default search action
Nitin Khanna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Sharad Joshi, Suraj Saxena, Nitin Khanna:
Source printer identification from document images acquired using smartphone. J. Inf. Secur. Appl. 84: 103804 (2024) - [j20]Vinay Verma, Deepak Singh, Nitin Khanna:
Block-level double JPEG compression detection for image forgery localization. Multim. Tools Appl. 83(4): 9949-9971 (2024) - [c41]Minal Bisen, Kapil Jainwal, Nitin Khanna:
Design and Implementation of SPAD-Based Linearly Stable Multi-Mode Configurable TAC Pixel. VLSID 2024: 135-139 - 2023
- [i10]Atal Tewari, K. Prateek, Amrita Singh, Nitin Khanna:
Deep Learning based Systems for Crater Detection: A Review. CoRR abs/2310.07727 (2023) - 2022
- [j19]Sharad Joshi, Yogesh Kumar Gupta, Nitin Khanna:
Source printer identification using printer specific pooling of letter descriptors. Expert Syst. Appl. 192: 116344 (2022) - [j18]Nitin Khanna, Sandeep Singh, Anshu Bhasin, Kamal Malik:
Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs. Int. J. Inf. Retr. Res. 12(3): 1-15 (2022) - [i9]Atal Tewari, Vikrant Jain, Nitin Khanna:
Automatic Crater Shape Retrieval using Unsupervised and Semi-Supervised Systems. CoRR abs/2211.01933 (2022) - 2021
- [j17]Nitin Khanna, Sandeep Singh, Anshu Bhasin, Kamal Malik:
NMTBR: Normalized Multilevel Trust Based Routing for Security Against Packet Drop Attacks in MANETs. Ad Hoc Sens. Wirel. Networks 50(1-4): 277-303 (2021) - [j16]Vinay Verma, Nitin Khanna:
Speaker-independent source cell-phone identification for re-compressed and noisy audio recordings. Multim. Tools Appl. 80(15): 23581-23603 (2021) - [i8]Vinay Verma, Deepak Singh, Nitin Khanna:
Q-matrix Unaware Double JPEG Detection using DCT-Domain Deep BiLSTM Network. CoRR abs/2104.04765 (2021) - 2020
- [j15]Nitin Khanna, Monika Sachdeva:
BEST: Battery, Efficiency and Stability Based Trust Mechanism Using Enhanced AODV for Mitigation of Blackhole Attack and Its Variants in MANETs. Ad Hoc Sens. Wirel. Networks 46(3-4): 215-264 (2020) - [j14]Nitin Khanna, Monika Sachdeva:
OFFM-ANFIS analysis for flood prediction using mobile IoS, fog and cloud computing. Clust. Comput. 23(4): 2659-2676 (2020) - [j13]Hardik Jain, Sharad Joshi, Gaurav Gupta, Nitin Khanna:
Passive classification of source printer using text-line-level geometric distortion signatures from scanned images of printed documents. Multim. Tools Appl. 79(11-12): 7377-7400 (2020) - [j12]Sharad Joshi, Nitin Khanna:
Source Printer Classification Using Printer Specific Local Texture Descriptor. IEEE Trans. Inf. Forensics Secur. 15: 160-171 (2020) - [c40]Abhinav Narayan Harish, Vinay Verma, Nitin Khanna:
Double JPEG Compression Detection for Distinguishable Blocks in Images Compressed with Same Quantization Matrix. MLSP 2020: 1-6 - [c39]Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. WIFS 2020: 1-6 - [i7]Sharad Joshi, Suraj Saxena, Nitin Khanna:
Source Printer Identification from Document Images Acquired using Smartphone. CoRR abs/2003.12602 (2020) - [i6]Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. CoRR abs/2004.01929 (2020)
2010 – 2019
- 2019
- [j11]Nitin Khanna, Monika Sachdeva:
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs. Comput. Sci. Rev. 32: 24-44 (2019) - [j10]Nitin Khanna, Monika Sachdeva:
Study of trust-based mechanism and its component model in MANET: Current research state, issues, and future recommendation. Int. J. Commun. Syst. 32(12) (2019) - [j9]Sharad Joshi, Suraj Saxena, Nitin Khanna:
First steps toward CNN based source classification of document images shared over messaging app. Signal Process. Image Commun. 78: 32-41 (2019) - [c38]Vinay Verma, Nitin Khanna:
CNN-based System for Speaker Independent Cell-Phone Identification from Recorded Audio. CVPR Workshops 2019: 53-61 - 2018
- [j8]Vinay Verma, Nikita Agarwal, Nitin Khanna:
DCT-domain deep convolutional neural networks for multiple JPEG compression classification. Signal Process. Image Commun. 67: 22-33 (2018) - [j7]Sharad Joshi, Nitin Khanna:
Single Classifier-Based Passive System for Source Printer Classification Using Local Texture Features. IEEE Trans. Inf. Forensics Secur. 13(7): 1603-1614 (2018) - [j6]Anoop Kant Godiyal, Hemant Kumar Verma, Nitin Khanna, Deepak Joshi:
