default search action
Mehmet Utku Celik
Person information
- affiliation: University of Rochester, New York, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j13]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011)
2000 – 2009
- 2009
- [c26]Mehmet Utku Celik, Jaap Haitsma, Pavlo Barvinko, Gerhard C. Langelaar, Martijn Maas:
Video fingerprinting for live events. Media Forensics and Security 2009: 725403 - [c25]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos fingerprinting codes in the combined digit model. WIFS 2009: 41-45 - [i3]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2009: 244 (2009) - 2008
- [j12]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2): 137-166 (2008) - [j11]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Trans. Inf. Forensics Secur. 3(3): 475-487 (2008) - [j10]Stefan Katzenbeisser, Aweke N. Lemma, Mehmet Utku Celik, Michiel van der Veen, Martijn Maas:
A Buyer-Seller Watermarking Protocol Based on Secure Embedding. IEEE Trans. Inf. Forensics Secur. 3(4): 783-786 (2008) - [j9]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos Fingerprinting is Better Than We Thought. IEEE Trans. Inf. Theory 54(8): 3663-3676 (2008) - [c24]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Serap Kirbiz:
Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681910 - 2007
- [j8]Serap Kirbiz, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Decode-Time Forensic Watermarking of AAC Bitstreams. IEEE Trans. Inf. Forensics Secur. 2(4): 683-696 (2007) - [c23]Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik:
Privacy preserving error resilient dna searching through oblivious automata. CCS 2007: 519-528 - [c22]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables. ICASSP (2) 2007: 153-156 - [c21]Mehmet Utku Celik, Joop Talstra, Aweke N. Lemma, Stefan Katzenbeisser:
Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. ICIP (5) 2007: 489-492 - [c20]Serap Kirbiz, Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser:
Forensic Watermarking During AAC Playback. ICME 2007: 1111-1114 - [c19]Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 - [c18]Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma:
A secure multidimensional point inclusion protocol. MM&Sec 2007: 109-120 - [p1]Michiel van der Veen, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Forensic Watermarking in Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 287-302 - [i2]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. IACR Cryptol. ePrint Arch. 2007: 41 (2007) - 2006
- [j7]Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mark F. Bocko:
A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection. IEEE Trans. Inf. Forensics Secur. 1(4): 479-492 (2006) - [j6]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15(4): 1042-1049 (2006) - [c17]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen:
Secure Watermark Embedding Through Partial Encryption. IWDW 2006: 433-445 - [c16]Aweke N. Lemma, Michiel van der Veen, Mehmet Utku Celik:
New modulation-based watermarking technique for video. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607216 - [i1]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos fingerprinting is better than we thought. CoRR abs/cs/0607131 (2006) - 2005
- [j5]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber:
Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2): 253-266 (2005) - [c15]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Pitch and Duration Modification for Speech Watermarking. ICASSP (2) 2005: 17-20 - [c14]Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mark Sterling, Edward L. Titlebaum, Mark Bocko:
Morphological Steganalysis of Audio Signals and the Principle of Diminishing Marginal Distortions. ICASSP (2) 2005: 21-24 - [c13]Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mark F. Bocko:
Semifragile hierarchical watermarking in a set theoretic framework. ICIP (1) 2005: 1001-1004 - 2004
- [j4]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Process. Lett. 11(10): 831-835 (2004) - [c12]Gaurav Sharma, Wencheng Wu, Edul N. Dalal, Mehmet Utku Celik:
Mathematical Discontinuities in CIEDE2000 Color Difference Computations. CIC 2004: 334-339 - [c11]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Universal image steganalysis using rate-distortion curves. Security, Steganography, and Watermarking of Multimedia Contents 2004: 467-476 - 2003
- [j3]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Gray-level-embedded lossless image compression. Signal Process. Image Commun. 18(6): 443-454 (2003) - [j2]Adnan M. Alattar, Eugene T. Lin, Mehmet Utku Celik:
Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. 13(8): 787-800 (2003) - [c10]Mehmet Utku Celik, A. Murat Tekalp, Gaurav Sharma:
Level-embedded lossless image compression. ICASSP (3) 2003: 245-248 - [c9]Adnan M. Alattar, Eugene T. Lin, Mehmet Utku Celik:
Watermarking low bit-rate Advanced Simple Profile MPEG-4 bitstreams. ICASSP (3) 2003: 513-516 - [c8]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Collusion-resilient fingerprinting using random prewarping. ICIP (1) 2003: 509-512 - [c7]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp:
Level-Successive Encoding for Digital Photography. PICS 2003: 330-334 - [c6]Adnan M. Alattar, Mehmet Utku Celik, Eugene T. Lin:
Evaluation of watermarking low-bit-rate MPEG-4 bit streams. Security and Watermarking of Multimedia Contents 2003: 440-451 - [c5]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber:
Localized lossless authentication watermark (LAW). Security and Watermarking of Multimedia Contents 2003: 689-698 - 2002
- [j1]Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Murat Tekalp:
Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6): 585-595 (2002) - [c4]Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Murat Tekalp:
Reversible data hiding. ICIP (2) 2002: 157-160 - [c3]Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber:
Video authentication with self-recovery. Security and Watermarking of Multimedia Contents 2002: 531-541 - 2001
- [c2]Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Murat Tekalp:
A hierarchical image authentication watermark with improved localization and security. ICIP (2) 2001: 502-505 - [c1]Mehmet Utku Celik, Eli Saber, Gaurav Sharma, A. Murat Tekalp:
Analysis of feature-based geometry-invariant watermarking. Security and Watermarking of Multimedia Contents 2001: 261-268
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint