Ph.D., University of Illinois At Chicago
B.S., University of Engineering & Technology
Hafiz Malik is Associate Processor in the Electrical and Computer Engineering (ECE) Department at University of Michigan – Dearborn. His research in cybersecurity, multimedia forensics, information security, wireless sensor networks, steganography/steganalysis, pattern recognition, information fusion, and biometric security is funded by the National Academies, National Science Foundation and other agencies. He has published more than 70 papers in leading journals, conferences, and workshops. He is serving as Associate Editor for the IEEE Transactions on Information Forensics and Security since August 2014 and for the Springer Journal of Signal, Image, and Video Processing (SIVP) May 2013 – present. He is also on the Review Board Committee of IEEE Technical Committee on Multimedia Communications (MMTC). He organized Special Track on Doctoral Dissertation in Multimedia, in the 6th IEEE International Symposium on Multimedia (ISM) 2006. He is also organizing a special session on “Data Mining in Industrial Applications” within the IEEE Symposium Series on Computational Intelligence (IEEE SSCI) 2013. He is serving as vice chair of IEEE SEM, Chapter 16 since 2011. He is also serving on several technical program committees, including the IEEE AVSS, ICME ICIP, MINES, ISPA, CCNC, ICASSP, and ICC. He is a senior IEEE member.
Further information about his research can be found at http://www-personal.engin.umd.umich.edu/~hafiz/
Dilpazir, H., Muhammad, Z., Minhas, Q., Ahmed, F., Malik, H., and Mahmood, H., “Multivariate mutual information for audio-video fusion” Springer Journal on Signal, Image and Video Processing, pp. 1863 – 1703, 2016.
Javed, A., Bajwa, K., Malik, H., and Irtaza, A. “An Efficient framework for automatic highlights generation from sports videos,” IEEE Signal Processing Letters, vol. 23(7), pp. 954–958., 2016
Zhao, H., Chen, Y., Wang, R., and Malik, H., “Audio Splicing Detection and Localization using Acoustic Channel Impulse Response,” Springer Journal on Multimedia Tools and Applications, DOI: 10.1007/s11042-016-3758-7, 2016.
Zhao, H., Chen, Y., Wang, R., and Malik, H., “Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-features Classification,” IEEE Transactions on Information Forensics and Security, IEEE Transactions on Information Forensics and Security, vol. 11(7), pp. 1603 – 1617, July 2016.
Malik, H., Subbalakshmi, K. P., and Chandramouli, R., “Joint-Channel Modeling to Attack QIM Steganography”, Springer Journal on Multimedia Tools and Applications. DOI: 10.1007/s11042-015-3006-6, vol. 75, Issue 21, pp 13585–13611, Nov. 2015.
Minhas, Q.A., Mahmood, H., and Malik, H. “Channel Selection for Simultaneous Move Game in Cognitive Radio Ad hoc Networks,” Springer Journal on Wireless Networks, doi: 10.1007/s11276-015-0952-x, SBN: 1022-0038, (Online), ISBN: 978-94-017-9803-7 (print), pp. 531 – 543, 2015.
Malik, H., and Mahmood, H., “Acoustic Environment Identification using Unsupervised Learning,” Security Informatics: Thematic Series on Information Visualization and Visual Analytics for Crime Analysis and Prediction, Vol. 3(11), 2014.
Gjomemo, R., Malik, H., Sumb, N., Ansari, R., and Venkatakrishnan, V.N., “Digital Check Forgery Attacks on Client Check Truncation Systems”, Int. Conf. on Financial Cryptography and Data Security, 2014, March 3 – 7, Barbados.
Abbas, M.M., Tawhid, M., Saleem, K., Zia, M., Saqib, M., Mahmood, H., and Malik, H., “Solar Energy Harvesting and Management in Wireless Sensor Network” International Journal of Distributed Sensor Networks, Special Issue: Recent Trends in Wireless Sensor Networks with Applications, Vol. 2014, Article ID 436107, 8 pages, 2014. doi:10.1155/2014/436107.
Malik, H. “Acoustic Environment Identification and Its Applications to Audio Forensics,” IEEE Transactions on Information Forensics and Security, vol. 8(11), November 2013, pp. 1827 – 1837.
Zhao, H., and Malik, H., “Audio Recording Location Identification using Acoustic Environment Signature,” IEEE Transactions on Information Forensics and Security, vol. 8(11), pp. 1746 – 1759, November 2013.
Malik, H., Subbalakshmi, K. P., and Chandramouli, R., “Nonparametric Steganalysis of Quantization Index Modulation Based Data Hiding Using Approximate Entropy,” IEEE Transactions on Information Forensics and Security, vol. 7(2), pp. 418 – 431, April 2012.
Malik, H., “Multimedia Social Networks: Behavior Forensics”, IEEE COMSOC MMTC R-Letter, Vol. 1(2), December 2010, pp. 10-11.
Malik, H., “Blind Watermark Estimation Attack for Spread Spectrum Watermarking,” International Journal on Informatica: Special Issue on Multimedia Information System Security, vol. 33, March 2009, pp. 49 – 68.
Malik, H., Khokhar, A., and Ansari, R., “Robust Audio Watermarking using Frequency Selective Spread Spectrum,” IEE (IET) Information Security, vol. 2(4), Dec. 2008, pp. 129 – 150.
Malik, H., Khokhar, A., and Ansari, R., “Robust Data Hiding in Audio using Allpass Filter,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 15 (4), May 2007, pp. 1296-1304
- Member for
- 1 year 1 month