Skip to main content

Showing 1–11 of 11 results for author: Mohammed, T M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.02696  [pdf, other

    cs.CR cs.CV cs.HC cs.LG eess.IV eess.SP

    MalGrid: Visualization Of Binary Features In Large Malware Corpora

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: The number of malware is constantly on the rise. Though most new malware are modifications of existing ones, their sheer number is quite overwhelming. In this paper, we present a novel system to visualize and map millions of malware to points in a 2-dimensional (2D) spatial grid. This enables visualizing relationships within large malware datasets that can be used to develop triage solutions to sc… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: Submitted version - MILCOM 2022 IEEE Military Communications Conference. The high-quality images in this paper can be found on Github (https://github.com/Mayachitra-Inc/MalGrid)

  2. arXiv:2111.04710  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: With the growing number of malware and cyber attacks, there is a need for "orthogonal" cyber defense approaches, which are complementary to existing methods by detecting unique malware samples that are not predicted by other methods. In this paper, we propose a novel and orthogonal malware detection (OMD) approach to identify malware using a combination of audio descriptors, image similarity descr… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  3. arXiv:2111.04703  [pdf, other

    cs.CR cs.LG eess.SP

    HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Malicious PDF documents present a serious threat to various security organizations that require modern threat intelligence platforms to effectively analyze and characterize the identity and behavior of PDF malware. State-of-the-art approaches use machine learning (ML) to learn features that characterize PDF malware. However, ML models are often susceptible to evasion attacks, in which an adversary… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  4. Seam Carving Detection and Localization using Two-Stage Deep Neural Networks

    Authors: Lakshmanan Nataraj, Chandrakanth Gudavalli, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Seam carving is a method to resize an image in a content aware fashion. However, this method can also be used to carve out objects from images. In this paper, we propose a two-step method to detect and localize seam carved images. First, we build a detector to detect small patches in an image that has been seam carved. Next, we compute a heatmap on an image based on the patch detector's output. Us… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  5. arXiv:2104.05693  [pdf, other

    cs.CV

    Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices

    Authors: Lakshmanan Nataraj, Michael Goebel, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Digital image forensics aims to detect images that have been digitally manipulated. Realistic image forgeries involve a combination of splicing, resampling, region removal, smoothing and other manipulation methods. While most detection methods in literature focus on detecting a particular type of manipulation, it is challenging to identify doctored images that involve a host of manipulations. In t… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

  6. arXiv:2101.10578  [pdf, other

    cs.CR cs.CV cs.LG

    Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: We propose a novel method to detect and visualize malware through image classification. The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform (DCT) domain and a neural network is trained for malware detection. A shallow neural network is trained for classification, and its accuracy is compared with deep-networ… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Submitted version - Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS) 2021

  7. arXiv:2007.10466  [pdf, other

    eess.IV cs.CV

    Detection, Attribution and Localization of GAN Generated Images

    Authors: Michael Goebel, Lakshmanan Nataraj, Tejaswi Nanjundaswamy, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Recent advances in Generative Adversarial Networks (GANs) have led to the creation of realistic-looking digital images that pose a major challenge to their detection by humans or computers. GANs are used in a wide range of tasks, from modifying small attributes of an image (StarGAN [14]), transferring attributes between image pairs (CycleGAN [91]), as well as generating entirely new images (ProGAN… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  8. arXiv:1903.06836  [pdf, other

    cs.CV eess.IV

    Detecting GAN generated Fake Images using Co-occurrence Matrices

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, Amit K. Roy-Chowdhury, B. S. Manjunath

    Abstract: The advent of Generative Adversarial Networks (GANs) has brought about completely novel ways of transforming and manipulating pixels in digital images. GAN based techniques such as Image-to-Image translations, DeepFakes, and other automated methods have become increasingly popular in creating fake images. In this paper, we propose a novel approach to detect GAN generated fake images using a combin… ▽ More

    Submitted 2 October, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

  9. arXiv:1803.01711  [pdf, other

    cs.CV

    Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis

    Authors: Arjuna Flenner, Lawrence Peterson, Jason Bunk, Tajuddin Manhar Mohammed, Lakshmanan Nataraj, B. S. Manjunath

    Abstract: The amount of digital imagery recorded has recently grown exponentially, and with the advancement of software, such as Photoshop or Gimp, it has become easier to manipulate images. However, most images on the internet have not been manipulated and any automated manipulation detection algorithm must carefully control the false alarm rate. In this paper we discuss a method to automatically detect lo… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1802.03154

  10. arXiv:1802.03154  [pdf, other

    cs.CV

    Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

    Authors: Tajuddin Manhar Mohammed, Jason Bunk, Lakshmanan Nataraj, Jawadul H. Bappy, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson

    Abstract: Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in detecting cloning and region removal. In this paper, we combine these complementary approaches in a way that boosts the overall accuracy of image manipula… ▽ More

    Submitted 19 February, 2018; v1 submitted 9 February, 2018; originally announced February 2018.

  11. arXiv:1707.00433  [pdf, other

    cs.CV

    Detection and Localization of Image Forgeries using Resampling Features and Deep Learning

    Authors: Jason Bunk, Jawadul H. Bappy, Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson

    Abstract: Resampling is an important signature of manipulated images. In this paper, we propose two methods to detect and localize image manipulations based on a combination of resampling features and deep learning. In the first method, the Radon transform of resampling features are computed on overlap** image patches. Deep learning classifiers and a Gaussian conditional random field model are then used t… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.