A Force Myography-Based System for Gait Event Detection in Overground and Ramp Walking. IEEE Trans. Instrum. Meas. 67(10): 2314-2323 (2018) - [c37]Sharad Joshi, Mohit Lomba, Vivek Goyal, Nitin Khanna:
Augmented Data and Improved Noise Residual-Based CNN for Printer Source Identification. ICASSP 2018: 2002-2006 - [i5]Sharad Joshi, Nitin Khanna:
Source Printer Classification using Printer Specific Local Texture Descriptor. CoRR abs/1806.06650 (2018) - [i4]Sharad Joshi, Suraj Saxena, Nitin Khanna:
First Steps Toward CNN based Source Classification of Document Images Shared Over Messaging App. CoRR abs/1808.05941 (2018) - 2017
- [c36]Nitin Khanna, Heather A. Eicher-Miller, Hemant K. Verma, Carol J. Boushey, Saul B. Gelfand, Edward J. Delp:
Modified dynamic time warping (MDTW) for estimating temporal dietary patterns. GlobalSIP 2017: 948-952 - [c35]Hardik Jain, Joydeep Das, Hemant Kumar Verma, Nitin Khanna:
An enhanced statistical approach for median filtering detection using difference image. ISBA 2017: 1-7 - [c34]Hemant Kumar Verma, Arunav Saikia, Nitin Khanna:
A hybrid model for CFA interpolation detection. ISBA 2017: 1-8 - [c33]Sharad Joshi, Gaurav Gupta, Nitin Khanna:
Source Classification Using Document Images from Smartphones and Flatbed Scanners. NCVPRIPG 2017: 281-292 - [i3]Hardik Jain, Gaurav Gupta, Sharad Joshi, Nitin Khanna:
Passive Classification of Source Printer using Text-line-level Geometric Distortion Signatures from Scanned Images of Printed Documents. CoRR abs/1706.06651 (2017) - [i2]Sharad Joshi, Nitin Khanna:
Single Classifier-based Passive System for Source Printer Classification using Local Texture Features. CoRR abs/1706.07422 (2017) - [i1]Vinay Verma, Nikita Agarwal, Nitin Khanna:
DCT-domain Deep Convolutional Neural Networks for Multiple JPEG Compression Classification. CoRR abs/1712.02313 (2017) - 2016
- [c32]Ziad Ahmad, Marc Bosch, Nitin Khanna, Deborah A. Kerr, Carol J. Boushey, Fengqing Zhu, Edward J. Delp:
A Mobile Food Record For Integrated Dietary Assessment. MADiMa @ ACM Multimedia 2016: 53-62 - 2015
- [j5]Fengqing Zhu, Marc Bosch, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Multiple Hypotheses Image Segmentation and Classification With Application to Dietary Assessment. IEEE J. Biomed. Health Informatics 19(1): 377-388 (2015) - 2014
- [c31]Ziad Ahmad, Nitin Khanna, Deborah A. Kerr, Carol J. Boushey, Edward J. Delp:
A mobile phone user interface for image-based dietary assessment. MOBMU 2014: 903007 - [c30]Ye He, Chang Xu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Analysis of food images: Features and classification. ICIP 2014: 2744-2748 - 2013
- [c29]Chang Xu, Ye He, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Model-based food volume estimation using 3D pose. ICIP 2013: 2534-2538 - [c28]Ye He, Chang Xu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Context based food image analysis. ICIP 2013: 2748-2752 - [c27]Ye He, Chang Xu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Food image analysis: Segmentation, identification and weight estimation. ICME 2013: 1-6 - [c26]Chang Xu, Ye He, Nitin Khanna, Albert Parra, Carol J. Boushey, Edward J. Delp:
Image-based food volume estimation. CEA@ACM Multimedia 2013: 75-80 - 2012
- [c25]Chang Xu, Fengqing Zhu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Image enhancement and quality measures for dietary assessment using mobile devices. Computational Imaging 2012: 82960Q - [c24]Y. He, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Specular Highlight Removal for Image-Based Dietary Assessment. ICME Workshops 2012: 424-428 - [c23]Y. He, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Snakes assisted food image segmentation. MMSP 2012: 181-185 - 2011
- [c22]Nitin Khanna, Golnaz Abdollahian, Ben Brame, Mireille Boutin, Edward J. Delp:
Arabic word recognizer for mobile applications. Computational Imaging 2011: 78730J - [c21]Fengqing Zhu, Marc Bosch, TusaRebecca Schap, Nitin Khanna, David S. Ebert, Carol J. Boushey, Edward J. Delp:
Segmentation assisted food classification for dietary assessment. Computational Imaging 2011: 78730B - [c20]Marc Bosch, Fengqing Zhu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Food texture descriptors based on fractal and local gradient information. EUSIPCO 2011: 764-768 - [c19]Marc Bosch, Fengqing Zhu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Combining global and local features for food identification in dietary assessment. ICIP 2011: 1789-1792 - [c18]Marc Bosch, TusaRebecca Schap, Fengqing Zhu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Integrated database system for mobile dietary assessment and analysis. ICME 2011: 1-6 - [c17]Fengqing Zhu, Marc Bosch, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Multilevel segmentation for food classification in dietary assessment. ISPA 2011: 337-342 - [c16]Chang Xu, Nitin Khanna, Carol J. Boushey, Edward J. Delp:
Low Complexity Image Quality Measures for Dietary Assessment Using Mobile Devices. ISM 2011: 351-356 - [c15]Nitin Khanna, Heather A. Eicher-Miller, Carol J. Boushey, Saul B. Gelfand, Edward J. Delp:
Temporal Dietary Patterns Using Kernel k-Means Clustering. ISM 2011: 375-380 - [c14]Nitin Khanna, Aditya K. Jagannatham:
Rate partitioning for optimal quantization parameter selection in H.264 (SVC) based 4G broadcast/multicast wireless video communication. ATNAC 2011: 1-7 - [c13]Aravind K. Mikkilineni, Nitin Khanna, Edward J. Delp:
Forensic printer detection using intrinsic signatures. Media Forensics and Security 2011: 78800R - 2010
- [c12]Nitin Khanna, Edward J. Delp:
Intrinsic signatures for scanned documents forensics : Effect of font shape and size. ISCAS 2010: 3060-3063 - [c11]Nitin Khanna, Carol J. Boushey, Deborah A. Kerr, Martin Okos, David S. Ebert, Edward J. Delp:
An Overview of the Technology Assisted Dietary Assessment Project at Purdue University. ISM 2010: 290-295 - [c10]Aravind K. Mikkilineni, Nitin Khanna, Edward J. Delp:
Texture based attacks on intrinsic signature based printer identification. Media Forensics and Security 2010: 75410T - [p1]Pei-Ju Chiang, Nitin Khanna, Aravind K. Mikkilineni, Maria V. Ortiz Segovia, Jan P. Allebach, George T.-C. Chiu, Edward J. Delp:
Printer and Scanner Forensics: Models and Methods. Intelligent Multimedia Analysis for Security Applications 2010: 145-187
2000 – 2009
- 2009
- [j4]Pei-Ju Chiang, Nitin Khanna, Aravind K. Mikkilineni, Maria V. Ortiz Segovia, Sungjoo Suh, Jan P. Allebach, George T.-C. Chiu, Edward J. Delp:
Printer and scanner forensics. IEEE Signal Process. Mag. 26(2): 72-83 (2009) - [j3]Nitin Khanna, Aravind K. Mikkilineni, Edward J. Delp:
Scanner identification using feature-based processing and analysis. IEEE Trans. Inf. Forensics Secur. 4(1): 123-139 (2009) - [c9]Nitin Khanna, Antoni Roca, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Improvements on image authentication and recovery using distributed source coding. Media Forensics and Security 2009: 725415 - [c8]Nitin Khanna, Edward J. Delp:
Source scanner identification for scanned documents. WIFS 2009: 166-170 - 2008
- [c7]Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Forensic techniques for classifying scanner, computer generated and digital camera images. ICASSP 2008: 1653-1656 - [c6]Nitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Survey of Scanner and Printer Forensics at Purdue University. IWCF 2008: 22-34 - [c5]Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Scanner identification with extension to forgery detection. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190G - 2007
- [j2]Sunil Kumar, Rajat Gupta, Nitin Khanna, Santanu Chaudhury, Shiv Dutt Joshi:
Text Extraction and Document Image Segmentation Using Matched Wavelets and MRF Model. IEEE Trans. Image Process. 16(8): 2117-2128 (2007) - [c4]Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Ortiz, Sungjoo Suh, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie. ICME 2007: 20-23 - [c3]Nitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Forensic classification of imaging sensor types. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050U - [c2]Nitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
Scanner identification using sensor pattern noise. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051K - 2006
- [j1]Nitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
A survey of forensic characterization methods for physical devices. Digit. Investig. 3(Supplement): 17-28 (2006) - 2005
- [c1]Sunil Kumar, Nitin Khanna, Santanu Chaudhury, Shiv Dutt Joshi:
Locating Text in Images using Matched Wavelets. ICDAR 2005: 595-599
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint