default search action
Nasir D. Memon
Person information
- affiliation: NYU Polytechnic School of Engineering, Department of Computer Science and Engineering
- affiliation: New York University Tandon School of Engineering, Department of Computer Science and Engineering
- affiliation: Northern Illinois University, DeKalb, Department of Computer Science
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c182]Govind Mittal, Chinmay Hegde, Nasir D. Memon:
Gotcha: Real-Time Video Deepfake Detection via Challenge-Response. EuroS&P 2024: 1-20 - [c181]Sudipta Banerjee, Anubhav Jain, Zehua Jiang, Nasir D. Memon, Julian Togelius, Arun Ross:
Alpha-Wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems. WACV (Workshops) 2024: 1072-1081 - [i34]Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir D. Memon:
AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response. CoRR abs/2402.18085 (2024) - [i33]Sudipta Banerjee, Sai Pranaswi Mullangi, Shruti Wagle, Chinmay Hegde, Nasir D. Memon:
Mitigating the Impact of Attribute Editing on Face Recognition. CoRR abs/2403.08092 (2024) - [i32]Sudipta Banerjee, Anubhav Jain, Zehua Jiang, Nasir D. Memon, Julian Togelius, Arun Ross:
Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems. CoRR abs/2403.12047 (2024) - 2023
- [j97]Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenaël J. Doërr, Jessica J. Fridrich, Nasir D. Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu:
Information Forensics and Security: A quarter-century-long journey. IEEE Signal Process. Mag. 40(5): 67-79 (2023) - [j96]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter. IEEE Trans. Inf. Forensics Secur. 18: 248-260 (2023) - [j95]Mirko Marras, Pawel Korus, Anubhav Jain, Nasir D. Memon:
Dictionary Attacks on Speaker Verification. IEEE Trans. Inf. Forensics Secur. 18: 773-788 (2023) - [c180]Sudipta Banerjee, Govind Mittal, Ameya Joshi, Chinmay Hegde, Nasir D. Memon:
Identity-Preserving Aging of Face Images via Latent Diffusion Models. IJCB 2023: 1-10 - [c179]Anubhav Jain, Nasir D. Memon, Julian Togelius:
Zero-Shot Racially Balanced Dataset Generation using an Existing Biased StyleGAN2. IJCB 2023: 1-18 - [i31]Anubhav Jain, Nasir D. Memon, Julian Togelius:
Zero-shot racially balanced dataset generation using an existing biased StyleGAN2. CoRR abs/2305.07710 (2023) - [i30]Sudipta Banerjee, Govind Mittal, Ameya Joshi, Chinmay Hegde, Nasir D. Memon:
Identity-Preserving Aging of Face Images via Latent Diffusion Models. CoRR abs/2307.08585 (2023) - [i29]Anubhav Jain, Nasir D. Memon, Julian Togelius:
Fair GANs through model rebalancing with synthetic data. CoRR abs/2308.08638 (2023) - [i28]Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenaël J. Doërr, Jessica J. Fridrich, Nasir D. Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu:
Information Forensics and Security: A quarter-century-long journey. CoRR abs/2309.12159 (2023) - 2022
- [j94]Nicholas Micallef, Vivienne Armacost, Nasir D. Memon, Sameer Patil:
True or False: Studying the Work Practices of Professional Fact-Checkers. Proc. ACM Hum. Comput. Interact. 6(CSCW1): 127:1-127:44 (2022) - [j93]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
ENF Based Robust Media Time-Stamping. IEEE Signal Process. Lett. 29: 1963-1967 (2022) - [j92]Pawel Korus, Nasir D. Memon:
Computational Sensor Fingerprints. IEEE Trans. Inf. Forensics Secur. 17: 2508-2523 (2022) - [c178]Megan Charity, Nasir D. Memon, Zehua Jiang, Abhi Sen, Julian Togelius:
Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage. BIOSIG 2022: 221-228 - [c177]Anubhav Jain, Nasir D. Memon, Julian Togelius:
A Dataless FaceSwap Detection Approach Using Synthetic Images. IJCB 2022: 1-7 - [c176]Nicholas Micallef, Marcelo Sandoval-Castañeda, Adi Cohen, Mustaque Ahamad, Srijan Kumar, Nasir D. Memon:
Cross-Platform Multimodal Misinformation: Taxonomy, Characteristics and Detection for Textual Posts and Videos. ICWSM 2022: 651-662 - [e15]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2022, online, January 15-26, 2022. Society for Imaging Science and Technology 2022 [contents] - [d1]Govind Mittal, Pawel Korus, Nasir D. Memon:
File Fragment Type (FFT) - 75 Dataset. IEEE DataPort, 2022 - [i27]Mirko Marras, Pawel Korus, Anubhav Jain, Nasir D. Memon:
Dictionary Attacks on Speaker Verification. CoRR abs/2204.11304 (2022) - [i26]Megan Charity, Nasir D. Memon, Zehua Jiang, Abhi Sen, Julian Togelius:
Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage. CoRR abs/2209.04909 (2022) - [i25]Govind Mittal, Jiraphon Yenphraphai, Chinmay Hegde, Nasir D. Memon:
Gotcha: A Challenge-Response System for Real-Time Deepfake Detection. CoRR abs/2210.06186 (2022) - [i24]Anubhav Jain, Nasir D. Memon, Julian Togelius:
A Dataless FaceSwap Detection Approach Using Synthetic Images. CoRR abs/2212.02571 (2022) - 2021
- [j91]Hui-Ching Kayla Hsu, Nasir D. Memon:
Crossing the Bridge to STEM: Retaining Women Students in an Online CS Conversion Program. ACM Trans. Comput. Educ. 21(2): 11:1-11:16 (2021) - [j90]Govind Mittal, Pawel Korus, Nasir D. Memon:
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 16: 28-41 (2021) - [c175]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Effect of Video Pixel-Binning on Source Attribution of Mixed Media. ICASSP 2021: 2545-2549 - [c174]Athanasios Papadopoulos, Pawel Korus, Nasir D. Memon:
Hard-Attention for Scalable Image Classification. NeurIPS 2021: 14694-14707 - [c173]Kevin Gallagher, Santiago Torres-Arias, Nasir D. Memon, Jessica Feldman:
COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs. NSPW 2021: 13-27 - [e14]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics, Virtual Event, January 2021. Society for Imaging Science and Technology 2021 [contents] - [i23]Athanasios Papadopoulos, Pawel Korus, Nasir D. Memon:
Hard-Attention for Scalable Image Classification. CoRR abs/2102.10212 (2021) - 2020
- [j89]Irene Amerini, Chang-Tsun Li, Nasir D. Memon, Jiwu Huang:
IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference. IEEE Access 8: 209657-209659 (2020) - [j88]Edward J. Delp, Jiwu Huang, Nasir D. Memon, Anderson Rocha, Matt Turek, Luisa Verdoliva:
Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities. IEEE J. Sel. Top. Signal Process. 14(5): 906-909 (2020) - [j87]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Camera identification of multi-format devices. Pattern Recognit. Lett. 140: 288-294 (2020) - [j86]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Camera Fingerprint Extraction via Spatial Domain Averaged Frames. IEEE Trans. Inf. Forensics Secur. 15: 3270-3282 (2020) - [c172]Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir D. Memon:
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic. IEEE BigData 2020: 748-757 - [c171]Waheeb Yaqub, Otari Kakhidze, Morgan L. Brockman, Nasir D. Memon, Sameer Patil:
Effects of Credibility Indicators on Social Media News Sharing Intent. CHI 2020: 1-14 - [c170]Pawel Korus, Nasir D. Memon:
Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations. ICLR 2020 - [c169]Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. WIFS 2020: 1-6 - [e13]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2020, Burlingame, CA, USA, 26-30 January 2020. Society for Imaging Science and Technology 2020 [contents] - [i22]Ahmet Gökhan Poyraz, Ahmet Emir Dirik, Ahmet Karaküçük, Nasir D. Memon:
Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection. CoRR abs/2002.10123 (2020) - [i21]Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir D. Memon:
Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines. CoRR abs/2004.01929 (2020) - [i20]Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir D. Memon:
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic. CoRR abs/2011.05773 (2020)
2010 – 2019
- 2019
- [j85]Toan Nguyen, Aditi Roy, Nasir D. Memon:
Kid on the phone! Toward automatic detection of children on mobile devices. Comput. Secur. 84: 334-348 (2019) - [j84]Napa Sae-Bae, Jonathan Wu, Nasir D. Memon, Janusz Konrad, Prakash Ishwar:
Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey. IEEE Trans. Biom. Behav. Identity Sci. 1(1): 5-31 (2019) - [j83]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
Analysis of Rolling Shutter Effect on ENF-Based Video Forensics. IEEE Trans. Inf. Forensics Secur. 14(9): 2262-2275 (2019) - [j82]Emre Durmus, Pawel Korus, Nasir D. Memon:
Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments. IEEE Trans. Inf. Forensics Secur. 14(9): 2372-2386 (2019) - [c168]Aditi Roy, Nasir D. Memon, Arun Ross:
MasterPrint Attack Resistance: A Maximum Cover Based Approach for Automatic Fingerprint Template Selection. BTAS 2019: 1-9 - [c167]Pawel Korus, Nasir D. Memon:
Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels. CVPR 2019: 8621-8629 - [c166]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
Factors Affecting Enf Based Time-of-recording Estimation for Video. ICASSP 2019: 2497-2501 - [c165]Mirko Marras, Pawel Korus, Nasir D. Memon, Gianni Fenu:
Adversarial Optimization for Dictionary Attacks on Speaker Verification. INTERSPEECH 2019: 2913-2917 - [e12]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2019, Burlingame, CA, USA, 13-17 January 2019. Society for Imaging Science and Technology 2019 [contents] - [i19]Pawel Korus, Nasir D. Memon:
Neural Imaging Pipelines - the Scourge or Hope of Forensics? CoRR abs/1902.10707 (2019) - [i18]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
Detecting the Presence of ENF Signal in Digital Videos: a Superpixel based Approach. CoRR abs/1903.09884 (2019) - [i17]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
Analysis of Rolling Shutter Effect on ENF based Video Forensics. CoRR abs/1903.09889 (2019) - [i16]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Source Camera Attribution of Multi-Format Devices. CoRR abs/1904.01533 (2019) - [i15]Govind Mittal, Pawel Korus, Nasir D. Memon:
FiFTy: Large-scale File Fragment Type Identification using Neural Networks. CoRR abs/1908.06148 (2019) - [i14]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Camera Fingerprint Extraction via Spatial Domain Averaged Frames. CoRR abs/1909.04573 (2019) - 2018
- [j81]Toan Nguyen, Nasir D. Memon:
Tap-based user authentication for smartwatches. Comput. Secur. 78: 174-186 (2018) - [j80]Napa Sae-Bae, Nasir D. Memon, Pitikhate Sooraksa:
Distinctiveness, complexity, and repeatability of online signature templates. Pattern Recognit. 84: 332-344 (2018) - [j79]Michele Nappi, Nasir D. Memon, Daniel Riccio, Andreas Uhl:
Introduction to the special issue on integrating biometrics and forensics. Pattern Recognit. Lett. 113: 1-2 (2018) - [c164]Waheeb Yaqub, Manoranjan Mohanty, Nasir D. Memon:
Encrypted Domain Skin Tone Detection For Pornographic Image Filtering. AVSS 2018: 1-5 - [c163]Philip Bontrager, Aditi Roy, Julian Togelius, Nasir D. Memon, Arun Ross:
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*. BTAS 2018: 1-9 - [c162]Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. CCS 2018: 1290-1305 - [c161]Aditi Roy, Nasir D. Memon, Julian Togelius, Arun Ross:
Evolutionary Methods for Generating Synthetic MasterPrint Templates: Dictionary Attack in Fingerprint Recognition. ICB 2018: 39-46 - [c160]Nasir D. Memon:
Emerging NUI-based methods for user authentication. ICCE 2018: 1 - [c159]Linus Torvalds, Niraj K. Jha, Gary Davis, Nasir D. Memon, Petronel Bigioi, Swarup Bhunia, Koji Nakao:
Keynotes. ICCE 2018: 1-4 - [c158]Waheeb Yaqub, Manoranjan Mohanty, Nasir D. Memon:
Towards Camera Identification from Cropped Query Images. ICIP 2018: 3798-3802 - [e11]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018 - 1 February 2018. Society for Imaging Science and Technology 2018 [contents] - [i13]Toan Nguyen, Nasir D. Memon:
Tap-based User Authentication for Smartwatches. CoRR abs/1807.00482 (2018) - [i12]Toan Nguyen, Aditi Roy, Nasir D. Memon:
Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices. CoRR abs/1808.01680 (2018) - [i11]Napa Sae-Bae, Nasir D. Memon, Pitikhate Sooraksa:
Distinctiveness, complexity, and repeatability of online signature templates. CoRR abs/1808.03399 (2018) - [i10]Pawel Korus, Nasir D. Memon:
Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels. CoRR abs/1812.01516 (2018) - 2017
- [j78]Hossein Siadati, Toan Nguyen, Payas Gupta, Markus Jakobsson, Nasir D. Memon:
Mind your SMSes: Mitigating social engineering in second factor authentication. Comput. Secur. 65: 14-28 (2017) - [j77]Masooda N. Bashir, Colin Wee, Nasir D. Memon, Boyi Guo:
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. Comput. Secur. 65: 153-165 (2017) - [j76]Toan Van Nguyen, Napa Sae-Bae, Nasir D. Memon:
