2008 |
105 | EE | Sintayehu Dehnie,
Nasir D. Memon:
Cooperative diversity with selfish users.
CISS 2008: 1184-1188 |
104 | EE | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Video copy detection based on source device characteristics: a complementary approach to content-based methods.
Multimedia Information Retrieval 2008: 435-442 |
103 | EE | Sintayehu Dehnie,
Nasir D. Memon:
A Stochastic Model for Misbehaving Relays in Cooperative Diversity.
WCNC 2008: 482-487 |
102 | EE | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Classification of digital camera-models based on demosaicing artifacts.
Digital Investigation 5(1-2): 49-59 (2008) |
101 | EE | Ahmet Emir Dirik,
Husrev T. Sencar,
Nasir D. Memon:
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust.
IEEE Transactions on Information Forensics and Security 3(3): 539-552 (2008) |
2007 |
100 | EE | Baris Coskun,
Nasir D. Memon:
Efficient Detection of Delay-Constrained Relay Nodes.
ACSAC 2007: 353-362 |
99 | EE | Sintayehu Dehnie,
Husrev T. Sencar,
Nasir D. Memon:
Detecting Malicious Behavior in Cooperative Diversity.
CISS 2007: 895-899 |
98 | EE | Yagiz Sutcu,
Qiming Li,
Nasir D. Memon:
Secure Biometric Templates from Fingerprint-Face Features.
CVPR 2007 |
97 | EE | Yagiz Sutcu,
Baris Coskun,
Husrev T. Sencar,
Nasir D. Memon:
Tamper Detection Based on Regularity of Wavelet Transform Coefficients.
ICIP (1) 2007: 397-400 |
96 | EE | Ahmet Emir Dirik,
Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
New Features to Identify Computer Generated Images.
ICIP (4) 2007: 433-436 |
95 | EE | Qiming Li,
Nasir D. Memon:
Practical Security of Non-Invertiblewatermarking Schemes.
ICIP (4) 2007: 445-448 |
94 | EE | Ming Jiang,
Edward K. Wong,
Nasir D. Memon:
Robust Document Image Authentication.
ICME 2007: 1131-1134 |
93 | EE | Yagiz Sutcu,
Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Improvements on Sensor Noise Based Source Camera Identification.
ICME 2007: 24-27 |
92 | EE | Qiming Li,
Nasir D. Memon:
Security Models of Digital Watermarking.
MCAM 2007: 60-64 |
91 | EE | Husrev T. Sencar,
Qiming Li,
Nasir D. Memon:
A new approach to countering ambiguity attacks.
MM&Sec 2007: 205-214 |
90 | EE | Ahmet Emir Dirik,
Nasir D. Memon,
Jean-Camille Birget:
Modeling user choice in the PassPoints graphical password scheme.
SOUPS 2007: 20-28 |
89 | EE | Dan Chen,
Yi-Jen Chiang,
Nasir D. Memon,
Xiaolin Wu:
Alphabet Partitioning Techniques for Semiadaptive Huffman Coding of Large Alphabets.
IEEE Transactions on Communications 55(3): 436-443 (2007) |
88 | EE | Yagiz Sutcu,
Qiming Li,
Nasir D. Memon:
Protecting Biometric Templates With Sketch: Theory and Practice.
IEEE Transactions on Information Forensics and Security 2(3-2): 503-512 (2007) |
87 | EE | Husrev T. Sencar,
Nasir D. Memon:
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks.
IEEE Transactions on Information Forensics and Security 2(4): 664-682 (2007) |
86 | EE | Nasir D. Memon,
Thomas Daniels:
Special issue on secure knowledge management.
Information Systems Frontiers 9(5): 449-450 (2007) |
2006 |
85 | EE | Qiming Li,
Yagiz Sutcu,
Nasir D. Memon:
Secure Sketch for Biometric Templates.
ASIACRYPT 2006: 99-113 |
84 | EE | Dan Chen,
Yi-Jen Chiang,
Nasir D. Memon,
Xiaolin Wu:
Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids.
EuroVis 2006: 275-282 |
83 | EE | Mehdi Kharrazi,
Taha Taha Sencar,
Nasir D. Memon:
Cover Selection for Steganographic Embedding.
ICIP 2006: 117-120 |
82 | EE | Sintayehu Dehnie,
Husrev T. Sencar,
Nasir D. Memon:
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images.
ICIP 2006: 2313-2316 |
81 | EE | Kulesh Shanmugasundaram,
Nasir D. Memon:
Network Monitoring for Security and Forensics.
ICISS 2006: 56-70 |
80 | | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon:
Identifying Digital Cameras Using CFA Interpolation.
IFIP Int. Conf. Digital Forensics 2006: 289-299 |
79 | EE | Hamza Özer,
Bülent Sankur,
Nasir D. Memon,
Ismail Avcibas:
Detection of audio covert channels using statistical footprints of hidden messages.
Digital Signal Processing 16(4): 389-401 (2006) |
78 | EE | Nasir D. Memon,
Anindrabatha Pal:
Automated reassembly of file fragmented images using greedy algorithms.
IEEE Transactions on Image Processing 15(2): 385-393 (2006) |
77 | EE | Jean-Camille Birget,
Dawei Hong,
Nasir D. Memon:
Graphical passwords based on robust discretization.
IEEE Transactions on Information Forensics and Security 1(3): 395-399 (2006) |
76 | EE | Baris Coskun,
Bülent Sankur,
Nasir D. Memon:
Spatio-Temporal Transform Based Video Hashing.
IEEE Transactions on Multimedia 8(6): 1190-1208 (2006) |
75 | EE | Mahalingam Ramkumar,
Nasir D. Memon:
Secure collaborations over message boards.
IJSN 1(1/2): 113-124 (2006) |
74 | EE | Mehdi Kharrazi,
Husrev T. Sencar,
Nasir D. Memon:
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography.
T. Data Hiding and Multimedia Security: 123-137 (2006) |
2005 |
73 | EE | Dan Chen,
Yi-Jen Chiang,
Nasir D. Memon,
Xiaolin Wu:
Optimized Prediction for Geometry Compression of Triangle Meshes.
DCC 2005: 83-92 |
72 | EE | Husrev T. Sencar,
Nasir D. Memon:
Watermarking and ownership problem: a revisit.
Digital Rights Management Workshop 2005: 93-101 |
71 | EE | Sevinc Bayram,
Husrev T. Sencar,
Nasir D. Memon,
Ismail Avcibas:
Source camera identification based on CFA interpolation.
ICIP (3) 2005: 69-72 |
70 | | Kulesh Shanmugasundaram,
Hervé Brönnimann,
Nasir D. Memon:
Integrating Digital Forensics in Network Infrastructures.
IFIP Int. Conf. Digital Forensics 2005: 127-140 |
69 | EE | Yagiz Sutcu,
Husrev T. Sencar,
Nasir D. Memon:
A secure biometric authentication scheme based on robust hashing.
MM&Sec 2005: 111-116 |
68 | EE | Hamza Özer,
Bülent Sankur,
Nasir D. Memon:
An SVD-based audio watermarking technique.
MM&Sec 2005: 51-56 |
67 | EE | Susan Wiedenbeck,
Jim Waters,
Jean-Camille Birget,
Alex Brodskiy,
Nasir D. Memon:
Authentication using graphical passwords: effects of tolerance and image choice.
SOUPS 2005: 1-12 |
66 | | Mehdi Kharrazi,
Husrev T. Sencar,
Nasir D. Memon:
Benchmarking steganographic and steganalysis techniques.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263 |
65 | EE | Joseph Zambreno,
Alok N. Choudhary,
Rahul Simha,
Bhagirath Narahari,
Nasir D. Memon:
SAFE-OPS: An approach to embedded software security.
ACM Trans. Embedded Comput. Syst. 4(1): 189-210 (2005) |
64 | EE | Mahalingam Ramkumar,
Nasir D. Memon:
An efficient key predistribution scheme for ad hoc network security.
IEEE Journal on Selected Areas in Communications 23(3): 611-621 (2005) |
63 | EE | Ismail Avcibas,
Nasir D. Memon,
Bülent Sankur,
Khalid Sayood:
A successively refinable lossless image-coding algorithm.
