Publications
Dilpazir, H., Mahmood, H., Zia, M., and Malik, H., “Face Recognition: A Multivariate Mutual Information Based Approach,” in Proc. of 2nd IEEE Int. Conf. on Cybernetics (CYBCONF 2015), 2015, June 24 – 26, Gdynia, Poland.
Kurniawan, F., Khalil, M.S., Khan, M.K., and Malik, H., “Dual-Microphone Forensics of Identical Model Based on Signal Analysis,” in Proc. of 5th Int. Conf. on Information Systems and Technologies (ICIST 2015), 2015, March 21 – 23, Istanbul, Turkey.
Kurniawan, F., Khalil, M.S., and Malik, H., “Robust Tampered Detection Method For Digital Audio using Gabor Filterbank,” in Proc. of Int. Conf. on Image Processing, Production and Computer Science (ICIPCS 2015), 2015, June 3-4, Istanbul, Turkey.
Ge, H., and Malik, H., “Exposing Image Forgery with Wedge-Shaped Constraint”, Proc. of Asia-Pacific Computer Science and Application Conference (CSAC 2014), 2014, December 27 – 28, Shanghai, China.
Ge, H., and Malik, H., “Exposing Image Forgery Using Inconsistent Reflection Vanishing Point,” IEEE/IET Int. Conference on Audio, Language, and Image Processing (ICALIP), 2014, July. 7 - 9, Shanghai, China.
Bhutta, M.U., Mehmood, H., and Malik, H., “An Intelligent Approach for Robust Detection and Recognition of Multiple Color and Font Styles Automobiles License Plates - A Feature-Based Algorithm,” IEEE/IET Int. Conference on Audio, Language, and Image Processing (ICALIP), 2014, July. 7 - 9, Shanghai, China.
Mahmud, F., Minhas, Q.-A., Mahmood, H., and Malik, H., “Connectivity Driven Virtual Path Routing Protocol for Cognitive Radio Ad Hoc Networks,” IET International Conference of Wireless Networks, 2014, July 2 – 4, London, U.K.
Liu, C., and Malik, H., “A New Investment Strategy Based on Data Mining and Neural Networks,” IEEE Int. Joint Conference on Neural Networks 2014 (IJCNN'14), 2014, July 6 - 11, Beijing, China.
Zhao, H., Chen, Y., Wang, R., and Malik, H., “Audio Source Authentication and Splicing detection using Acoustic Environmental Signature,” ACM Workshop on Information Hiding and Multimedia Security 2014 (IH&MMSec’14), 2014, June 11- 13, Salzburg, Austria.
Gjomemo, R., Malik, H., Sumb, N., Ansari, R., and Venkatakrishnan, V.N., “Digital Check Forgery Attacks on Client Check Truncation Systems”, Int. Conf. on Financial Cryptography and Data Security, 2014, March 3 – 7, Barbados. [Acceptance rate 18.5%]
Rodrick, D., and Malik, H., “Can electroencephalogram (EEG) signals predict postural balance performance?,” in Proc. 57th Annual Meeting of the Human Factors and Ergonomics Society, 2013, Sep. 30-Oct. 4, San Diego, CA.
Ahmad, R., Raza, S.P., and Malik, H., “Visual Speech Detection using an Unsupervised Learning Framework,” Proc. of 12th Int. Conference on Machine Learning and Applications (ICMLA’13), 2013, December, Miami, FL. [Oral presentation Acceptance rate 28.0%]
Ahmed, A. and Malik, H. “Security of Biometrics using Multimodal Approach”, Int. Symposium on Biometrics and Security Technologies (ISBAST’13), 2013, July, Chengdu, Sichuan China.
Ahmad, R., Raza, S.P., and Malik, H., “Unsupervised Multimodal VAD using Sequential Hierarchy,” IEEE Symposium Series on Computational Intelligence 2013 (ISSCI’13), 2013, April, Singapore.
Minhas, Q.A., Mehmood, H., and Malik, H., “Incentive Driven Cooperation to Avoid Packet Loss in Multihop Ad hoc Networks,” in Proc. 8th Int. Conf. on Emerging Technologies (ICET'12), 2012, October, Islamabad, Pakistan.
Zhao, H. and Malik, H. “Audio Forensics Using Acoustic Environment Traces,” in Proc. IEEE Statistical Signal Processing Workshop (SSP’12), 2012 August, Ann Arbor, MI.
Malik, H. and Miller, J., “Microphone Identification using Higher-Order Statistics,” in Proc. of 46th AES Conference on Audio Forensics, 2012, June 14 – 16, Denver, CO.
Malik, H., “Securing Speaker Verification System Against Replay Attack,” in Proc. of 46th AES Conference on Audio Forensics, 2012, June 14 – 16, Denver, CO.
Zhao, H., Wang, H., and Malik, H., “Steganalysis of YouTube Compressed Video Using Higher-Order Statistics in 3D DCT Domain,” in Proc. 8th Int. Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2012), 2012, July 18-20, Piraeus-Athens, Greece.
Malik, H. and Zhao, H., “Recording Environment Identification using Acoustic Reverberation,” in Proc Int. Conference on Acoustic, Speech and Signal Processing (ICASSP'12), 2012, March – April, Kyoto, Japan.
Malik, H., “Securing Speaker Verification System Against Replay Attack,” 3rd IEEE Intl. Workshop on Information Forensics and Security (WIFS'11), 2011, November, Iguaçu Falls, Brazil.
Chaudhary, U. and Malik, H., “Recording Environment Classification using Acoustic Signature”, Audio Engineering Society 129th Convention 2010, (AES 10), 2010, October, San Francisco, CA.
Malik, H., “Statistical Modeling of Footprints of QIM Steganography,” IEEE Int. Conf. on Multimedia and Expo 2010 (ICME 2010), 2010, July, Singapore.
Ikram, S., and Malik, H., “Digital Audio Forensics using Background Noise,” IEEE Int. Conf. on Multimedia and Expo 2010 (ICME 2010), 2010, July, Singapore.
Malik, H., and Farid, H., “Audio Forensics from Acoustic Reverberation”, IEEE Int. Conference on Acoustics, Speech, and Signal Processing 2010, (ICASSP 2010), 2010, March, Dallas, TX.
Seok, J., and Malik, H., “Audio Watermark Detection Using UICA”, 8th Int. Conf. on Independent Component Analysis and Signal Analysis (ICA’09), 2009, March, Paraty, Brazil.
Malik, H., “Steganalysis of QIM Steganography Using Irregularity Measure”, Proc. of 10th Workshop on Multimedia & Security (MM & Sec 2008), 2008, September, Oxford, UK.
Malik, H., “Commentary Paper on A Probabilistic Bayesian Framework for Model-Based Object Tracking Using Undecimated Wavelet Packet Descriptors” IEEE Int. Conf. On Advanced Video and Signal Based Surveillance (AVSS), 2008, September, Santa Fe, NM.
Malik, H., “Commentary Paper on Visual Players Detection and Tracking in Soccer Matches” IEEE Int. Conf. On Advanced Video and Signal Based Surveillance (AVSS), 2008, September, Santa Fe, NM.
Malik, H., Subbalakshmi, K. P., and Chandramouli, R., “Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy”, Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, vol. 6819, 2008, January, San Jose, CA.
Malik, H., Subbalakshmi, K. P., and Chandramouli, R., “Nonparametric Steganalysis of QIM-Based Data Hiding Using Kernel Density Estimation”, Proc. of 9th Workshop on Multimedia & Security (MM&Sec 2007), 2007, September, Dallas, TX.
Malik, H., Khokhar, A., Ansari, R., and Salvemini, M., “Blind Detection for Additive Embedding using Underdetermined ICA”, IEEE Int. Symposium on Multimedia, 2006, December, San Diego, CA.
Malik, H., Baqai, F., Khokhar, A., and Ansari, R., “Secure Data-Hiding in Multimedia using Non-negative Matrix Factorization”, Int. Workshop on Multimedia Content Representation, Classification and Security (MRCS), 2006, September, Istanbul, Turkey.
Malik, H., Khokhar, A., and Ansari, R., “A New Detector for Spread Spectrum based Image Watermarking using Underdetermined ICA”, Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content VIII, vol. 6072, 2006, January, San Jose, CA.
Malik, H., Khokhar, A., and Ansari, R., “An Improved Detector/Decoder for Spread Spectrum based Watermarking using Independent Component Analysis”, Fifth Workshop Digital Rights Management (DRM), 2005, 2005, November, Washington D.C.
Malik, H., Khokhar, A., and Ansari, R., “An Improved Detector for Spread Spectrum based Watermarking using Independent Component Analysis: Performance Analysis,” Int. Conf. on Digital Rights Management: Technologies, Issues, Challenges and Systems, 2005, November Sydney, Australia.
Malik, H., Khokhar, A., and Ansari, R., “Digital Asset Management: Trends and Technologies”, Proc. of NSF International Workshop on Frontiers of Information Technology, 2004, December, Islamabad, Pakistan.
Malik, H., Khokhar, A., and Ansari, R., “Robust Data Hiding for Audio”, Proc. of IEEE International Conference on Multimedia and Expo 2004 (ICME’04), 2004, June, Taipei, Taiwan.
Malik, H., Khokhar, A., and Ansari, R., “Robust Audio Watermarking using Frequency Selective Spread Spectrum Theory”, Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing 2004 (ICASSP’04), 2004, May, Montreal, Quebec, Canada.
Ansari, R., Malik, H., and Khokhar, A., “Data-Hiding in Audio using Frequency-Selective Phase Alteration”, Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing 2004 (ICASSP’04), 2004, May Montreal, Quebec, Canada.
Malik, H., Khokhar, A., Ansari, R., and Baillon, B.C., “Predominant Pitch Contour Extraction from Audio Signals”, Proc. of IEEE International Conference on Multimedia and Expo 2002 (ICME02), 2002, August, Lusiane, Switzerland.
Bokhari, U., Malik, H., Sheikh, N., and Khan, U., “Automated Fingerprint Identification System”, Proc. All Pakistan Mathematical Conference 2000, 2000, November, Jamshoro, Pakistan.
Malik, H., Bokhari, U., Ahmad, M., and Khan, U., “Progressive Image Coding Using EZW”, Proc. All Pakistan Mathematical Conference 2000, 2000, November, Jamshoro, Pakistan.