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. Comput. Secur. 66: 115-128 (2017) - [j75]Tzipora Halevi, Nasir D. Memon, James Levis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi A. Aloul, Jay Chen:
Cultural and Psychological Factors in Cyber-Security. J. Mobile Multimedia 13(1&2): 43-56 (2017) - [j74]Saffet Vatansever, Ahmet Emir Dirik, Nasir D. Memon:
Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach. IEEE Signal Process. Lett. 24(10): 1463-1467 (2017) - [j73]Nasir D. Memon:
How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]. IEEE Signal Process. Mag. 34(4): 196-194 (2017) - [j72]Aditi Roy, Nasir D. Memon, Arun Ross:
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems. IEEE Trans. Inf. Forensics Secur. 12(9): 2013-2025 (2017) - [j71]Athanasios Papadopoulos, Toan Nguyen, Emre Durmus, Nasir D. Memon:
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images. IEEE Trans. Inf. Forensics Secur. 12(12): 2875-2889 (2017) - [j70]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
PRNU-Based Camera Attribution From Multiple Seam-Carved Images. IEEE Trans. Inf. Forensics Secur. 12(12): 3065-3080 (2017) - [c157]Giovanni Di Crescenzo, Jeyavijayan Rajendran, Ramesh Karri, Nasir D. Memon:
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization. ASHES@CCS 2017: 7-16 - [c156]Hossein Siadati, Nasir D. Memon:
Detecting Structurally Anomalous Logins Within Enterprise Networks. CCS 2017: 1273-1284 - [c155]Hossein Siadati, Toan Nguyen, Nasir D. Memon:
X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper. Financial Cryptography Workshops 2017: 587-596 - [c154]Samet Taspinar, Husrev T. Sencar, Sevinc Bayram, Nasir D. Memon:
Fast camera fingerprint matching in very large databases. ICIP 2017: 4088-4092 - [c153]Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir D. Memon, Mustaque Ahamad:
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. NDSS 2017 - [c152]Kevin Gallagher, Sameer Patil, Nasir D. Memon:
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. SOUPS 2017: 385-398 - [c151]Toan Nguyen, Nasir D. Memon:
Smartwatches Locking Methods: A Comparative Study. SOUPS 2017 - [c150]Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun, Nasir D. Memon:
Image carving with missing headers and missing fragments. WIFS 2017: 1-6 - [e10]Adnan M. Alattar, Nasir D. Memon:
Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017 - 2 February 2017. Society for Imaging Science and Technology 2017 [contents] - [i9]Philip Bontrager, Julian Togelius, Nasir D. Memon:
DeepMasterPrint: Generating Fingerprints for Presentation Attacks. CoRR abs/1705.07386 (2017) - [i8]Athanasios Papadopoulos, Toan Nguyen, Emre Durmus, Nasir D. Memon:
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images. CoRR abs/1708.06508 (2017) - [i7]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based Multi-sensor Approach for Continuous Mobile Authentication. CoRR abs/1712.08305 (2017) - [i6]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. CoRR abs/1712.08307 (2017) - 2016
- [j69]Jay Koven, Enrico Bertini, R. Luke DuBois, Nasir D. Memon:
InVEST: Intelligent visual email search and triage. Digit. Investig. 18 Supplement: S138-S148 (2016) - [c149]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
PRNU based source attribution with a collection of seam-carved images. ICIP 2016: 156-160 - [c148]Tzipora Halevi, Nasir D. Memon, James Lewis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi A. Aloul, Jay Chen:
Cultural and psychological factors in cyber-security. iiWAS 2016: 318-324 - [c147]Colin Wee, Masooda N. Bashir, Nasir D. Memon:
The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers. WSIW@SOUPS 2016 - [c146]Jian Ming Colin Wee, Masooda N. Bashir, Nasir D. Memon:
Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes. ASE @ USENIX Security Symposium 2016 - [c145]Hossein Siadati, Bahador Saket, Nasir D. Memon:
Detecting malicious logins in enterprise networks using visualization. VizSEC 2016: 1-8 - [c144]Samet Taspinar, Manoranjan Mohanty, Nasir D. Memon:
Source camera attribution using stabilized video. WIFS 2016: 1-6 - [e9]Adnan M. Alattar, Nasir D. Memon:
Media Watermarking, Security, and Forensics 2016, San Francisco, California, USA, February 14-18, 2016. Society for Imaging Science and Technology 2016 [contents] - 2015
- [j68]Masooda N. Bashir, April Lambert, Boyi Guo, Nasir D. Memon, Tzipora Halevi:
Cybersecurity Competitions: The Human Angle. IEEE Secur. Priv. 13(5): 74-79 (2015) - [j67]Sevinc Bayram, Husrev Taha Sencar, Nasir D. Memon:
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing. IEEE Trans. Inf. Forensics Secur. 10(3): 597-612 (2015) - [c143]Nasir D. Memon:
Photo Forensics: There is More to a Picture Than Meets the Eye. IWSPA@CODASPY 2015: 35 - [c142]Dhruv Kumar Yadav, Beatrice Ionascu, Sai Vamsi Krishna Ongole, Aditi Roy, Nasir D. Memon:
Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass. Financial Cryptography Workshops 2015: 281-297 - [c141]Pan Chan, Tzipora Halevi, Nasir D. Memon:
Glass OTP: Secure and Convenient User Authentication on Google Glass. Financial Cryptography Workshops 2015: 298-308 - [c140]Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Leap Motion Controller for Authentication via Hand Geometry and Gestures. HCI (22) 2015: 13-22 - [c139]Tzipora Halevi, Trishank Karthik Kuppusamy, Meghan Caiazzo, Nasir D. Memon:
Investigating users' readiness to trade-off biometric fingerprint data. ISBA 2015: 1-8 - [c138]Napa Sae-Bae, Nasir D. Memon:
Quality of online signature templates. ISBA 2015: 1-8 - [c137]Ahmet Karaküçük, Ahmet Emir Dirik, Hüsrev T. Sencar, Nasir D. Memon:
Recent advances in counter PRNU based source attribution and beyond. Media Watermarking, Security, and Forensics 2015: 94090N - [c136]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based multi-sensor approach for continuous mobile authentication. MILCOM 2015: 1311-1316 - [c135]Hossein Siadati, Toan Nguyen, Nasir D. Memon:
Verification Code Forwarding Attack (Short Paper). PASSWORDS 2015: 65-71 - [e8]Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater:
Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, February 9-11, 2015, Proceedings. SPIE Proceedings 9409, SPIE 2015, ISBN 978-1-6284-1499-8 [contents] - 2014