IEEE Transactions on Communications 53(3): 445-452 (2005) |
62 | EE | Susan Wiedenbeck,
Jim Waters,
Jean-Camille Birget,
Alex Brodskiy,
Nasir D. Memon:
PassPoints: Design and longitudinal evaluation of a graphical password system.
International Journal of Man-Machine Studies 63(1-2): 102-127 (2005) |
61 | EE | Regunathan Radhakrishnan,
Mehdi Kharrazi,
Nasir D. Memon:
Data Masking: A New Approach for Steganography?
VLSI Signal Processing 41(3): 293-303 (2005) |
2004 |
60 | EE | Kulesh Shanmugasundaram,
Hervé Brönnimann,
Nasir D. Memon:
Payload attribution via hierarchical bloom filters.
ACM Conference on Computer and Communications Security 2004: 31-41 |
59 | EE | Kulesh Shanmugasundaram,
Mehdi Kharrazi,
Nasir D. Memon:
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type.
ACSAC 2004: 316-325 |
58 | EE | Hervé Brönnimann,
Nasir D. Memon,
Kulesh Shanmugasundaram:
String Matching on the Internet.
CAAN 2004: 75-89 |
57 | EE | Ming Jiang,
Edward K. Wong,
Nasir D. Memon,
Xiaolin Wu:
A simple technique for estimating message lengths for additive noise steganography.
ICARCV 2004: 983-986 |
56 | | Ismail Avcibas,
Sevinc Bayram,
Nasir D. Memon,
Mahalingam Ramkumar,
Bülent Sankur:
A classifier design for detecting Image manipulations.
ICIP 2004: 2645-2648 |
55 | EE | Ming Jiang,
Nasir D. Memon,
Edward K. Wong,
Xiaolin Wu:
Quantitative steganalysis of binary images.
ICIP 2004: 29-32 |
54 | EE | Mehdi Kharrazi,
Husrev T. Sencar,
Nasir D. Memon:
Blind source camera identification.
ICIP 2004: 709-712 |
53 | | Mahalingam Ramkumar,
Nasir D. Memon:
A system for digital rights management using key predistribution.
ICME 2004: 431-434 |
52 | | Ming Jiang,
Xiaolin Wu,
Edward K. Wong,
Nasir D. Memon:
Steganalysis of boundary-based steganography using autoregressive model of digital boundaries.
ICME 2004: 883-886 |
2003 |
51 | EE | Kulesh Shanmugasundaram,
Nasir D. Memon:
Automatic Reassembly of Document Fragments via Context Based Statistical Models.
ACSAC 2003: 152-159 |
50 | EE | Dan Chen,
Yi-Jen Chiang,
Nasir D. Memon,
Xiaolin Wu:
Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions.
DCC 2003: 372-381 |
49 | EE | Lee Butterman,
Nasir D. Memon:
An Error-Resilient Blocksorting Compression Algorithm.
DCC 2003: 417 |
48 | EE | Mikhail Sosonkin,
Gleb Naumovich,
Nasir D. Memon:
Obfuscation of design intent in object-oriented applications.
Digital Rights Management Workshop 2003: 142-153 |
47 | | Anubhav Savant,
Nasir D. Memon,
Torsten Suel:
On the scalability of an image transcoding proxy server.
ICIP (1) 2003: 209-212 |
46 | EE | Rajarathnam Chandramouli,
Mehdi Kharrazi,
Nasir D. Memon:
Image Steganography and Steganalysis: Concepts and Practice.
IWDW 2003: 35-49 |
45 | EE | Kulesh Shanmugasundaram,
Nasir D. Memon,
Anubhav Savant,
Hervé Brönnimann:
ForNet: A Distributed Forensics Network.
MMM-ACNS 2003: 1-16 |
44 | | Vikram Anantapadmanabhan,
Phyllis G. Frankl,
Nasir D. Memon,
Gleb Naumovich:
Design of a Laboratory for Information Security Education.
World Conference on Information Security Education 2003: 61-73 |
43 | EE | Gleb Naumovich,
Nasir D. Memon:
Preventing Piracy, Reverse Engineering, and Tampering.
IEEE Computer 36(7): 64-71 (2003) |
42 | EE | Ismail Avcibas,
Nasir D. Memon,
Bülent Sankur:
Steganalysis using image quality metrics.
IEEE Transactions on Image Processing 12(2): 221-229 (2003) |
41 | EE | Jana Dittmann,
Stefan Katzenbeisser,
Nasir D. Memon:
Editorial.
Multimedia Syst. 9(3): 215 (2003) |
2002 |
40 | | Sorina Dumitrescu,
Xiaolin Wu,
Nasir D. Memon:
On steganalysis of random LSB embedding in continuous-tone images.
ICIP (3) 2002: 641-644 |
39 | | Ismail Avcibas,
Nasir D. Memon,
Bülent Sankur:
Image steganalysis with binary similarity measures.
ICIP (3) 2002: 645-648 |
38 | | Regunathan Radhakrishnan,
Kulesh Shanmugasundaram,
Nasir D. Memon:
Data masking: a secure-covert channel paradigm.
IEEE Workshop on Multimedia Signal Processing 2002: 339-342 |
37 | EE | Zan Ouyang,
Nasir D. Memon,
Torsten Suel,
Dimitre Trendafilov:
Cluster-Based Delta Compression of a Collection of Files.
WISE 2002: 257-268 |
36 | | Regunathan Radhakrishnan,
Nasir D. Memon:
On the security of the digest function in the SARI image authentication system.
IEEE Trans. Circuits Syst. Video Techn. 12(11): 1030- (2002) |
2001 |
35 | EE | Lee Butterman,
Nasir D. Memon:
Error-Resilient Block Sorting.
Data Compression Conference 2001: 487 |
34 | EE | Zan Ouyang,
Nasir D. Memon,
Torsten Suel:
Delta Encoding of Related Web Pages.
Data Compression Conference 2001: 507 |
33 | EE | Rajarathnam Chandramouli,
Nasir D. Memon:
Analysis of LSB based image steganography techniques.
ICIP (3) 2001: 1019-1022 |
32 | EE | Debargha Mukherjee,
Nasir D. Memon,
Amir Said:
JPEG-matched MRC compression of compound documents.
ICIP (3) 2001: 434-437 |
31 | EE | Regunathan Radhakrishnan,
Nasir D. Memon:
On the security of the SARI image authentication system.
ICIP (3) 2001: 971-974 |
30 | | Ismail Avcibas,
Nasir D. Memon,
Bülent Sankur,
Khalid Sayood:
Lossless and near-lossless image compression with successive refinement.
VCIP 2001: 41-52 |
29 | EE | K. Gopalakrishnan,
Nasir D. Memon,
Poorvi L. Vora:
Protocols for Watermark Verification.
IEEE MultiMedia 8(4): 66-70 (2001) |
28 | EE | Ping Wah Wong,
Nasir D. Memon:
Secret and public key image watermarking schemes for image authentication and ownership verification.
IEEE Transactions on Image Processing 10(10): 1593-1601 (2001) |
27 | EE | Nasir D. Memon,
Ping Wah Wong:
A buyer-seller watermarking protocol.
IEEE Transactions on Image Processing 10(4): 643-649 (2001) |
2000 |
26 | EE | Rajarathnam Chandramouli,
Nasir D. Memon:
A distributed detection framework for Steganalysis.
ACM Multimedia Workshops 2000: 123-126 |
25 | | Nasir D. Memon,
David L. Neuhoff,
Sunil M. Shende:
Optimizing Prediction Gain in Symmetric Axial Scans.
ICIP 2000 |
24 | EE | Rajarathnam Chandramouli,
Nasir D. Memon:
How Many Pixels to Watermark?
ITCC 2000: 11-15 |
23 | EE | Nasir D. Memon,
David L. Neuhoff,
Sunil M. Shende:
An analysis of some common scanning techniques for lossless image coding.
IEEE Transactions on Image Processing 9(11): 1837-1848 (2000) |
22 | EE | Matthew J. Holliman,
Nasir D. Memon:
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.
IEEE Transactions on Image Processing 9(3): 432-441 (2000) |
21 | EE | Xiaolin Wu,
Nasir D. Memon:
Context-based lossless interband compression-extending CALIC.
IEEE Transactions on Image Processing 9(6): 994-1001 (2000) |
1999 |
20 | | Nasir D. Memon,
Sunil M. Shende,
Ping Wah Wong:
On the Security of the Yeung Mintzer Authentication Watermark.
PICS 1999: 301-306 |
19 | | Nasir D. Memon,
Xuan Kong,
J. Cinkler:
Context-based lossless and near-lossless compression of EEG signals.
IEEE Transactions on Information Technology in Biomedicine 3(3): 231-238 (1999) |
1998 |
18 | EE | Xiaolin Wu,
Wai Kin Choi,
Nasir D. Memon:
Lossless Interframe Image Compression via Context Modeling.
Data Compression Conference 1998: 378-387 |
17 | | Nasir D. Memon,
David L. Neuhoff,
Sunil M. Shende:
On Scanning Techniques for Lossless Image Coding with Limited Context Supports.
ICIP (1) 1998: 503-507 |
16 | | Nasir D. Memon:
Adaptive Coding of DCT Coefficients by Golomb-Rice Codes.
ICIP (1) 1998: 516-520 |
15 | | Nasir D. Memon,
Xiaolin Wu,
Boon-Lock Yeo:
Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms.
ICIP (3) 1998: 891-895 |
14 | | Matthew J. Holliman,
Nasir D. Memon,
Boon-Lock Yeo,
Minerva M. Yeung:
Adaptive Public Watermarking of DCT-Based Compressed Images.
Storage and Retrieval for Image and Video Databases (SPIE) 1998: 284-295 |
13 | EE | Nasir D. Memon,
Ping Wah Wong:
Protecting Digital Media Content.
Commun. ACM 41(7): 34-43 (1998) |
1997 |
12 | EE | S. Carver,
Nasir D. Memon,
Boon-Lock Yeo,
Minerva M. Yeung:
On the Invertibility of Invisible Watermarking Techniques.
ICIP (1) 1997: 540-543 |
11 | EE | Nasir D. Memon,
Nader Moayeri:
A new error criterion for near-lossless image compression.
ICIP (3) 1997: 662 |
10 | | Scott Craver,
Nasir D. Memon,
Boon-Lock Yeo,
Minerva M. Yeung:
Can Invisible Watermarks Resolve Rightful Ownerships?
Storage and Retrieval for Image and Video Databases (SPIE) 1997: 310-321 |
9 | | Nasir D. Memon,
Xiaolin Wu:
Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression.
Comput. J. 40(2/3): 127-136 (1997) |
1996 |
8 | EE | Nasir D. Memon,
Ayalur Venkateswaran:
On ordering color maps for lossless predictive coding.
IEEE Transactions on Image Processing 5(11): 1522-1527 (1996) |
7 | EE | Nasir D. Memon,
Khalid Sayood:
Scan predictive vector quantization of multispectral images.
IEEE Transactions on Image Processing 5(2): 330-337 (1996) |
1995 |
6 | | Nasir D. Memon,
Khalid Sayood,
Spyros S. Magliveras:
Lossless Image Compression with a Codebook of Block Scans.
IEEE Journal on Selected Areas in Communications 13(1): 24-30 (1995) |
1994 |
5 | | Nasir D. Memon,
Sibabrata Ray,
Khalid Sayood:
Differential Lossless Encoding of Images Using Non-linear Predictive Techniques.
ICIP (3) 1994: 841-845 |
1992 |
4 | | Spyros S. Magliveras,
Nasir D. Memon:
Algebraic Properties of Cryptosystem PGM.
J. Cryptology 5(3): 167-183 (1992) |
1991 |
3 | | Nasir D. Memon,
Spyros S. Magliveras,
Khalid Sayood:
Prediction Trees and Lossless Image Compression: An Extended Abstract.
Data Compression Conference 1991: 83-92 |
1989 |
2 | EE | Spyros S. Magliveras,
Nasir D. Memon:
Properties of Cryptosystem PGM.
CRYPTO 1989: 447-460 |
1 | | Spyros S. Magliveras,
Nasir D. Memon:
Random Permutations from Logarithmic Signatures.
Great Lakes Computer Science Conference 1989: 199-205 |