 |
Steganography Based on Sensor Capture Models: Replacing Heuristics with Model-Based Designs
sponsored by NSF, Oct 1 2020 – Sep 30, 2023. |
 |
New Generation of Image Processing History and Manipulation Detection Techniques with Vectorized Context-Aware Descriptors
sponsored by DARPA (PI Matthias Kirchner), May 17, 2016 – April 30, 2020. |
 |
Steganography in Empirical Sources Using Acquisition Oracle
sponsored by NSF, May 15, 2016 – April 30, 2019. |
 |
Rich Cover Models for Steganalysis of Digital Media
sponsored by the Air Force Office of Scientific Research, April 1, 2012 – March 31, 2017. |
 |
Digital Image Forensics Using Systematic Artifacts of Imaging Sensors
sponsored by NSF, September 1, 2008 – August 31, 2010. |
 |
Advanced Steganalysis Methods for Digital Images
sponsored by the Air Force Office of Scientific Research, January 1, 2009 – December 31, 2011. |
 |
Towards Statistically Undetectable Steganography
sponsored by the Air Force Office of Scientific Research, January 1, 2008 – April 30, 2011. |
 |
Advanced Steganographic and Digital Forensic Mehtods
sponsored by the Air Force Office of Scientific Research, January 15, 2006 - December 31, 2008. |
 |
Mathematical Foundations of Steganalysis,research grant # FA8750-04-1-0112
funded by the Air Force Research Laboratory in Rome, March 26, 2004 - September 30, 2006. |
 |
New Generation Methods for Digital Security: Steganography, Steganalysis, and Authentication Watermarks funded by the Air Force Research Laboratory in Rome, May 13, 2002 - September 23, 2005. |
 |
Smart Digital Images - Embedding for Information, Protection, and Self-Repair
funded by the Air Force Research Laboratory in Rome, March 26, 2000 - September 30, 2002. |
 |
Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques
research grant # F30602-00-1-0502 sponsored by the Air Force Research Laboratory, Rome, NY. October 5, 1999 - October 4,
2000. |
 |
Lossless Data Embedding and Crypto-Transformations for Steganography
sponsored by the Air Force Office of Scientific Research, December 15, 2000 - December 14, 2003. |
 |
Steganalysis of Digital Watermarking Techniques
research grant with Polytechnic University, NY sponsored by the Air Force Research Laboratory, Rome, NY.
March 2001 – September 2002, 2000. |
 |
Automated Multi-Level Security Digital Information Transfer Using Watermarking Technologies
MTL Phase I and II SBIR funded by the Air Force Research Laboratory in Rome, April 2000 - February 2003. |
 |
Development of Novel Steganography Detection Capabilities for Digital Images
Phase I of NSF SBIR with Mission Research Corporation, Albuquerque, NM. January 1, 2001 - June 30, 2001. |
 |
Secure Image Management Using Watermarking
Phase I of Army SBIR with Mission Research Corporation, Albuquerque, NM. December 15, 2000 - June 15, 2001. |
 |
Techniques for Secure Image Processing
Research grant # F30602-98-C-0009 sponsored by the Air
Force Research Laboratory, Rome, NY. January 6, 1998 - May 31, 2000. |
 |
Innovative C4I Technologies (Secure Image Encryption and Hiding)
Phase I of SBIR topic No. AF97-043
with Mission Research Corporation, Albuquerque, NM. May 14, 1997 - February 28, 1998. |
 |
Innovative C4I Technologies (Secure Image Encryption and Hiding)
Phase II of SBIR topic No. AF97-043
with Mission Research Corporation, Albuquerque, NM. March 17, 1998 - March 16, 2000. |
 |
Robust Image Authentication and Discovery (RIAD)
subcontractor for contract # F30602-99-2-0541 with Eastman Kodak, August 18, 1999 - May 2001. |
 |
Data Embedding in Imagery and Its Applications
Contractor for the grant # F30602-98-C-0176 funded by the Air Force Research Laboratory, Rome NY to
University of Minnesota. June 3, 1998 - September 1, 2001. |
 |
Secure Image Ciphering Based on Chaos
Research grant # F30602-96-1-0047 sponsored by the Air Force Research Laboratory, Rome NY,
January 1, 1996 - September 30, 1996.
|
 |
Parallel Implementation of Chaos-Based Image Encryption Methods
Research grant # F30602-97-1-0047
sponsored by the Air Force Research Laboratory, Rome NY. October 1, 1996 - September 30, 1997. |
 |
Reconstruction of Actual Automobile Engine Emissions Using Deterministic Chaos
Industrial unrestricted research grant from Ford Motor Company, Detroit, MI, April 1 - December 31, 1996. |
 |
Application of Low-dimensional Deterministic Signal Modeling to Analysis, Forecasting, and Noise Reduction
of Automobile Emissions
Industrial unrestricted research grant from Ford Motor Company, Detroit, MI, January 1, 1997 - December 31, 1997. |