- [j66]Shize Shang, Nasir D. Memon, Xiangwei Kong:
Detecting documents forged by printing and copying. EURASIP J. Adv. Signal Process. 2014: 140 (2014) - [j65]Napa Sae-Bae, Nasir D. Memon, Katherine Isbister, Kowsar Ahmed:
Multitouch Gesture-Based Authentication. IEEE Trans. Inf. Forensics Secur. 9(4): 568-582 (2014) - [j64]Napa Sae-Bae, Nasir D. Memon:
Online Signature Verification on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 9(6): 933-947 (2014) - [j63]Ahmet Emir Dirik, Hüsrev T. Sencar, Nasir D. Memon:
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution. IEEE Trans. Inf. Forensics Secur. 9(12): 2277-2290 (2014) - [c134]Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Touchpad Input for Continuous Biometric Authentication. Communications and Multimedia Security 2014: 86-91 - [c133]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. ICASSP 2014: 3789-3793 - [c132]Toan Van Nguyen, Napa Sae-Bae, Nasir D. Memon:
Finger-drawn pin authentication on touch devices. ICIP 2014: 5002-5006 - [c131]Napa Sae-Bae, Xiaoxi Sun, Husrev T. Sencar, Nasir D. Memon:
Towards automatic detection of child pornography. ICIP 2014: 5332-5336 - [c130]Shize Shang, Husrev T. Sencar, Nasir D. Memon, Xiangwei Kong:
A semi-automatic deshredding method based on curve matching. ICIP 2014: 5537-5541 - [c129]Jay Koven, Enrico Bertini, Nasir D. Memon, Roger Luke DuBois:
I-VEST: Intelligent visual email search and triage. IEEE VAST 2014: 257-258 - [c128]Xiang Liu, Torsten Suel, Nasir D. Memon:
A robust model for paper reviewer assignment. RecSys 2014: 25-32 - [e7]Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater:
Media Watermarking, Security, and Forensics 2014, San Francisco, CA, USA, February 2, 2014, Proceedings. SPIE Proceedings 9028, SPIE 2014, ISBN 978-0-8194-9945-5 [contents] - [i5]Tehila Minkus, Nasir D. Memon:
Leveraging Personalization To Facilitate Privacy. CoRR abs/1406.2398 (2014) - 2013
- [c127]Napa Sae-Bae, Nasir D. Memon:
A Simple and Effective Method for Online Signature Verification. BIOSIG 2013: 147-158 - [c126]Ahmet Emir Dirik, Nasir D. Memon:
Selective Robust Image Encryption for Social Networks. MCSS 2013: 71-81 - [c125]Liyun Li, Husrev Taha Sencar, Nasir D. Memon:
A cost-effective decision tree based approach to steganalysis. Media Watermarking, Security, and Forensics 2013: 86650P - [c124]Liyun Li, Nasir D. Memon:
Mining Groups of Common Interest: Discovering Topical Communities with Network Flows. MLDM 2013: 405-420 - [c123]Xiang Liu, Liyun Li, Nasir D. Memon:
A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators. MLDM 2013: 616-628 - [c122]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Seam-carving based anonymization against image & video source attribution. MMSP 2013: 272-277 - [c121]Tzipora Halevi, James Lewis, Nasir D. Memon:
A pilot study of cyber security and privacy related behavior and personality traits. WWW (Companion Volume) 2013: 737-744 - [p1]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
Secure Sketches for Protecting Biometric Templates. Security and Privacy in Biometrics 2013: 69-104 - [e6]Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater:
Media Watermarking, Security, and Forensics 2013, Burlingame, CA, USA, February 5-7, 2013, Proceedings. SPIE Proceedings 8665, SPIE 2013, ISBN 978-0-8194-9438-2 [contents] - [i4]Tzipora Halevi, Jim Lewis, Nasir D. Memon:
Phishing, Personality Traits and Facebook. CoRR abs/1301.7643 (2013) - 2012
- [j62]Efstratios Gavas, Nasir D. Memon, Douglas Britton:
Winning Cybersecurity One Challenge at a Time. IEEE Secur. Priv. 10(4): 75-79 (2012) - [j61]Sevinç Bayram, Hüsrev T. Sencar, Nasir D. Memon:
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization. IEEE Trans. Inf. Forensics Secur. 7(4): 1404-1413 (2012) - [c120]Napa Sae-Bae, Nasir D. Memon, Katherine Isbister:
Investigating multi-touch gestures as a novel biometric modality. BTAS 2012: 156-161 - [c119]Napa Sae-Bae, Kowsar Ahmed, Katherine Isbister, Nasir D. Memon:
Biometric-rich gestures: a novel approach to authentication on multi-touch devices. CHI 2012: 977-986 - [e5]Nasir D. Memon, Adnan M. Alattar, Edward J. Delp III:
Media Watermarking, Security, and Forensics 2012, Burlingame, CA, USA, January 22, 2012, Proceedings. SPIE Proceedings 8303, SPIE 2012, ISBN 978-0-8194-8950-0 [contents] - 2011
- [c118]Nasir D. Memon:
Photo Forensics - There Is More to a Picture than Meets the Eye. IWDW 2011: 2 - [c117]Liyun Li, Umut Topkara, Nasir D. Memon:
ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves. MLDM 2011: 60-74 - [e4]Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp III:
Media Forensics and Security III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings. SPIE Proceedings 7880, SPIE 2011, ISBN 978-0-8194-8417-8 [contents] - 2010
- [c116]Baris Coskun, Sven Dietrich, Nasir D. Memon:
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. ACSAC 2010: 131-140 - [c115]Baris Coskun, Nasir D. Memon:
Tracking encrypted VoIP calls via robust hashing of network flows. ICASSP 2010: 1818-1821 - [c114]Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon:
How to Measure Biometric Information? ICPR 2010: 1469-1472 - [c113]Sevinc Bayram, Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
An Ensemble of Classifiers Approach to Steganalysis. ICPR 2010: 4376-4379 - [c112]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Efficient techniques for sensor fingerprint matching in large image and video databases. Media Forensics and Security 2010: 754109 - [c111]Paul Giura, Nasir D. Memon:
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring. RAID 2010: 277-296 - [e3]Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp:
Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings. SPIE Proceedings 7541, SPIE 2010, ISBN 978-0-8194-7934-1 [contents]
2000 – 2009
- 2009
- [j60]Saraju P. Mohanty, Nasir D. Memon, Karam S. Chatha:
Circuits and systems for real-time security and copyright protection of multimedia. Comput. Electr. Eng. 35(2): 231-234 (2009) - [j59]Husrev T. Sencar, Nasir D. Memon:
Identification and recovery of JPEG files with missing fragments. Digit. Investig. 6(Supplement): S88-S98 (2009) - [j58]Sintayehu Dehnie, Nasir D. Memon:
Modeling Misbehavior in Cooperative Diversity: A Dynamic Game Approach. EURASIP J. Adv. Signal Process. 2009 (2009) - [j57]Michael A. Caloyannides, Nasir D. Memon, Wietse Z. Venema:
