Min Wu
Distinguished University Professor
3164 Iribe Center
(301) 405-0401
(301) 314-9281
Education:
Ph.D., Princeton University (Electrical Engineering)
Special Awards/Honors:
IEEE Fellow
National Science Foundation (NSF) CAREER Award
AAAS Fellow
Biography:
Min Wu is a Distinguished University Professor of electrical and computer engineering with an appointment in the University of Maryland Institute for Advanced Computer Studies.
A recognized leader in digital forensics and multimedia signal processing, she has made significant contributions to the fields of information security and forensics. Her research focuses on developing advanced techniques in multimedia signal processing, with a strong emphasis on applying data science and machine learning to address challenges in health and the Internet of Things.
Go here to view Wu's academic publications on Google Scholar.
Publications
2011
2011. "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
2011. Exploring compression effects for improved source camera identification using strongly compressed video. Image Processing (ICIP), 2011 18th IEEE International Conference on. :1953-1956.
2011. Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
2011. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification. Information Forensics and Security, IEEE Transactions on. 6(3):1146-1159.
2011. Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
2011. Modeling temporal correlations in content fingerprints. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :1860-1863.
2010
2010. Semi non-intrusive training for cell-phone camera model linkage. Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. :1-6.
2010. System and Method for Confidentiality-Preserving Rank-Ordered Search. 12/608,724
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
2010. Method for concealing data in curves of an image. : 11/221,727(7817817)
2010. Gradient descent approach for secure localization in resource constrained wireless sensor networks. Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. :1854-1857.
2010. Method for fingerprinting multimedia content. 11/326,313(7814564)
2009
2009. Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.
2009. Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
2009. Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
2009. Fingerprinting Compressed Multimedia Signals. Information Forensics and Security, IEEE Transactions on. 4(3):330-345.
2009. Modeling and analysis of content identification. Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on. :1528-1531.
2009. High-Fidelity Data Embedding for Image Annotation. Image Processing, IEEE Transactions on. 18(2):429-435.
2009. Modeling and analysis of ordinal ranking in content fingerprinting. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :116-120.
2009. Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
2009. Modeling content fingerprints using markov random fields. Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on. :111-115.
2008
2008. Dynamic Resource Allocation for Robust Distributed Multi-Point Video Conferencing. Multimedia, IEEE Transactions on. 10(5):910-925.
2008. Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
2008. A decision theoretic framework for analyzing binary hash-based content identification systems. Proceedings of the 8th ACM workshop on Digital rights management. :67-76.
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2008. Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.
2008. Image acquisition forensics: Forensic analysis to identify imaging source. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1657-1660.
2007
2007. Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
2007. Improving Embedding Payload in Binary Imageswith "Super-Pixels". Image Processing, 2007. ICIP 2007. IEEE International Conference on. 3:III-277-III-280-III-277-III-280.
2007. Noise Features for Image Tampering Detection and Steganalysis. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 6:VI-97-VI-100-VI-97-VI-100.
2007. Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
2007. Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
2007. Joint Uplink and Downlink Optimization for Real-Time Multiuser Video Streaming Over WLANs. Selected Topics in Signal Processing, IEEE Journal of. 1(2):280-294.
2007. Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
2007. A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
2007. Colluding Fingerprinted Video using the Gradient Attack. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-161-II-164-II-161-II-164.
2007. Collusion-Resistant Dynamic Fingerprinting for Multimedia. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-289-II-292-II-289-II-292.
2007. Collusion-Resistant Fingerprinting for Compressed Multimedia Signals. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-165-II-168-II-165-II-168.
2007. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
2007. Adaptive Detection for Group-Based Multimedia Fingerprinting. Signal Processing Letters, IEEE. 14(12):964-967.
2007. Collusion-Resistant Video Fingerprinting for Large User Group. Information Forensics and Security, IEEE Transactions on. 2(4):697-709.
2006
2006. Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
2006. Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
2006. Multiuser cross-layer resource allocation for video transmission over wireless networks. Network, IEEE. 20(2):21-27.
2006. Multiuser distortion management of layered video over resource limited downlink multicode-CDMA. Wireless Communications, IEEE Transactions on. 5(11):3056-3067.
2006. Cross-Path PDMA-Based Error Protection for Streaming Multiuser Video over Multiple Paths. Image Processing, 2006 IEEE International Conference on. :21-24.
2006. JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw.. 14(5):1128-1140.
2006. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
2006. Joint coding and embedding techniques for MultimediaFingerprinting. Information Forensics and Security, IEEE Transactions on. 1(2):231-247.
2006. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 15(7):2061-2075.
2006. Classification-based spatial error concealment for visual communications. EURASIP J. Appl. Signal Process.. 2006:257-257.
2006. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
2006. A Scalable Multiuser Framework for Video Over OFDM Networks: Fairness and Efficiency. Circuits and Systems for Video Technology, IEEE Transactions on. 16(10):1217-1231.
2005
2005. An interactive and team approach to multimedia design curriculum. Signal Processing Magazine, IEEE. 22(6):14-19.
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2005. Improving collusion resistance of error correcting code based multimedia fingerprinting. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1029-ii/1032Vol.2-ii/1029-ii/1032Vol.2.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2005. Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
2005. Efficient bandwidth resource allocation for low-delay multiuser video streaming. Circuits and Systems for Video Technology, IEEE Transactions on. 15(9):1124-1137.
2005. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Image Processing, IEEE Transactions on. 14(6):804-821.
2005. Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
2005. Joint uplink and downlink optimization for video conferencing over wireless LAN. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1101-ii/1104Vol.2-ii/1101-ii/1104Vol.2.
2005. Building efficient and effective multimedia fingerprints via joint coding and embedding. Proceedings of the 7th workshop on Multimedia and security. :127-136.
2005. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
2004
2004. Efficient bandwidth resource allocation for low-delay multiuser MPEG-4 video transmission. Communications, 2004 IEEE International Conference on. 3:1308-1312Vol.3-1308-1312Vol.3.
2004. Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on. 6(4):528-538.
2004. Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
2004. Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.
2004. Distortion management of real-time MPEG-4 video over downlink multicode CDMA networks. Communications, 2004 IEEE International Conference on. 5:3071-3075Vol.5-3071-3075Vol.5.