Skip to main content

Showing 1–17 of 17 results for author: Nataraj, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.13006  [pdf, other

    cs.AI cs.LG eess.IV

    CIMGEN: Controlled Image Manipulation by Finetuning Pretrained Generative Models on Limited Data

    Authors: Chandrakanth Gudavalli, Erik Rosten, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Content creation and image editing can benefit from flexible user controls. A common intermediate representation for conditional image generation is a semantic map, that has information of objects present in the image. When compared to raw RGB pixels, the modification of semantic map is much easier. One can take a semantic map and easily modify the map to selectively insert, remove, or replace obj… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  2. arXiv:2211.02696  [pdf, other

    cs.CR cs.CV cs.HC cs.LG eess.IV eess.SP

    MalGrid: Visualization Of Binary Features In Large Malware Corpora

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: The number of malware is constantly on the rise. Though most new malware are modifications of existing ones, their sheer number is quite overwhelming. In this paper, we present a novel system to visualize and map millions of malware to points in a 2-dimensional (2D) spatial grid. This enables visualizing relationships within large malware datasets that can be used to develop triage solutions to sc… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: Submitted version - MILCOM 2022 IEEE Military Communications Conference. The high-quality images in this paper can be found on Github (https://github.com/Mayachitra-Inc/MalGrid)

  3. arXiv:2111.04710  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: With the growing number of malware and cyber attacks, there is a need for "orthogonal" cyber defense approaches, which are complementary to existing methods by detecting unique malware samples that are not predicted by other methods. In this paper, we propose a novel and orthogonal malware detection (OMD) approach to identify malware using a combination of audio descriptors, image similarity descr… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  4. arXiv:2111.04703  [pdf, other

    cs.CR cs.LG eess.SP

    HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Malicious PDF documents present a serious threat to various security organizations that require modern threat intelligence platforms to effectively analyze and characterize the identity and behavior of PDF malware. State-of-the-art approaches use machine learning (ML) to learn features that characterize PDF malware. However, ML models are often susceptible to evasion attacks, in which an adversary… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  5. Seam Carving Detection and Localization using Two-Stage Deep Neural Networks

    Authors: Lakshmanan Nataraj, Chandrakanth Gudavalli, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Seam carving is a method to resize an image in a content aware fashion. However, this method can also be used to carve out objects from images. In this paper, we propose a two-step method to detect and localize seam carved images. First, we build a detector to detect small patches in an image that has been seam carved. Next, we compute a heatmap on an image based on the patch detector's output. Us… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  6. arXiv:2108.12534  [pdf, other

    cs.CV

    SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery

    Authors: Chandrakanth Gudavalli, Erik Rosten, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Seam carving is a popular technique for content aware image retargeting. It can be used to deliberately manipulate images, for example, change the GPS locations of a building or insert/remove roads in a satellite image. This paper proposes a novel approach for detecting and localizing seams in such images. While there are methods to detect seam carving based manipulations, this is the first time t… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  7. arXiv:2104.05693  [pdf, other

    cs.CV

    Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices

    Authors: Lakshmanan Nataraj, Michael Goebel, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Digital image forensics aims to detect images that have been digitally manipulated. Realistic image forgeries involve a combination of splicing, resampling, region removal, smoothing and other manipulation methods. While most detection methods in literature focus on detecting a particular type of manipulation, it is challenging to identify doctored images that involve a host of manipulations. In t… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

  8. arXiv:2103.11002  [pdf, other

    cs.CR cs.CV

    Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

    Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Machine Learning (ML) algorithms are susceptible to adversarial attacks and deception both during training and deployment. Automatic reverse engineering of the toolchains behind these adversarial machine learning attacks will aid in recovering the tools and processes used in these attacks. In this paper, we present two techniques that support automated identification and attribution of adversarial… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

  9. arXiv:2101.10578  [pdf, other

    cs.CR cs.CV cs.LG

    Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: We propose a novel method to detect and visualize malware through image classification. The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform (DCT) domain and a neural network is trained for malware detection. A shallow neural network is trained for classification, and its accuracy is compared with deep-networ… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Submitted version - Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS) 2021

  10. arXiv:2007.10466  [pdf, other

    eess.IV cs.CV

    Detection, Attribution and Localization of GAN Generated Images

    Authors: Michael Goebel, Lakshmanan Nataraj, Tejaswi Nanjundaswamy, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Recent advances in Generative Adversarial Networks (GANs) have led to the creation of realistic-looking digital images that pose a major challenge to their detection by humans or computers. GANs are used in a wide range of tasks, from modifying small attributes of an image (StarGAN [14]), transferring attributes between image pairs (CycleGAN [91]), as well as generating entirely new images (ProGAN… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  11. arXiv:1903.06836  [pdf, other

    cs.CV eess.IV

    Detecting GAN generated Fake Images using Co-occurrence Matrices

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, Amit K. Roy-Chowdhury, B. S. Manjunath

    Abstract: The advent of Generative Adversarial Networks (GANs) has brought about completely novel ways of transforming and manipulating pixels in digital images. GAN based techniques such as Image-to-Image translations, DeepFakes, and other automated methods have become increasingly popular in creating fake images. In this paper, we propose a novel approach to detect GAN generated fake images using a combin… ▽ More

    Submitted 2 October, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

  12. Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

    Authors: Jawadul H. Bappy, Cody Simons, Lakshmanan Nataraj, B. S. Manjunath, Amit K. Roy-Chowdhury

    Abstract: With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy-clone, object splicing, and removal, which mislead the viewers. In contrast, the identification of these manipulations becomes a very challenging task as manipulated regions are not visually apparent. This paper proposes a high-confidence manipulati… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

  13. arXiv:1902.04038  [pdf, other

    cs.CV

    Deep Learning Methods for Event Verification and Image Repurposing Detection

    Authors: M. Goebel, A. Flenner, L. Nataraj, B. S. Manjunath

    Abstract: The authenticity of images posted on social media is an issue of growing concern. Many algorithms have been developed to detect manipulated images, but few have investigated the ability of deep neural network based approaches to verify the authenticity of image labels, such as event names. In this paper, we propose several novel methods to predict if an image was captured at one of several notewor… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

  14. arXiv:1803.01711  [pdf, other

    cs.CV

    Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis

    Authors: Arjuna Flenner, Lawrence Peterson, Jason Bunk, Tajuddin Manhar Mohammed, Lakshmanan Nataraj, B. S. Manjunath

    Abstract: The amount of digital imagery recorded has recently grown exponentially, and with the advancement of software, such as Photoshop or Gimp, it has become easier to manipulate images. However, most images on the internet have not been manipulated and any automated manipulation detection algorithm must carefully control the false alarm rate. In this paper we discuss a method to automatically detect lo… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1802.03154

  15. arXiv:1802.03154  [pdf, other

    cs.CV

    Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

    Authors: Tajuddin Manhar Mohammed, Jason Bunk, Lakshmanan Nataraj, Jawadul H. Bappy, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson

    Abstract: Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in detecting cloning and region removal. In this paper, we combine these complementary approaches in a way that boosts the overall accuracy of image manipula… ▽ More

    Submitted 19 February, 2018; v1 submitted 9 February, 2018; originally announced February 2018.

  16. arXiv:1707.00433  [pdf, other

    cs.CV

    Detection and Localization of Image Forgeries using Resampling Features and Deep Learning

    Authors: Jason Bunk, Jawadul H. Bappy, Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Arjuna Flenner, B. S. Manjunath, Shivkumar Chandrasekaran, Amit K. Roy-Chowdhury, Lawrence Peterson

    Abstract: Resampling is an important signature of manipulated images. In this paper, we propose two methods to detect and localize image manipulations based on a combination of resampling features and deep learning. In the first method, the Radon transform of resampling features are computed on overlap** image patches. Deep learning classifiers and a Gaussian conditional random field model are then used t… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.

  17. arXiv:1605.05280  [pdf, other

    cs.CR

    SPAM: Signal Processing to Analyze Malware

    Authors: Lakshmanan Nataraj, B. S. Manjunath

    Abstract: In this article, we explored orthogonal methods to analyze malware motivated by signal and image processing. Malware samples are represented as images or signals. Image and signal-based features are extracted to characterize malware. Our extensive experiments demonstrate the efficacy of our methods on malware classification and retrieval. We believe that our techniques will open the scope of signa… ▽ More

    Submitted 17 May, 2016; originally announced May 2016.

    Comments: submitted version