Pradeep K. Atrey

The University of Winnipeg, Winnipeg, Manitoba, Canada

Are you Pradeep K. Atrey?

Claim your profile

Publications (86)51.75 Total impact

  • Shreelatha Bhadravati · Pradeep K. Atrey · Majid Khabbazian
    [Show abstract] [Hide abstract]
    ABSTRACT: Traditional secret image sharing methods have an all-or-nothing property, which is not suitable for applications which require gradual reconstruction. In this paper, we propose a scalable secret image sharing (SSIS) method that provides gradual reconstruction with smooth scalability. Furthermore, we extend this method to videos and propose a scalable secret video sharing (SSVS) method. These two methods are designed for compressed multimedia (i.e. JPEG images and H.264 videos). In both methods, the size of the shadow images (shares) is reduced to an optimal value. Experimental results and analyses show that the proposed methods are computationally and semantically secure.
    No preview · Article · Aug 2015

  • No preview · Article · Jul 2015 · Multimedia Tools and Applications
  • A. Yakubu · N. C. Maddage · P. K. Atrey

    No preview · Conference Paper · Jun 2015
  • Prabhu Natarajan · Pradeep K. Atrey · Mohan Kankanhalli
    [Show abstract] [Hide abstract]
    ABSTRACT: The use of multiple heterogeneous cameras is becoming more common in today's surveillance systems. In order to perform surveillance tasks, effective coordination and control in multi-camera systems is very important, and is catching significant research attention these days. This survey aims to provide researchers with a state-of-the-art overview of various techniques for multi-camera coordination and control (MC3) that have been adopted in surveillance systems. The existing literature on MC3 is presented through several classifications based on the applicable architectures, frameworks and the associated surveillance tasks. Finally, a discussion on the open problems in surveillance area that can be solved effectively using MC3 and the future directions in MC3 research is presented.
    No preview · Article · Jun 2015 · ACM Transactions on Multimedia Computing Communications and Applications
  • Manoranjan Mohanty · Wei Tsang Ooi · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: With the evolution in cloud computing, cloud-based volume rendering, which outsources data rendering tasks to cloud datacenters, is attracting interest. Although this new rendering technique has many advantages, allowing third-party access to potentially sensitive volume data raises security and privacy concerns. In this paper, we address these concerns for cloud-based pre-classification volume ray-casting by using Shamir’s (k, n) secret sharing and its variant (l, k, n) ramp secret sharing, which are homomorphic to addition and scalar multiplication operations, to hide color information of volume data/images in datacenters. To address the incompatibility issue of the modular prime operation used in secret sharing technique with the floating point operations of ray-casting, we consider excluding modular prime operation from secret sharing or converting the floating number operations of ray-casting to fixed point operations - the earlier technique degrades security and the later degrades image quality. Both these techniques, however, result in significant data overhead. To lessen the overhead at the cost of high security, we propose a modified ramp secret sharing scheme that uses the three color components in one secret sharing polynomial and replaces the shares in floating point with smaller integers.
    No preview · Article · Mar 2015 · Multimedia Tools and Applications
  • M. Mohanty · C. Gehrmann · P.K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: Secret image sharing is a popular image hiding scheme that typically uses (3, 3, n) multi-secret sharing to hide the colors of a secret image. The use of (3, 3, n) multi-secret sharing, however, can lead to information loss. In this paper, we study this loss of information from an image perspective, and show that one-third of the color values of the secret image can be leaked when the sum of any two selected share numbers is equal to the considered prime number in the secret sharing. Furthermore, we show that if the selected share numbers do not satisfy this condition (for example, when the value of each of the selected share number is less than the half of the value of the prime number), then the colors of the secret image are not leaked. In this case, a noise-like image is reconstructed from the knowledge of less than three shares.
    No preview · Article · Feb 2015
  • Ankita Lathey · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: Cloud-based multimedia systems are becoming increasingly common. These systems offer not only storage facility, but also high-end computing infrastructure which can be used to process data for various analysis tasks ranging from low-level data quality enhancement to high-level activity and behavior identification operations. However, cloud data centers, being third party servers, are often prone to information leakage, raising security and privacy concerns. In this article, we present a Shamir's secret sharing based method to enhance the quality of encrypted image data over cloud. Using the proposed method we show that several image enhancement operations such as noise removal, antialiasing, edge and contrast enhancement, and dehazing can be performed in encrypted domain with near-zero loss in accuracy and minimal computation and data overhead. Moreover, the proposed method is proven to be information theoretically secure.
    No preview · Article · Feb 2015 · ACM Transactions on Multimedia Computing Communications and Applications
  • Source
    M. Abukari Yakubu · Namunu C. Maddage · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: Audio Secret Sharing (ASS) is a technique used to protect audio data from tampering and disclosure by dividing it into shares such that qualified shares can reconstruct the original audio data. Existing ASS schemes encrypt binary secret messages and rely on the human auditory system for decryption by simultaneously playing authorized shares. This decryption approach tends to overburden the human auditory system when the number of shares used to reconstruct the secret increases [3]. Furthermore, it does not create room for further analysis or computation to be performed on the reconstructed secret since decryption ends at the human auditory system. Additionally, schemes in [2], [3], [4], [6] do not extend to the general (k, n) threshold. In this paper we propose an ASS scheme based on Shamir’s secret sharing, which is (k, n) threshold, ideal2, and information theoretically secure and it provides computationally efficient decryption.
    Full-text · Conference Paper · Jan 2015
  • Source
    Hazem Al-Najjar · Saeed Alharthi · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: Image sharing has become a prominent field in large and small networks. However, in order to deliver the shares to their respective shareholders, we need a secure channel to protect the shares from potential attacks by other users on the network. These users can locate the shares and retrieve the image using the Lagrange interpolation method if they are able to locate the minimum required number of shares. This paper proposes a method to protect the privacy and security of the shares when sending them through unsecured channels. The proposed method is divided into three phases. In the first phase, image pixels are changed using the column and row indices, then the shares are created using Shamir’s secret sharing (SSS) method. Then a relationship is created between the shares using a linear independence function. In the second phase, the first part of the image is encrypted to hide the solver data. Finally, in the third phase, the data is shared using the SSS method. Participants can retrieve the whole image by applying the reverse order of the proposed method using only the information from the sender through the same channel. The simulation results show that the proposed method is efficient and robust against different types of attacks and can be used to send the shares over unsecured channels.
    Full-text · Article · Dec 2014 · Multimedia Tools and Applications
  • Source
    Pradeep K. Atrey · M. Anwar Hossain · Mohan S. Kankanhalli
    [Show abstract] [Hide abstract]
    ABSTRACT: Automated multimedia surveillance systems capture, process and analyze multimedia data coming from heterogeneous sensors. These systems are often designed to support (semi-) automatic decision making, such as generating an alarm in response to a surveillance event, as well as providing useful information to human decision makers to ensure public safety. Various tools and techniques from different fields such as Computer Vision, Pattern Recognition, and Multimedia Computing have contributed to the success of such systems.Although there has been significant progress in the field of multimedia surveillance research, we still face situations when the system is unable to detect critical events, wrongly identifies individuals or generates false alarms leading to undesired consequences. Hence, the goal of this special issue is to bring forward recent advancements in automated multimedia surveillance for improved public safety. More specifically, it reports the state-of-the-art techniques, met
    Full-text · Article · Nov 2014 · Multimedia Tools and Applications
  • [Show abstract] [Hide abstract]
    ABSTRACT: Design and implementation of an effective surveillance system is a challenging task. In practice, a large number of CCTV cameras are installed to prevent illegal and unacceptable activities where a human operator observes different camera views and identifies various alarming cases. But reliance on the human operator for real-time response can be expensive as he may be unable to pay full attention to all camera views at the same time. Moreover, the complexity of a situation may not be easily perceivable by the operator for which he might require additional support in response to an adverse situation. In this paper, we present a Decision Support Engine (DSE) to select and schedule most appropriate camera views that can help the operator to take an informed decision. For this purpose, we devise a utility based approach where the utility value changes based on automatically detected events in different surveillance zones, event co-relation, and operator’s feedback. In addition to the selected camera views, we propose to synthetically embed extra information around the camera views such as event summary and suggested action plan to globally perceive the current situation. The experimental results show the usefulness of the proposed decision support system.
    No preview · Article · Nov 2014 · Multimedia Tools and Applications
