of Spread Spectrum Modulation in Data Hiding,  Proc. SPIE, San Jose, CA,  July  2001.
    63. L. Gang, A. N. Akansu, and M. Ramkumar, Nonlinear Modulation in Oblivious Steganography,  Proc. IEEE-EURASIP Nonlinear Signal and Image Processing, MD, June  2001.
    64. L. Gang, A. N. Akansu, and M. Ramkumar, MP3 Resistant Oblivious Steganography,  Proc. IEEE-ICASSP, UT, May  2001.
    65. L. Gang, A. N. Akansu, and M. Ramkumar, Set Partitioning in Oblivious Data Hiding,  Proc. IEEE-ICASSP, UT,  May 2001.
    66. L. Gang, A. N. Akansu, and  M. Ramkumar, On-line Music Protection and MP3 Compression, International Symposium on Intelligient Signal and Information Multimedia Processing, May  2001.
    67. L. Gang, A. N. Akansu, and  M. Ramkumar, Transform Selection in Steganography, Proc. CISS, MD, March  2001.
    68. H. T.  Sencar, M. Ramkumar, A. N. Akansu,  Efficient Codebook Structures for Practical Information Hiding Schemes, Proc. CISS,  Baltimore,  MD, March  2001.
    69. L. Gang, A. N. Akansu, and M. Ramkumar, Periodic Signaling Scheme in Oblivious Data Hiding,  Proc. ASILOMAR (34th), November 2000.
    70. M. Ramkumar, A.N. Akansu, A Robust Oblivious Watermarking Scheme, IEEE ICIP, Vancouver, Canada, September 2000.
    71. I.B. Ozer, M. Ramkumar, A.N. Akansu, A New Method for Detection of Watermarks in Geometrically Distorted Images, IEEE ICASSP, Istanbul, Turkey, vol IV, pp 1963 - 1966, June 2000.
    72. M. Ramkumar, A.N. Akansu, FFT- based Signaling for Multimedia Steganography, IEEE ICCASP, Istanbul, Turkey, Vol IV, pp 1979-1982, June 2000.
    73. M. Ramkumar, A.N. Akansu, X. Cai, Floating Signal Constellations for Multimedia Steganography, IEEE ICC, New Orleans, LA, June 2000. 
    74. M. Ramkumar, A.N. Akansu, Robust Protocols for Proving Ownership of Images, Proceedings of IEEE ITCC, ISBN 0-7695-0540-6, pp 22-27, Las Vegas, NV, March 2000. 
    75. >
    76. M. Ramkumar, A.N. Akansu, A.A. Alatan, A Robust Data Hiding Scheme For Digital Images Using DFT IEEE ICIP, Vol II, pp 211-215, October 99.
    77. M.Ramkumar, A.N. Akansu, Some Design Issues for Robust Data Hiding Systems, 33rd ASILOMAR Conference on Signals Systems and Computers, Pacific Grove, CA, Vol. 2, pp 1528-1534, October, 1999.
    78. M. Ramkumar, A.N. Akansu, Self-Noise Suppression Schemes for Blind Image Steganography, SPIE Special Session on Image Security, Boston, MA, vol 3845, pp 55-65, September 99. 
    79. M. Ramkumar, G.V. Anand, A.N. Akansu, On the Implementation of 2-Band Cyclic Filterbanks . IEEE ISCAS, Orlando, FL, Vol III, pp 520-523, June 1999.
    80. M. Ramkumar, A.N. Akansu, A. Alatan, Increasing Robustness of Watermarks to Counterfeit Attacks ,CDVMR TR-99-11, 1999.
    81. M. Ramkumar, A.N. Akansu, A Capacity Estimate for Data Hiding in Internet Multimedia . Content Security and Data Hiding in Digital Media, Newark, NJ, May 14 1999.
    82. M. Ramkumar, A.N. Akansu, Image Watermarks and Counterfeit Attacks: Some Problems and Solutions . Content Security and Data Hiding in Digital Media, Newark, NJ, May 14 1999. 
    83. M. Ramkumar, A.N. Akansu, A.A. Alatan, On the Choice of Transforms for Data Hiding in Compressed Video. IEEE ICASSP, Vol VI, pp 3049-3052, Phoenix, Arizona, March 1999. 
    84. M. Ramkumar, A.N. Akansu, Information Theoretic Bounds for Data Hiding in Compressed Images . IEEE 2nd Workshop on Mulimedia Signal Processing, Redondo Beach, CA, USA, pp 267-272, December 1998.
    85. M. Ramkumar, A.N. Akansu, Theoretical Capacity Measures for Data Hiding in Compressed Images. SPIE's Symposium on Voice, Video and Data Communication , Boston, MA, Vol 3528, pp 482-492, November 1998. 
    86. M. Ramkumar, A.N. Akansu, A Robust Scheme for Oblivious Detection of Watermarks / Data Hiding in Still Images. SPIE's Symposium on Voice, Video and Data Communication , Boston, MA, Vol 3528, pp 474-481, November 1998.
    87. M. Ramkumar, A.N. Akansu, A Performance Study of DCT and Subband Image Codecs with Zero-Zone Quantizers, IEEE ISCAS, Vol V, pp 118-121, Monterey, CA, June 1998.

    Dissertation

    PhD's thesis: Data Hiding in Multimedia : Theory and Applications. pdf October 1999.

    Master's thesis: Some New Methods for Improved Fractal Image Compression. pdf December 1996.