Education
Ph.D. in Electrical Engineering, Princeton University, Princeton, New Jersey, USA
Current position
Associate Professor, Department of Electrical and Computer Engineering, Binghamton University, Binghamton, New York, USA
Publications (since 2005)
-
Farrokh Baroughi, A., Craver, S. and Mohsin, M. F. (2015). A Negative Number Vulnerability for Histogram-based Face Recognition Systems. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM.
-
Ashendorf, E. and Craver, S. (2015). Design of a steganographic virtual operating system. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Baroughi, A. F. and Craver, S. (2015). The non-trusty clown attack on model-based speaker recognition systems. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Baroughi, A. F. and Craver, S. (2014). Additive attacks on speaker recognition. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Li, E., Craver, S. and Yu, J. (2013). Capacity Limits of Pseudo-Random Channels In Deception Problems.
-
Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J. and Pevný, T. (2013). Moving steganography and steganalysis from the laboratory into the real world. Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM.
-
Yu, J. and Craver, S. (2012). A fast, automatic camera image stabilization benchmarking scheme. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Li, E. and Craver, S. (2011). A square-root law for active wardens. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, ACM.
-
Yu, J., Craver, S. and Li, E. (2011). Toward the identification of DSLR lenses by chromatic aberration. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Stephen, Z., Summerville, D. H., Craver, S. and Elmore, M. (2011). "ACTS-an ABET compliance tracking system for assessing engineering outcomes. In: American society for engineering education. American Society for Engineering Education.
-
Craver, S. and Yu, J. (2010). Subset selection circumvents the square root law. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Yu, J. and Craver, S. (2010). Reverse-engineering a watermark detector based on a more precise model. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Li, E. and Craver, S. (2009). A supraliminal channel in a wireless phone application. Proceedings of the 11th ACM workshop on Multimedia and security, ACM.
-
Atakli, I., Chen, Y., Wu, Q. and Craver, S. (2009). BLINK: pixel-domain encryption for secure document management. Proceedings of the 11th ACM workshop on Multimedia and security, ACM.
-
Craver, S., Li, E. and Yu, J. (2009). Protocols for data hiding in pseudo-random state. IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics.
-
Craver, S., Chen, Y., Chen, H., Yu, J. and Atakli, I. M. (2009). BLINK: securing information to the last connection. Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE, IEEE.
-
Craver, S., Li, E., Yu, J. and Atakli, I. (2008). A supraliminal channel in a videoconferencing application. Information Hiding, Springer.
-
Zahorian, S., Belohlavek, R., Craver, S., McGrann, R. and Yu, L. (2008). Work in progress-bringing SOCRATES into computer-assisted instruction. Frontiers in Education Conference, 2008. FIE 2008. 38th Annual, IEEE.
-
Craver, S., Atakli, I. and Yu, J. (2007). Reverse-engineering a watermark detector using an oracle. EURASIP Journal on Information Security 2007: 5.
-
Craver, S., Atakli, I. and Yu, J. (2007). How we broke the BOWS watermark. Electronic Imaging 2007, International Society for Optics and Photonics.
-
Craver, S. and Yu, J. (2007). Reverse-engineering a detector with false alarms. Electronic Imaging 2007, International Society for Optics and Photonics.
-
Craver, S. (2007). An improved asymmetric watermarking system using matrix embedding. Information Hiding, Springer.
-
Tsai, J. Y., Cranor, L. F. and Craver, S. (2006). Vicarious infringement creates a privacy ceiling. Proceedings of the ACM workshop on Digital rights management, ACM.
-
YU, E. and CRAVER, S. (2006). Fingerprinting with wow. Proceedings of SPIE, the International Society for Optical Engineering, Society of Photo-Optical Instrumentation Engineers.
-
Craver, S., Liu, B. and Wolf, W. (2005). An implementation of, and attacks on, zero-knowledge watermarking. Information Hiding, Springer.