  • [Show abstract] [Hide abstract]
    ABSTRACT: Personality plays an important role in the personalized experience of ambient environments. Several aspects of ambient environments, such as advertisement and marketing, can adapt according to individual user's personality. Several works have been published that seek to acquire various personality traits by analyzing Internet usage statistics. Researchers have used Facebook, Twitter, YouTube, and various other nostalgic websites to collect usage statistics. However, we are still far from a successful outcome. In this paper, we use a range of divergent features of the Facebook and LinkedIn social networks, both separately and collectively, in order to achieve better results. Our experimental results show that the accuracy of personality detection improves with the use of complementary features of multiple social networks. To the best of our knowledge, this is the first work on detecting personality from multiple social networks. Furthermore, this is also the first attempt to detect personality from the LinkedIn social network in an automated manner.
    No preview · Article · Sep 2014
  • Gaurav Bhatnagar · Ashirbani Saha · Q.M.Jonathan Wu · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents an analysis of the multiresolution form of singular value decomposition SVD (MR-SVD) and generalizes the analysis into a random multiresolution form of singular value decomposition (R-MR-SVD) with an intrinsic randomness. The core idea behind the proposed transform is to introduce randomness in the computing process based on parameters without which one can neither decompose nor reconstruct the data correctly. The proposed transform inherits the excellent properties of MR-SVD along with its own unique features, which can be useful in many research areas. Image encryption, lossy image compression, and face recognition are the primary applications used to illustrate the practical usage of the proposed transform.
    No preview · Article · Sep 2014 · Information Sciences
  • Gaurav Bhatnagar · Q.M. Jonathan Wu · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a novel logo watermarking technique with key concept is proposed using fractional wavelet packet transform (FrWPT), non-linear chaotic map and singular value decomposition (SVD). The core idea is to use biometrically generated keys in the embedding process of gray-scale watermark. Therefore, this paper first proposes a method for generating keys from biometrics efficiently. Then the host image is first randomized with the help of non-linear chaotic map followed by the embedding in the FrWPT domain by modifying the singular values of the randomized image. Further, in order to enhance the security, an authentication key is formed to authenticate the watermarked image. Finally, a reliable extraction process is proposed to extracted watermark from the possibly attacked authenticate watermarked image. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking technique. Further, an efficient solution is also proposed to deal with the ambiguous situations created by SVD in watermarking.
    No preview · Article · Aug 2014 · Expert Systems with Applications
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Smart cameras were conceived to provide scalable solutions to automatic video analysis applications, such as surveillance and monitoring. Since then, many algorithms and system architectures have been proposed, which use smart cameras to distribute functionality and save bandwidth. Still, smart cameras are rarely used in commercial systems and real installations. In this paper, we investigate the reason behind the scarce commercial usage of smart cameras. We found that, in order to achieve scalability, smart cameras put additional constraints on the quality of input data to the vision algorithms, making it an unfavourable choice for future multicamera systems. We recognized that these constraints can be relaxed by following a cloud based hub architecture and propose a cloud entity, SmartHub, which provides a scalable solution with reduced constraints on the quality. A framework is proposed for designing SmartHub system for a given camera placement. Experiments show the efficacy of SmartHub based systems in multicamera scenarios.
    Full-text · Article · Apr 2014 · International Journal of Distributed Sensor Networks
  • Himanshu Agarwal · Pradeep K. Atrey · Balasubramanian Raman
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose blind and non-blind watermarking schemes in the real oriented wavelet transform (ROWT) domain. The ROWT, which is a member of the dual tree complex wavelet transform (DTCWT) family, is chosen as a watermarking domain since the DTCWT has recently emerged as an important new image processing tool. Existing watermarking schemes based on the DTCWT usually lack high embedding capacity. This is mainly due to the fact that the left inverse and the right inverse of the DTCWT (including the ROWT) are not equal. We have observed a relation when the ROWT follows its left inverse, and have used this relation to develop two watermarking schemes in the ROWT domain. Experimental results show that the proposed ROWT based watermarking schemes not only have a much higher capacity than the existing DTCWT based watermarking schemes, but are also robust to various image modification operations such as cropping, Gaussian filter, Gaussian noise, and salt and pepper noise.
    No preview · Article · Jan 2014 · Multimedia Tools and Applications
  • Mukesh Saini · Pradeep K. Atrey · Sharad Mehrotra · Mohan Kankanhalli
    [Show abstract] [Hide abstract]
    ABSTRACT: Huge amounts of video are being recorded every day by surveillance systems. Since video is capable of recording and preserving an enormous amount of information which can be used in many applications, it is worth examining the degree of privacy loss that might occur due to public access to the recorded video. A fundamental requirement of privacy solutions is an understanding and analysis of the inference channels than can lead to a breach of privacy. Though inference channels and privacy risks are well studied in traditional data sharing applications (e.g., hospitals sharing patient records for data analysis), privacy assessments of video data have been limited to the direct identifiers such as people’s faces in the video. Other important inference channels such as location (Where), time (When), and activities (What) are generally overlooked. In this paper we propose a privacy loss model that highlights and incorporates identity leakage through multiple inference channels that exist in a video due to what, when, and where information. We model the identity leakage and the sensitive information separately and combine them to calculate the privacy loss. The proposed identity leakage model is able to consolidate the identity leakage through multiple events and multiple cameras. The experimental results are provided to demonstrate the proposed privacy analysis framework.
    No preview · Article · Jan 2014 · Multimedia Tools and Applications
  • Manoranjan Mohanty · Wei Tsang Ooi · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: Advances in cloud computing have allowed volume rendering tasks, typically done by volume ray-casting, to be outsourced to cloud data centers. The availability of volume data and rendered images (which can contain important information such as the disease information of a patient) to a third-party cloud provider, however, presents security and privacy challenges. This paper addresses these challenges by proposing a secure cloud-based volume ray-casting framework that distributes the rendering tasks among the data centers and hides the information that is exchanged between the server and a data center, between two data centers, and between a data center and the client by using Shamir's secret sharing, such that none of the data centers has enough information to know the secret data and/or rendered image. Experiments and analyses show that our framework is highly secure and requires low computation cost.
    No preview · Conference Paper · Dec 2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Today digital video is used extensively in many applications. Sometimes a video could be treated as a top secret for an organization, for example military secrets, surveillance footage and corporate product designs, and may need to be shared among a group of people in a secure manner. Traditional data security methods such as encryption techniques are prone to single-point attack, i.e. the secret can be revealed by obtaining the decryption key from any single person. Alternatively, the secret sharing scheme provides collective control over the secrecy of information and is considered information theoretically secure. In this paper, we propose to adopt a secret sharing based approach to provide collective control over a given sensitive video. We present three methods that utilize the spatial and temporal redundancy in videos in different ways. We analyze the security of these methods and compare them for efficiency in terms of computation time and space using extensive experimentation.
    No preview · Article · Dec 2013 · Multimedia Tools and Applications
  • Gaurav Bhatnagar · Q. M. Jonathan Wu · Pradeep K. Atrey
    [Show abstract] [Hide abstract]
    ABSTRACT: In this article, a novel logo watermarking scheme is proposed based on wavelet frame transform, singular value decomposition and automatic thresholding. The proposed scheme essentially rectifies the ambiguity problem in the SVD-based watermarking. The core idea is to randomly upscale the size of host image using reversible random extension transform followed by the embedding of logo watermark in the wavelet frame domain. After embedding, a verification phase is casted with the help of a binary watermark and toral automorphism. At the extraction end, the binary watermark is first extracted followed by the verification of watermarked image. The logo watermark is extracted if and only if the watermarked image is verified. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking system.
    No preview · Article · Dec 2013 · ACM Transactions on Multimedia Computing Communications and Applications

Publication Stats

679 Citations
51.75 Total Impact Points


  • 2008-2015
    • The University of Winnipeg
      • Department of Applied Computer Science
      Winnipeg, Manitoba, Canada
  • 2014
    • University at Albany, The State University of New York
      New York, New York, United States
  • 2007
    • University of Ottawa
      • Faculty of Medicine
      Ottawa, Ontario, Canada
  • 2006
    • IIT Kharagpur
      Khargpur, West Bengal, India
  • 2004-2006
    • National University of Singapore
      • Department of Computer Science
      Tumasik, Singapore