Digital Forensics. IEEE Secur. Priv. 7(2): 16-17 (2009) - [j56]Anandabrata Pal, Nasir D. Memon:
The evolution of file carving. IEEE Signal Process. Mag. 26(2): 59-71 (2009) - [j55]Nasir D. Memon:
Editorial. IEEE Trans. Inf. Forensics Secur. 4(1): 1 (2009) - [c110]Baris Coskun, Nasir D. Memon:
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. ACSAC 2009: 473-483 - [c109]Zhiyan Du, Pavel Jaromersky, Yi-Jen Chiang, Nasir D. Memon:
Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes. DCC 2009: 420-429 - [c108]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
An efficient and robust method for detecting copy-move forgery. ICASSP 2009: 1053-1056 - [c107]Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
Flatbed scanner identification based on dust and scratches over scanner platen. ICASSP 2009: 1385-1388 - [c106]Sintayehu Dehnie, Nasir D. Memon:
A dynamic game model for Amplify-and-Forward cooperative communications. ICASSP 2009: 3485-3488 - [c105]Liyun Li, Umut Topkara, Baris Coskun, Nasir D. Memon:
CoCoST: A Computational Cost Efficient Classifier. ICDM 2009: 268-277 - [c104]Ahmet Emir Dirik, Nasir D. Memon:
Image tamper detection based on demosaicing artifacts. ICIP 2009: 1497-1500 - [c103]Yanmei Fang, Ahmet Emir Dirik, Xiaoxi Sun, Nasir D. Memon:
Source class identification for DSLR and compact cameras. MMSP 2009: 1-5 - [e2]Edward J. Delp, Jana Dittmann, Nasir D. Memon, Ping Wah Wong:
Media Forensics and Security I, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings. SPIE Proceedings 7254, SPIE 2009, ISBN 978-0-8194-7504-6 [contents] - 2008
- [j54]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Classification of digital camera-models based on demosaicing artifacts. Digit. Investig. 5(1-2): 49-59 (2008) - [j53]Anandabrata Pal, Husrev T. Sencar, Nasir D. Memon:
Detecting file fragmentation point using sequential hypothesis testing. Digit. Investig. 5(Supplement): S2-S13 (2008) - [j52]Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon:
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust. IEEE Trans. Inf. Forensics Secur. 3(3): 539-552 (2008) - [c102]Sintayehu Dehnie, Nasir D. Memon:
Cooperative diversity with selfish users. CISS 2008: 1184-1188 - [c101]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Video copy detection based on source device characteristics: a complementary approach to content-based methods. Multimedia Information Retrieval 2008: 435-442 - [c100]Sintayehu Dehnie, Nasir D. Memon:
A Stochastic Model for Misbehaving Relays in Cooperative Diversity. WCNC 2008: 482-487 - [e1]Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008. SPIE Proceedings 6819, SPIE 2008, ISBN 978-0-8194-6991-5 [contents] - 2007
- [j51]Nasir D. Memon, Thomas Daniels:
Special issue on secure knowledge management. Inf. Syst. Frontiers 9(5): 449-450 (2007) - [j50]Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu:
Alphabet Partitioning Techniques for Semiadaptive Huffman Coding of Large Alphabets. IEEE Trans. Commun. 55(3): 436-443 (2007) - [j49]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
Protecting Biometric Templates With Sketch: Theory and Practice. IEEE Trans. Inf. Forensics Secur. 2(3-2): 503-512 (2007) - [j48]Husrev T. Sencar, Nasir D. Memon:
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. IEEE Trans. Inf. Forensics Secur. 2(4): 664-682 (2007) - [c99]Baris Coskun, Nasir D. Memon:
Efficient Detection of Delay-Constrained Relay Nodes. ACSAC 2007: 353-362 - [c98]Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon:
Detecting Malicious Behavior in Cooperative Diversity. CISS 2007: 895-899 - [c97]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
Secure Biometric Templates from Fingerprint-Face Features. CVPR 2007 - [c96]Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon:
Tamper Detection Based on Regularity of Wavelet Transform Coefficients. ICIP (1) 2007: 397-400 - [c95]Ahmet Emir Dirik, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
New Features to Identify Computer Generated Images. ICIP (4) 2007: 433-436 - [c94]Qiming Li, Nasir D. Memon:
Practical Security of Non-Invertiblewatermarking Schemes. ICIP (4) 2007: 445-448 - [c93]Yagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Improvements on Sensor Noise Based Source Camera Identification. ICME 2007: 24-27 - [c92]Ming Jiang, Edward K. Wong, Nasir D. Memon:
Robust Document Image Authentication. ICME 2007: 1131-1134 - [c91]Qiming Li, Nasir D. Memon:
Security Models of Digital Watermarking. MCAM 2007: 60-64 - [c90]Husrev T. Sencar, Qiming Li, Nasir D. Memon:
A new approach to countering ambiguity attacks. MM&Sec 2007: 205-214 - [c89]Ahmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget:
Modeling user choice in the PassPoints graphical password scheme. SOUPS 2007: 20-28 - [c88]Yagiz Sutcu, Qiming Li, Nasir D. Memon:
How to protect biometric templates. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650514 - 2006
- [j47]Hamza Özer, Bülent Sankur, Nasir D. Memon, Ismail Avcibas:
Detection of audio covert channels using statistical footprints of hidden messages. Digit. Signal Process. 16(4): 389-401 (2006) - [j46]Mahalingam Ramkumar, Nasir D. Memon:
Secure collaborations over message boards. Int. J. Secur. Networks 1(1/2): 113-124 (2006) - [j45]Sevinc Bayram, Ismail Avcibas, Bülent Sankur, Nasir D. Memon:
Image manipulation detection. J. Electronic Imaging 15(4): 041102 (2006) - [j44]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Performance study of common image steganography and steganalysis techniques. J. Electronic Imaging 15(4): 041104 (2006) - [j43]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. Trans. Data Hiding Multim. Secur. 1: 123-137 (2006) - [j42]Jean-Camille Birget, Dawei Hong, Nasir D. Memon:
Graphical passwords based on robust discretization. IEEE Trans. Inf. Forensics Secur. 1(3): 395-399 (2006) - [j41]Nasir D. Memon, Anindrabatha Pal:
Automated reassembly of file fragmented images using greedy algorithms. IEEE Trans. Image Process. 15(2): 385-393 (2006) - [j40]Baris Coskun, Bülent Sankur, Nasir D. Memon:
Spatio-Temporal Transform Based Video Hashing. IEEE Trans. Multim. 8(6): 1190-1208 (2006) - [c87]Qiming Li, Yagiz Sutcu, Nasir D. Memon:
Secure Sketch for Biometric Templates. ASIACRYPT 2006: 99-113 - [c86]Baris Coskun, Nasir D. Memon:
Confusion/Diffusion Capabilities of Some Robust Hash Functions. CISS 2006: 1188-1193 - [c85]Stanislav Nurilov, Kulesh Shanmugasundaram, Nasir D. Memon:
Protocol Masking to Evade Network Surveillance. CISS 2006: 1467-1472 - [c84]Mehdi Kharrazi, Husrev Taha Sencar, Nasir D. Memon:
Cover Selection for Steganographic Embedding. ICIP 2006: 117-120 - [c83]Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon:
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. ICIP 2006: 2313-2316 - [c82]Kulesh Shanmugasundaram, Nasir D. Memon:
Network Monitoring for Security and Forensics. ICISS 2006: 56-70 - [c81]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Identifying Digital Cameras Using CFA Interpolation. IFIP Int. Conf. Digital Forensics 2006: 289-299 - [c80]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Improving steganalysis by fusion techniques: a case study with image steganography. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607205 - [c79]Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu:
Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids. EuroVis 2006: 275-282 - 2005
- [j39]Hamza Özer, Bülent Sankur, Nasir D. Memon, Emin Anarim:
Perceptual Audio Hashing Functions. EURASIP J. Adv. Signal Process. 2005(12): 1780-1793 (2005) - [j38]Ismail Avcibas, Mehdi Kharrazi, Nasir D. Memon, Bülent Sankur:
Image Steganalysis with Binary Similarity Measures. EURASIP J. Adv. Signal Process. 2005(17): 2749-2757 (2005) - [j37]Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon:
PassPoints: Design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud. 63(1-2): 102-127 (2005) - [j36]Regunathan Radhakrishnan, Ziyou Xiong, Nasir D. Memon:
On the security of the visual hash function. J. Electronic Imaging 14(1): 013011 (2005) - [j35]Mahalingam Ramkumar, Nasir D. Memon:
An efficient key predistribution scheme for ad hoc network security. IEEE J. Sel. Areas Commun. 23(3): 611-621 (2005) - [j34]Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood:
A successively refinable lossless image-coding algorithm. IEEE Trans. Commun. 53(3): 445-452 (2005) - [j33]Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon:
SAFE-OPS: An approach to embedded software security. ACM Trans. Embed. Comput. Syst. 4(1): 189-210 (2005) - [j32]Regunathan Radhakrishnan, Mehdi Kharrazi, Nasir D. Memon:
Data Masking: A New Approach for Steganography? J. VLSI Signal Process. 41(3): 293-303 (2005) - [c78]Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu:
Optimized Prediction for Geometry Compression of Triangle Meshes. DCC 2005: 83-92 - [c77]Husrev T. Sencar, Nasir D. Memon:
Watermarking and ownership problem: a revisit. Digital Rights Management Workshop 2005: 93-101 - [c76]Sevinc Bayram, Ismail Avcibas, Bülent Sankur, Nasir D. Memon:
Image manipulation detection with Binary Similarity Measures. EUSIPCO 2005: 1-4 - [c75]Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu:
Geometry compression of tetrahedral meshes using optimized prediction. EUSIPCO 2005: 1-4 - [c74]Kyle Petrowski, Mehdi Kharrazi, Hüsrev T. Sencar, Nasir D. Memon:
PSteg: steganographic embedding through patching. ICASSP (2) 2005: 537-540 - [c73]Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu:
Steganalysis of halftone images. ICASSP (2) 2005: 793-796 - [c72]Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, Ismail Avcibas:
Source camera identification based on CFA interpolation. ICIP (3) 2005: 69-72 - [c71]Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon:
Integrating Digital Forensics in Network Infrastructures. IFIP Int. Conf. Digital Forensics 2005: 127-140 - [c70]Hamza Özer, Bülent Sankur, Nasir D. Memon:
An SVD-based audio watermarking technique. MM&Sec 2005: 51-56 - [c69]Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon:
A secure biometric authentication scheme based on robust hashing. MM&Sec 2005: 111-116 - [c68]Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu:
Steganalysis of Degraded Document Images. MMSP 2005: 1-4 - [c67]Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon:
Authentication using graphical passwords: effects of tolerance and image choice. SOUPS 2005: 1-12 - [c66]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Benchmarking steganographic and steganalysis techniques. Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263 - 2004
- [j31]Min Wu, Nasir D. Memon, Touradj Ebrahimi, Ingemar J. Cox:
Editorial. EURASIP J. Adv. Signal Process. 2004(14): 2077-2080 (2004) - [c65]Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon:
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. ACSAC 2004: 316-325 - [c64]Hervé Brönnimann, Nasir D. Memon, Kulesh Shanmugasundaram:
String Matching on the Internet. CAAN 2004: 75-89 - [c63]Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon:
Payload attribution via hierarchical bloom filters. CCS 2004: 31-41 - [c62]Hamza Özer, Bülent Sankur, Nasir D. Memon:
Robust audio hashing for audio identification. EUSIPCO 2004: 2091-2094 - [c61]Yeling Zhang, Mahalingam Ramkumar, Nasir D. Memon:
Information flow based routing algorithms for wireless sensor networks. GLOBECOM 2004: 742-747 - [c60]Mahalingam Ramkumar, Nasir D. Memon:
An efficient random key pre-distribution scheme. GLOBECOM 2004: 2218-2223 - [c59]Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu:
A simple technique for estimating message lengths for additive noise steganography. ICARCV 2004: 983-986 - [c58]Pavel Jaromersky, Xiaolin Wu, Yi-Jen Chiang, Nasir D. Memon:
Multiple-description geometry compression for networked interactive 3D graphics. ICIG 2004: 468-471 - [c57]Ming Jiang, Nasir D. Memon, Edward K. Wong, Xiaolin Wu:
Quantitative steganalysis of binary images. ICIP 2004: 29-32 - [c56]Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon:
Blind source camera identification. ICIP 2004: 709-712 - [c55]Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mahalingam Ramkumar, Bülent Sankur:
A classifier design for detecting Image manipulations. ICIP 2004: 2645-2648 - [c54]Mahalingam Ramkumar, Nasir D. Memon:
A system for digital rights management using key predistribution. ICME 2004: 431-434 - [c53]Ming Jiang, Xiaolin Wu, Edward K. Wong, Nasir D. Memon:
Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. ICME 2004: 883-886 - [i3]Mahalingam Ramkumar, Nasir D. Memon:
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. IACR Cryptol. ePrint Arch. 2004: 89 (2004) - 2003
- [j30]Gleb Naumovich, Nasir D. Memon:
Preventing Piracy, Reverse Engineering, and Tampering. Computer 36(7): 64-71 (2003) - [j29]Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon:
Editorial. Multim. Syst. 9(3): 215 (2003) - [j28]Sviatoslav Voloshynovskiy, Thierry Pun, Jessica J. Fridrich, Fernando Pérez-González, Nasir D. Memon:
Security of data hiding technologies. Signal Process. 83(10): 2065-2067 (2003) - [j27]Ping Wah Wong, Nasir D. Memon:
Image processing for halftones. IEEE Signal Process. Mag. 20(4): 59-70 (2003) - [j26]Ismail Avcibas, Nasir D. Memon, Bülent Sankur:
Steganalysis using image quality metrics. IEEE Trans. Image Process. 12(2): 221-229 (2003) - [j25]Ali N. Akansu, Edward J. Delp, Ton Kalker, Bede Liu, Nasir D. Memon, Pierre Moulin, Ahmed H. Tewfik:
Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery. IEEE Trans. Signal Process. 51(4): 897 (2003) - [j24]Rajarathnam Chandramouli, Nasir D. Memon:
On sequential watermark detection. IEEE Trans. Signal Process. 51(4): 1034-1044 (2003) - [c52]Kulesh Shanmugasundaram, Nasir D. Memon:
Automatic Reassembly of Document Fragments via Context Based Statistical Models. ACSAC 2003: 152-159 - [c51]Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu:
Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions. DCC 2003: 372-381 - [c50]Lee Butterman, Nasir D. Memon:
An Error-Resilient Blocksorting Compression Algorithm. DCC 2003: 417 - [c49]Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon:
Obfuscation of design intent in object-oriented applications. Digital Rights Management Workshop 2003: 142-153 - [c48]Anandabrata Pal, Kulesh Shanmugasundaram, Nasir D. Memon:
Automated reassembly of fragmented images. ICASSP (4) 2003: 732-735 - [c47]Anubhav Savant, Nasir D. Memon, Torsten Suel:
On the scalability of an image transcoding proxy server. ICIP (1) 2003: 209-212 - [c46]Anandabrata Pal, Kulesh Shanmugasundaram, Nasir D. Memon:
Automated reassembly of fragmented images. ICME 2003: 625-628 - [c45]Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich:
Design of a Laboratory for Information Security Education. World Conference on Information Security Education 2003: 61-73 - [c44]Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon:
Image Steganography and Steganalysis: Concepts and Practice. IWDW 2003: 35-49 - [c43]Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann:
ForNet: A Distributed Forensics Network. MMM-ACNS 2003: 1-16 - [c42]Hamza Özer, Ismail Avcibas, Bülent Sankur, Nasir D. Memon:
Steganalysis of audio based on audio quality metrics. Security and Watermarking of Multimedia Contents 2003: 55-66 - [c41]Rajarathnam Chandramouli, Nasir D. Memon:
Steganography capacity: a steganalysis perspective. Security and Watermarking of Multimedia Contents 2003: 173-177 - [c40]Regunathan Radhakrishnan, Ziyou Xiong, Nasir D. Memon:
Security of visual hash function. Security and Watermarking of Multimedia Contents 2003: 644-652 - [i2]Jean-Camille Birget, Dawei Hong, Nasir D. Memon:
Robust discretization, with an application to graphical passwords. IACR Cryptol. ePrint Arch. 2003: 168 (2003) - [i1]Mahalingam Ramkumar, Nasir D. Memon:
HARPS: HAshed Random Preloaded Subset Key Distribution. IACR Cryptol. ePrint Arch. 2003: 170 (2003) - 2002
- [j23]Jessica J. Fridrich, Miroslav Goljan, Nasir D. Memon:
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique. J. Electronic Imaging 11(2): 262-274 (2002) - [j22]Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood:
A progressive Lossless/Near-Lossless image compression algorithm. IEEE Signal Process. Lett. 9(10): 312-314 (2002) - [j21]Regunathan Radhakrishnan, Nasir D. Memon:
On the security of the digest function in the SARI image authentication system. IEEE Trans. Circuits Syst. Video Technol. 12(11): 1030-1033 (2002) - [c39]Regunathan Radhakrishnan, Kulesh Shanmugasundaram, Nasir D. Memon:
Data masking: a secure-covert channel paradigm. IEEE Workshop on Multimedia Signal Processing 2002: 339-342 - [c38]Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon:
On steganalysis of random LSB embedding in continuous-tone images. ICIP (3) 2002: 641-644 - [c37]Ismail Avcibas, Nasir D. Memon, Bülent Sankur:
Image steganalysis with binary similarity measures. ICIP (3) 2002: 645-648 - [c36]Rajarathnam Chandramouli, Grace Li, Nasir D. Memon:
Adaptive steganography. Security and Watermarking of Multimedia Contents 2002: 69-78 - [c35]Regunathan Radhakrishnan, Nasir D. Memon:
Audio content authentication based on psycho-acoustic model. Security and Watermarking of Multimedia Contents 2002: 110-117 - [c34]Zan Ouyang, Nasir D. Memon, Torsten Suel, Dimitre Trendafilov:
Cluster-Based Delta Compression of a Collection of Files. WISE 2002: 257-268 - 2001
- [j20]K. Gopalakrishnan, Nasir D. Memon, Poorvi L. Vora:
Protocols for Watermark Verification. IEEE Multim. 8(4): 66-70 (2001) - [j19]Nasir D. Memon, Ping Wah Wong:
A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10(4): 643-649 (2001) - [j18]Ping Wah Wong, Nasir D. Memon:
Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10): 1593-1601 (2001) - [c33]Lee Butterman, Nasir D. Memon:
Error-Resilient Block Sorting. Data Compression Conference 2001: 487 - [c32]Zan Ouyang, Nasir D. Memon, Torsten Suel:
Delta Encoding of Related Web Pages. Data Compression Conference 2001: 507 - [c31]Debargha Mukherjee, Nasir D. Memon, Amir Said:
JPEG-matched MRC compression of compound documents. ICIP (3) 2001: 434-437 - [c30]Regunathan Radhakrishnan, Nasir D. Memon:
On the security of the SARI image authentication system. ICIP (3) 2001: 971-974 - [c29]Rajarathnam Chandramouli, Nasir D. Memon:
Analysis of LSB based image steganography techniques. ICIP (3) 2001: 1019-1022 - [c28]Ismail Avcibas, Nasir D. Memon, Bülent Sankur:
Steganalysis based on image quality metrics. MMSP 2001: 517-522 - [c27]Qian G. Mei, Edward K. Wong, Nasir D. Memon:
Data hiding in binary text documents. Security and Watermarking of Multimedia Contents 2001: 369-375 - [c26]Ismail Avcibas, Nasir D. Memon, Bülent Sankur:
