Welcome guest, Sign in

Home


Scott A. Craver

Education

Ph.D. in Electrical Engineering, Princeton University, Princeton, New Jersey, USA

Current position

Associate Professor, Department of Electrical and Computer Engineering, Binghamton University, Binghamton, New York, USA

Publications (since 2005)

  1. Farrokh Baroughi, A., Craver, S. and Mohsin, M. F. (2015). A Negative Number Vulnerability for Histogram-based Face Recognition Systems. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM.
  2. Ashendorf, E. and Craver, S. (2015). Design of a steganographic virtual operating system. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  3. Baroughi, A. F. and Craver, S. (2015). The non-trusty clown attack on model-based speaker recognition systems. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  4. Baroughi, A. F. and Craver, S. (2014). Additive attacks on speaker recognition. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  5. Li, E., Craver, S. and Yu, J. (2013). Capacity Limits of Pseudo-Random Channels In Deception Problems.
  6. Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J. and Pevný, T. (2013). Moving steganography and steganalysis from the laboratory into the real world. Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM.
  7. Yu, J. and Craver, S. (2012). A fast, automatic camera image stabilization benchmarking scheme. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  8. Li, E. and Craver, S. (2011). A square-root law for active wardens. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, ACM.
  9. Yu, J., Craver, S. and Li, E. (2011). Toward the identification of DSLR lenses by chromatic aberration. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  10. Stephen, Z., Summerville, D. H., Craver, S. and Elmore, M. (2011). "ACTS-an ABET compliance tracking system for assessing engineering outcomes. In: American society for engineering education. American Society for Engineering Education.
  11. Craver, S. and Yu, J. (2010). Subset selection circumvents the square root law. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  12. Yu, J. and Craver, S. (2010). Reverse-engineering a watermark detector based on a more precise model. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  13. Li, E. and Craver, S. (2009). A supraliminal channel in a wireless phone application. Proceedings of the 11th ACM workshop on Multimedia and security, ACM.
  14. Atakli, I., Chen, Y., Wu, Q. and Craver, S. (2009). BLINK: pixel-domain encryption for secure document management. Proceedings of the 11th ACM workshop on Multimedia and security, ACM.
  15. Craver, S., Li, E. and Yu, J. (2009). Protocols for data hiding in pseudo-random state. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
  16. Craver, S., Chen, Y., Chen, H., Yu, J. and Atakli, I. M. (2009). BLINK: securing information to the last connection. Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE, IEEE.
  17. Craver, S., Li, E., Yu, J. and Atakli, I. (2008). A supraliminal channel in a videoconferencing application. Information Hiding, Springer.
  18. Zahorian, S., Belohlavek, R., Craver, S., McGrann, R. and Yu, L. (2008). Work in progress-bringing SOCRATES into computer-assisted instruction. Frontiers in Education Conference, 2008. FIE 2008. 38th Annual, IEEE.
  19. Craver, S., Atakli, I. and Yu, J. (2007). Reverse-engineering a watermark detector using an oracle. EURASIP Journal on Information Security 2007: 5.
  20. Craver, S., Atakli, I. and Yu, J. (2007). How we broke the BOWS watermark. Electronic Imaging 2007, International Society for Optics and Photonics.
  21. Craver, S. and Yu, J. (2007). Reverse-engineering a detector with false alarms. Electronic Imaging 2007, International Society for Optics and Photonics.
  22. Craver, S. (2007). An improved asymmetric watermarking system using matrix embedding. Information Hiding, Springer.
  23. Tsai, J. Y., Cranor, L. F. and Craver, S. (2006). Vicarious infringement creates a privacy ceiling. Proceedings of the ACM workshop on Digital rights management, ACM.
  24. YU, E. and CRAVER, S. (2006). Fingerprinting with wow. Proceedings of SPIE, the International Society for Optical Engineering, Society of Photo-Optical Instrumentation Engineers.
  25. Craver, S., Liu, B. and Wolf, W. (2005). An implementation of, and attacks on, zero-knowledge watermarking. Information Hiding, Springer.
Protocols by Scott A. Craver
  1. Quantification of Respiratory Activity in Biofilms