Publications

38 / 2,449 publications found.


  •  Pathak, M.; Rane, S.; Raj, B., "Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers", Advances in Neural Information Processing Systems (NIPS), December 2010.
    BibTeX Download PDFRead TR2010-042
    • @inproceedings{Pathak2010dec,
    • author = {Pathak, M. and Rane, S. and Raj, B.},
    • title = {Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers},
    • booktitle = {Advances in Neural Information Processing Systems (NIPS)},
    • year = 2010,
    • month = dec,
    • url = {http://www.merl.com/publications/TR2010-042}
    • }
  •  Wang, Y.; Rane, S.; Sun, W.; Ishwar, P., "On Unconditionally Secure Computation with Vanishing Communication Cost", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/ALLERTON.2010.5707010, September 2010.
    BibTeX Download PDFRead TR2010-092
    • @inproceedings{Wang2010sep,
    • author = {Wang, Y. and Rane, S. and Sun, W. and Ishwar, P.},
    • title = {On Unconditionally Secure Computation with Vanishing Communication Cost},
    • booktitle = {Allerton Conference on Communication, Control, and Computing},
    • year = 2010,
    • month = sep,
    • doi = {10.1109/ALLERTON.2010.5707010},
    • url = {http://www.merl.com/publications/TR2010-092}
    • }
  •  Rane, S.; Sun, W.; Vetro, A., "Privacy-Preserving Approximation of L1 Distance for Multimedia Applications", IEEE International Conference on Multimedia and Expo (ICME), ISSN: 1945-7871, July 2010, pp. 492-497.
    BibTeX Download PDFRead TR2010-077
    • @inproceedings{Rane2010jul,
    • author = {Rane, S. and Sun, W. and Vetro, A.},
    • title = {Privacy-Preserving Approximation of L1 Distance for Multimedia Applications},
    • booktitle = {IEEE International Conference on Multimedia and Expo (ICME)},
    • year = 2010,
    • pages = {492--497},
    • month = jul,
    • issn = {1945-7871},
    • url = {http://www.merl.com/publications/TR2010-077}
    • }
  •  Das, S.; Rane, S.D.; Vetro, A., "Hiding Information Inside Structured Shapes", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 2010.
    BibTeX Download PDFRead TR2010-005
    • @inproceedings{Das2010mar,
    • author = {Das, S. and Rane, S.D. and Vetro, A.},
    • title = {Hiding Information Inside Structured Shapes},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2010,
    • month = mar,
    • url = {http://www.merl.com/publications/TR2010-005}
    • }
  •  Nagar, A.; Rane, S.D.; Vetro, A., "Privacy and Security of Features Extracted from Minutiae Aggregates", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 2010.
    BibTeX Download PDFRead TR2010-004
    • @inproceedings{Nagar2010mar,
    • author = {Nagar, A. and Rane, S.D. and Vetro, A.},
    • title = {Privacy and Security of Features Extracted from Minutiae Aggregates},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2010,
    • month = mar,
    • url = {http://www.merl.com/publications/TR2010-004}
    • }
  •  Nagar, A.; Rane, S.D.; Vetro, A., "Alignment and Bit Extraction for Secure Fingerprint Biometrics", SPIE Conference on Electronic Imaging, DOI: 10.1117/12.839130, January 2010, vol. 7541.
    BibTeX Download PDFRead TR2010-003
    • @inproceedings{Nagar2010jan,
    • author = {Nagar, A. and Rane, S.D. and Vetro, A.},
    • title = {Alignment and Bit Extraction for Secure Fingerprint Biometrics},
    • booktitle = {SPIE Conference on Electronic Imaging},
    • year = 2010,
    • volume = 7541,
    • month = jan,
    • doi = {10.1117/12.839130},
    • url = {http://www.merl.com/publications/TR2010-003}
    • }
  •  Wang, Y.; Rane, S.D.; Vetro, A., "Leveraging Reliable Bits: ECC Design Considerations for Practical Secure Biometric Systems", IEEE International Workshop on Information Forensics and Security (WIFS), DOI: 10.1109/WIFS.2009.5386479, December 2009, pp. 71-75.
    BibTeX Download PDFRead TR2009-074
    • @inproceedings{Wang2009dec,
    • author = {Wang, Y. and Rane, S.D. and Vetro, A.},
    • title = {Leveraging Reliable Bits: ECC Design Considerations for Practical Secure Biometric Systems},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2009,
    • pages = {71--75},
    • month = dec,
    • doi = {10.1109/WIFS.2009.5386479},
    • url = {http://www.merl.com/publications/TR2009-074}
    • }
  •  Rane, S.D.; Sun, W.; Vetro, A., "Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption", IEEE International Conference on Image Processing (ICIP), DOI: 10.1109/ICIP.2009.5414544, November 2009, pp. 1485-1588.
    BibTeX Download PDFRead TR2009-070
    • @inproceedings{Rane2009nov,
    • author = {Rane, S.D. and Sun, W. and Vetro, A.},
    • title = {Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption},
    • booktitle = {IEEE International Conference on Image Processing (ICIP)},
    • year = 2009,
    • pages = {1485--1588},
    • month = nov,
    • doi = {10.1109/ICIP.2009.5414544},
    • url = {http://www.merl.com/publications/TR2009-070}
    • }
  •  Rane, S.D.; Sun, W.; Vetro, A., "Secure Function Evaluation Based on Secret Sharing and Homomorphic Encryption", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/ALLERTON.2009.5394944, September 2009, pp. 827-834.
    BibTeX Download PDFRead TR2009-084
    • @inproceedings{Rane2009sep,
    • author = {Rane, S.D. and Sun, W. and Vetro, A.},
    • title = {Secure Function Evaluation Based on Secret Sharing and Homomorphic Encryption},
    • booktitle = {Allerton Conference on Communication, Control, and Computing},
    • year = 2009,
    • pages = {827--834},
    • month = sep,
    • doi = {10.1109/ALLERTON.2009.5394944},
    • url = {http://www.merl.com/publications/TR2009-084}
    • }
  •  Sun, W.; Rane, S., "On Information Leakage During Secure Verification of Compatibility Between Signals", Canadian Workshop on Information Theory (CWIT), ISBN: 978-1-4244-3400-8, May 2009, pp. 75-78.
    BibTeX Download PDFRead TR2009-026
    • @inproceedings{Sun2009may,
    • author = {Sun, W. and Rane, S.},
    • title = {On Information Leakage During Secure Verification of Compatibility Between Signals},
    • booktitle = {Canadian Workshop on Information Theory (CWIT)},
    • year = 2009,
    • pages = {75--78},
    • month = may,
    • isbn = {978-1-4244-3400-8},
    • url = {http://www.merl.com/publications/TR2009-026}
    • }
  •  Varna, A.L.; Rane, S.; Vetro, A., "Data Hiding in Hard-Copy Text Documents Robust to Print, Scan and Photocopy Operations", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), April 2009.
    BibTeX Download PDFRead TR2009-020
    • @inproceedings{Varna2009apr,
    • author = {Varna, A.L. and Rane, S. and Vetro, A.},
    • title = {Data Hiding in Hard-Copy Text Documents Robust to Print, Scan and Photocopy Operations},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2009,
    • month = apr,
    • url = {http://www.merl.com/publications/TR2009-020}
    • }
  •  Vetro, A.; Draper, S.; Rane, S.; Yedidia, J., "Securing Biometric Data" in Distributed Source Coding, Dragotti, P.L. and Gastpar, M., Eds., ISBN: 978-0-12-374485-2, Elsevier, January 2009.
    BibTeX Download PDFRead TR2009-002
    • @incollection{Vetro2009jan,
    • author = {Vetro, A. and Draper, S. and Rane, S. and Yedidia, J.},
    • title = {Securing Biometric Data},
    • booktitle = {Distributed Source Coding},
    • year = 2009,
    • editor = {Dragotti, P.L. and Gastpar, M.},
    • month = jan,
    • publisher = {Elsevier},
    • isbn = {978-0-12-374485-2},
    • url = {http://www.merl.com/publications/TR2009-002}
    • }
  •  Sutcu, Y.; Rane, S.; Yedidia, J.S.; Draper, S.C.; Vetro, A., "Feature Extraction for a Slepian-Wolf Biometric System Using LDPC Codes", IEEE International Symposium on Information Theory (ISIT), July 2008.
    BibTeX Download PDFRead TR2008-036
    • @inproceedings{Sutcu2008jul,
    • author = {Sutcu, Y. and Rane, S. and Yedidia, J.S. and Draper, S.C. and Vetro, A.},
    • title = {Feature Extraction for a Slepian-Wolf Biometric System Using LDPC Codes},
    • booktitle = {IEEE International Symposium on Information Theory (ISIT)},
    • year = 2008,
    • month = jul,
    • url = {http://www.merl.com/publications/TR2008-036}
    • }
  •  Sutcu, Y.; Rane, S.; Yedidia, J.S.; Draper, S.C.; Vetro, A., "Feature Transformation of Biometric Templates for Secure Biometric Systems based on Error Correcting Codes", IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2008.
    BibTeX Download PDFRead TR2008-029
    • @inproceedings{Sutcu2008jun,
    • author = {Sutcu, Y. and Rane, S. and Yedidia, J.S. and Draper, S.C. and Vetro, A.},
    • title = {Feature Transformation of Biometric Templates for Secure Biometric Systems based on Error Correcting Codes},
    • booktitle = {IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
    • year = 2008,
    • month = jun,
    • url = {http://www.merl.com/publications/TR2008-029}
    • }
  •  Jain, A.K.; Chellappa, R.; Draper, S.C.; Memon, N.; Phillips, P.J.; Vetro, A., "Signal Processing for Biometric Systems (DSP Forum)", IEEE Signal Processing Magazine, ISSN: 1053-5888, Vol. 24, No. 6, pp. 146-152, November 2007.
    BibTeX Download PDFRead TR2007-071
    • @article{Jain2007nov,
    • author = {Jain, A.K. and Chellappa, R. and Draper, S.C. and Memon, N. and Phillips, P.J. and Vetro, A.},
    • title = {Signal Processing for Biometric Systems (DSP Forum)},
    • journal = {IEEE Signal Processing Magazine},
    • year = 2007,
    • volume = 24,
    • number = 6,
    • pages = {146--152},
    • month = nov,
    • issn = {1053-5888},
    • url = {http://www.merl.com/publications/TR2007-071}
    • }
  •  Draper, S.C.; Khisti, A.; Martinian, E.; Vetro, A.; Yedidia, J.S., "Using Distributed Source Coding to Secure Fingerprint Biometrics", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ISSN: 1520-6149, April 2007, vol. 2, pp. 129-132.
    BibTeX Download PDFRead TR2007-005
    • @inproceedings{Draper2007apr,
    • author = {Draper, S.C. and Khisti, A. and Martinian, E. and Vetro, A. and Yedidia, J.S.},
    • title = {Using Distributed Source Coding to Secure Fingerprint Biometrics},
    • booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
    • year = 2007,
    • volume = 2,
    • pages = {129--132},
    • month = apr,
    • issn = {1520-6149},
    • url = {http://www.merl.com/publications/TR2007-005}
    • }
  •  Draper, S.C.; Khisti, A.; Martinian, E.; Vetro, A.; Yedidia, J.S., "Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes", IEEE Information Theory and Applications Workshop (ITA), January 2007.
    BibTeX Download PDFRead TR2007-006
    • @inproceedings{Draper2007jan,
    • author = {Draper, S.C. and Khisti, A. and Martinian, E. and Vetro, A. and Yedidia, J.S.},
    • title = {Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes},
    • booktitle = {IEEE Information Theory and Applications Workshop (ITA)},
    • year = 2007,
    • month = jan,
    • url = {http://www.merl.com/publications/TR2007-006}
    • }
  •  Martinian, E.; Yekhanin, S.; Yedidia, J.S., "Secure Biometrics Via Syndromes", Allerton Conference on Communication, Control, and Computing, September 2005.
    BibTeX Download PDFRead TR2005-112
    • @inproceedings{Martinian2005sep,
    • author = {Martinian, E. and Yekhanin, S. and Yedidia, J.S.},
    • title = {Secure Biometrics Via Syndromes},
    • booktitle = {Allerton Conference on Communication, Control, and Computing},
    • year = 2005,
    • month = sep,
    • url = {http://www.merl.com/publications/TR2005-112}
    • }