Steganalysis of watermarking techniques using image quality metrics. Security and Watermarking of Multimedia Contents 2001: 523-531 - [c25]Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood:
Lossless and near-lossless image compression with successive refinement. VCIP 2001: 41-52 - 2000
- [j17]Matthew J. Holliman, Nasir D. Memon:
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3): 432-441 (2000) - [j16]Xiaolin Wu, Nasir D. Memon:
Context-based lossless interband compression-extending CALIC. IEEE Trans. Image Process. 9(6): 994-1001 (2000) - [j15]Nasir D. Memon, David L. Neuhoff, Sunil M. Shende:
An analysis of some common scanning techniques for lossless image coding. IEEE Trans. Image Process. 9(11): 1837-1848 (2000) - [c24]Nasir D. Memon, David L. Neuhoff, Sunil M. Shende:
Optimizing Prediction Gain in Symmetric Axial Scans. ICIP 2000: 932-935 - [c23]Rajarathnam Chandramouli, Nasir D. Memon:
How Many Pixels to Watermark? ITCC 2000: 11-15 - [c22]Rajarathnam Chandramouli, Nasir D. Memon:
A distributed detection framework for Steganalysis. ACM Multimedia Workshops 2000: 123-126 - [c21]Nasir D. Memon, Poorvi L. Vora, Boon-Lock Yeo, Minerva M. Yeung:
Distortion-bounded authentication techniques. Security and Watermarking of Multimedia Contents 2000: 164-175 - [c20]Ping Wah Wong, Nasir D. Memon:
Secret and public key authentication watermarking schemes that resist vector quantization attack. Security and Watermarking of Multimedia Contents 2000: 417-427 - [c19]Jessica J. Fridrich, Miroslav Goljan, Nasir D. Memon:
Further attacks on Yeung-Mintzer fragile watermarking scheme. Security and Watermarking of Multimedia Contents 2000: 428-437
1990 – 1999
- 1999
- [j14]Nasir D. Memon, Xuan Kong, Judit Cinkler:
Context-based lossless and near-lossless compression of EEG signals. IEEE Trans. Inf. Technol. Biomed. 3(3): 231-238 (1999) - [c18]Nasir D. Memon, Sunil M. Shende, Ping Wah Wong:
On the Security of the Yeung Mintzer Authentication Watermark. PICS 1999: 301-306 - [c17]Matthew J. Holliman, Nasir D. Memon, Minerva M. Yeung:
Watermark extimation through local pixel correlation. Security and Watermarking of Multimedia Contents 1999: 134-146 - [c16]Nasir D. Memon, Ping Wah Wong:
Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System. Security and Watermarking of Multimedia Contents 1999: 289-295 - 1998
- [j13]Nasir D. Memon, Ping Wah Wong:
Protecting Digital Media Content. Commun. ACM 41(7): 34-43 (1998) - [j12]Rashid Ansari, Nasir D. Memon, Ersan Ceran:
Near-lossless image compression techniques. J. Electronic Imaging 7(3): 486-494 (1998) - [j11]Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Sel. Areas Commun. 16(4): 573-586 (1998) - [j10]Nasir D. Memon:
A 2-D vector excitation coding technique. Signal Process. 67(2): 163-172 (1998) - [c15]Xiaolin Wu, Wai Kin Choi, Nasir D. Memon:
Lossless Interframe Image Compression via Context Modeling. Data Compression Conference 1998: 378-387 - [c14]Nasir D. Memon, David L. Neuhoff, Sunil M. Shende:
On Scanning Techniques for Lossless Image Coding with Limited Context Supports. ICIP (1) 1998: 503-507 - [c13]Nasir D. Memon:
Adaptive Coding of DCT Coefficients by Golomb-Rice Codes. ICIP (1) 1998: 516-520 - [c12]Nasir D. Memon, Xiaolin Wu, Boon-Lock Yeo:
Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms. ICIP (3) 1998: 891-895 - [c11]Nasir D. Memon, Ping Wah Wong:
A buyer-seller watermarking protocol. MMSP 1998: 291-296 - [c10]Matthew J. Holliman, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
Adaptive Public Watermarking of DCT-Based Compressed Images. Storage and Retrieval for Image and Video Databases (SPIE) 1998: 284-295 - 1997
- [j9]Nasir D. Memon, Xiaolin Wu:
Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression. Comput. J. 40(2/3): 127-136 (1997) - [j8]Xiaolin Wu, Nasir D. Memon:
Context-based, adaptive, lossless image coding. IEEE Trans. Commun. 45(4): 437-444 (1997) - [c9]Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
On the Invertibility of Invisible Watermarking Techniques. ICIP (1) 1997: 540-543 - [c8]Nasir D. Memon, Nader Moayeri:
A new error criterion for near-lossless image compression. ICIP (3) 1997: 662-665 - [c7]Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung:
Can Invisible Watermarks Resolve Rightful Ownerships? Storage and Retrieval for Image and Video Databases (SPIE) 1997: 310-321 - 1996
- [j7]Nasir D. Memon, Khalid Sayood:
Lossless compression of video sequences. IEEE Trans. Commun. 44(10): 1340-1345 (1996) - [j6]Nasir D. Memon, Khalid Sayood:
Scan predictive vector quantization of multispectral images. IEEE Trans. Image Process. 5(2): 330-337 (1996) - [j5]Nasir D. Memon, Ayalur Venkateswaran:
On ordering color maps for lossless predictive coding. IEEE Trans. Image Process. 5(11): 1522-1527 (1996) - [c6]Xiaolin Wu, Nasir D. Memon:
CALIC-a context based adaptive lossless image codec. ICASSP 1996: 1890-1893 - 1995
- [j4]Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras:
Lossless Image Compression with a Codebook of Block Scans. IEEE J. Sel. Areas Commun. 13(1): 24-30 (1995) - [c5]Nasir D. Memon, Khalid Sayood:
An asymmetric lossless image compression technique. ICIP (3) 1995: 97-100 - 1994
- [j3]Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras:
Lossless compression of multispectral image data. IEEE Trans. Geosci. Remote. Sens. 32(2): 282-289 (1994) - [c4]Nasir D. Memon, Sibabrata Ray, Khalid Sayood:
Differential Lossless Encoding of Images Using Non-linear Predictive Techniques. ICIP (3) 1994: 841-845 - 1993
- [j2]Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras:
Simple method for enhancing the performance of lossy plus lossless image compression schemes. J. Electronic Imaging 2(3): 245-252 (1993) - 1992
- [j1]Spyros S. Magliveras, Nasir D. Memon:
Algebraic Properties of Cryptosystem PGM. J. Cryptol. 5(3): 167-183 (1992) - 1991
- [c3]Nasir D. Memon, Spyros S. Magliveras, Khalid Sayood:
Prediction Trees and Lossless Image Compression: An Extended Abstract. Data Compression Conference 1991: 83-92
1980 – 1989
- 1989
- [c2]Spyros S. Magliveras, Nasir D. Memon:
Properties of Cryptosystem PGM. CRYPTO 1989: 447-460 - [c1]Spyros S. Magliveras, Nasir D. Memon:
Random Permutations from Logarithmic Signatures. Great Lakes Computer Science Conference 1989: 199-205
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint