2008 | ||
---|---|---|
105 | EE | Sintayehu Dehnie, Nasir D. Memon: Cooperative diversity with selfish users. CISS 2008: 1184-1188 |
104 | EE | Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Video copy detection based on source device characteristics: a complementary approach to content-based methods. Multimedia Information Retrieval 2008: 435-442 |
103 | EE | Sintayehu Dehnie, Nasir D. Memon: A Stochastic Model for Misbehaving Relays in Cooperative Diversity. WCNC 2008: 482-487 |
102 | EE | Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Classification of digital camera-models based on demosaicing artifacts. Digital Investigation 5(1-2): 49-59 (2008) |
101 | EE | Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon: Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust. IEEE Transactions on Information Forensics and Security 3(3): 539-552 (2008) |
2007 | ||
100 | EE | Baris Coskun, Nasir D. Memon: Efficient Detection of Delay-Constrained Relay Nodes. ACSAC 2007: 353-362 |
99 | EE | Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon: Detecting Malicious Behavior in Cooperative Diversity. CISS 2007: 895-899 |
98 | EE | Yagiz Sutcu, Qiming Li, Nasir D. Memon: Secure Biometric Templates from Fingerprint-Face Features. CVPR 2007 |
97 | EE | Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon: Tamper Detection Based on Regularity of Wavelet Transform Coefficients. ICIP (1) 2007: 397-400 |
96 | EE | Ahmet Emir Dirik, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: New Features to Identify Computer Generated Images. ICIP (4) 2007: 433-436 |
95 | EE | Qiming Li, Nasir D. Memon: Practical Security of Non-Invertiblewatermarking Schemes. ICIP (4) 2007: 445-448 |
94 | EE | Ming Jiang, Edward K. Wong, Nasir D. Memon: Robust Document Image Authentication. ICME 2007: 1131-1134 |
93 | EE | Yagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Improvements on Sensor Noise Based Source Camera Identification. ICME 2007: 24-27 |
92 | EE | Qiming Li, Nasir D. Memon: Security Models of Digital Watermarking. MCAM 2007: 60-64 |
91 | EE | Husrev T. Sencar, Qiming Li, Nasir D. Memon: A new approach to countering ambiguity attacks. MM&Sec 2007: 205-214 |
90 | EE | Ahmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget: Modeling user choice in the PassPoints graphical password scheme. SOUPS 2007: 20-28 |
89 | EE | Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Alphabet Partitioning Techniques for Semiadaptive Huffman Coding of Large Alphabets. IEEE Transactions on Communications 55(3): 436-443 (2007) |
88 | EE | Yagiz Sutcu, Qiming Li, Nasir D. Memon: Protecting Biometric Templates With Sketch: Theory and Practice. IEEE Transactions on Information Forensics and Security 2(3-2): 503-512 (2007) |
87 | EE | Husrev T. Sencar, Nasir D. Memon: Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. IEEE Transactions on Information Forensics and Security 2(4): 664-682 (2007) |
86 | EE | Nasir D. Memon, Thomas Daniels: Special issue on secure knowledge management. Information Systems Frontiers 9(5): 449-450 (2007) |
2006 | ||
85 | EE | Qiming Li, Yagiz Sutcu, Nasir D. Memon: Secure Sketch for Biometric Templates. ASIACRYPT 2006: 99-113 |
84 | EE | Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids. EuroVis 2006: 275-282 |
83 | EE | Mehdi Kharrazi, Taha Taha Sencar, Nasir D. Memon: Cover Selection for Steganographic Embedding. ICIP 2006: 117-120 |
82 | EE | Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon: Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. ICIP 2006: 2313-2316 |
81 | EE | Kulesh Shanmugasundaram, Nasir D. Memon: Network Monitoring for Security and Forensics. ICISS 2006: 56-70 |
80 | Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Identifying Digital Cameras Using CFA Interpolation. IFIP Int. Conf. Digital Forensics 2006: 289-299 | |
79 | EE | Hamza Özer, Bülent Sankur, Nasir D. Memon, Ismail Avcibas: Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Processing 16(4): 389-401 (2006) |
78 | EE | Nasir D. Memon, Anindrabatha Pal: Automated reassembly of file fragmented images using greedy algorithms. IEEE Transactions on Image Processing 15(2): 385-393 (2006) |
77 | EE | Jean-Camille Birget, Dawei Hong, Nasir D. Memon: Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security 1(3): 395-399 (2006) |
76 | EE | Baris Coskun, Bülent Sankur, Nasir D. Memon: Spatio-Temporal Transform Based Video Hashing. IEEE Transactions on Multimedia 8(6): 1190-1208 (2006) |
75 | EE | Mahalingam Ramkumar, Nasir D. Memon: Secure collaborations over message boards. IJSN 1(1/2): 113-124 (2006) |
74 | EE | Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. T. Data Hiding and Multimedia Security: 123-137 (2006) |
2005 | ||
73 | EE | Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Optimized Prediction for Geometry Compression of Triangle Meshes. DCC 2005: 83-92 |
72 | EE | Husrev T. Sencar, Nasir D. Memon: Watermarking and ownership problem: a revisit. Digital Rights Management Workshop 2005: 93-101 |
71 | EE | Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, Ismail Avcibas: Source camera identification based on CFA interpolation. ICIP (3) 2005: 69-72 |
70 | Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon: Integrating Digital Forensics in Network Infrastructures. IFIP Int. Conf. Digital Forensics 2005: 127-140 | |
69 | EE | Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon: A secure biometric authentication scheme based on robust hashing. MM&Sec 2005: 111-116 |
68 | EE | Hamza Özer, Bülent Sankur, Nasir D. Memon: An SVD-based audio watermarking technique. MM&Sec 2005: 51-56 |
67 | EE | Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon: Authentication using graphical passwords: effects of tolerance and image choice. SOUPS 2005: 1-12 |
66 | Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Benchmarking steganographic and steganalysis techniques. Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263 | |
65 | EE | Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon: SAFE-OPS: An approach to embedded software security. ACM Trans. Embedded Comput. Syst. 4(1): 189-210 (2005) |
64 | EE | Mahalingam Ramkumar, Nasir D. Memon: An efficient key predistribution scheme for ad hoc network security. IEEE Journal on Selected Areas in Communications 23(3): 611-621 (2005) |
63 | EE | Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood: A successively refinable lossless image-coding algorithm. IEEE Transactions on Communications 53(3): 445-452 (2005) |
62 | EE | Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon: PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Man-Machine Studies 63(1-2): 102-127 (2005) |
61 | EE | Regunathan Radhakrishnan, Mehdi Kharrazi, Nasir D. Memon: Data Masking: A New Approach for Steganography? VLSI Signal Processing 41(3): 293-303 (2005) |
2004 | ||
60 | EE | Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon: Payload attribution via hierarchical bloom filters. ACM Conference on Computer and Communications Security 2004: 31-41 |
59 | EE | Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon: Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. ACSAC 2004: 316-325 |
58 | EE | Hervé Brönnimann, Nasir D. Memon, Kulesh Shanmugasundaram: String Matching on the Internet. CAAN 2004: 75-89 |
57 | EE | Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu: A simple technique for estimating message lengths for additive noise steganography. ICARCV 2004: 983-986 |
56 | Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mahalingam Ramkumar, Bülent Sankur: A classifier design for detecting Image manipulations. ICIP 2004: 2645-2648 | |
55 | EE | Ming Jiang, Nasir D. Memon, Edward K. Wong, Xiaolin Wu: Quantitative steganalysis of binary images. ICIP 2004: 29-32 |
54 | EE | Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Blind source camera identification. ICIP 2004: 709-712 |
53 | Mahalingam Ramkumar, Nasir D. Memon: A system for digital rights management using key predistribution. ICME 2004: 431-434 | |
52 | Ming Jiang, Xiaolin Wu, Edward K. Wong, Nasir D. Memon: Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. ICME 2004: 883-886 | |
2003 | ||
51 | EE | Kulesh Shanmugasundaram, Nasir D. Memon: Automatic Reassembly of Document Fragments via Context Based Statistical Models. ACSAC 2003: 152-159 |
50 | EE | Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions. DCC 2003: 372-381 |
49 | EE | Lee Butterman, Nasir D. Memon: An Error-Resilient Blocksorting Compression Algorithm. DCC 2003: 417 |
48 | EE | Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon: Obfuscation of design intent in object-oriented applications. Digital Rights Management Workshop 2003: 142-153 |
47 | Anubhav Savant, Nasir D. Memon, Torsten Suel: On the scalability of an image transcoding proxy server. ICIP (1) 2003: 209-212 | |
46 | EE | Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon: Image Steganography and Steganalysis: Concepts and Practice. IWDW 2003: 35-49 |
45 | EE | Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann: ForNet: A Distributed Forensics Network. MMM-ACNS 2003: 1-16 |
44 | Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich: Design of a Laboratory for Information Security Education. World Conference on Information Security Education 2003: 61-73 | |
43 | EE | Gleb Naumovich, Nasir D. Memon: Preventing Piracy, Reverse Engineering, and Tampering. IEEE Computer 36(7): 64-71 (2003) |
42 | EE | Ismail Avcibas, Nasir D. Memon, Bülent Sankur: Steganalysis using image quality metrics. IEEE Transactions on Image Processing 12(2): 221-229 (2003) |
41 | EE | Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon: Editorial. Multimedia Syst. 9(3): 215 (2003) |
2002 | ||
40 | Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon: On steganalysis of random LSB embedding in continuous-tone images. ICIP (3) 2002: 641-644 | |
39 | Ismail Avcibas, Nasir D. Memon, Bülent Sankur: Image steganalysis with binary similarity measures. ICIP (3) 2002: 645-648 | |
38 | Regunathan Radhakrishnan, Kulesh Shanmugasundaram, Nasir D. Memon: Data masking: a secure-covert channel paradigm. IEEE Workshop on Multimedia Signal Processing 2002: 339-342 | |
37 | EE | Zan Ouyang, Nasir D. Memon, Torsten Suel, Dimitre Trendafilov: Cluster-Based Delta Compression of a Collection of Files. WISE 2002: 257-268 |
36 | Regunathan Radhakrishnan, Nasir D. Memon: On the security of the digest function in the SARI image authentication system. IEEE Trans. Circuits Syst. Video Techn. 12(11): 1030- (2002) | |
2001 | ||
35 | EE | Lee Butterman, Nasir D. Memon: Error-Resilient Block Sorting. Data Compression Conference 2001: 487 |
34 | EE | Zan Ouyang, Nasir D. Memon, Torsten Suel: Delta Encoding of Related Web Pages. Data Compression Conference 2001: 507 |
33 | EE | Rajarathnam Chandramouli, Nasir D. Memon: Analysis of LSB based image steganography techniques. ICIP (3) 2001: 1019-1022 |
32 | EE | Debargha Mukherjee, Nasir D. Memon, Amir Said: JPEG-matched MRC compression of compound documents. ICIP (3) 2001: 434-437 |
31 | EE | Regunathan Radhakrishnan, Nasir D. Memon: On the security of the SARI image authentication system. ICIP (3) 2001: 971-974 |
30 | Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood: Lossless and near-lossless image compression with successive refinement. VCIP 2001: 41-52 | |
29 | EE | K. Gopalakrishnan, Nasir D. Memon, Poorvi L. Vora: Protocols for Watermark Verification. IEEE MultiMedia 8(4): 66-70 (2001) |
28 | EE | Ping Wah Wong, Nasir D. Memon: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10(10): 1593-1601 (2001) |
27 | EE | Nasir D. Memon, Ping Wah Wong: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10(4): 643-649 (2001) |
2000 | ||
26 | EE | Rajarathnam Chandramouli, Nasir D. Memon: A distributed detection framework for Steganalysis. ACM Multimedia Workshops 2000: 123-126 |
25 | Nasir D. Memon, David L. Neuhoff, Sunil M. Shende: Optimizing Prediction Gain in Symmetric Axial Scans. ICIP 2000 | |
24 | EE | Rajarathnam Chandramouli, Nasir D. Memon: How Many Pixels to Watermark? ITCC 2000: 11-15 |
23 | EE | Nasir D. Memon, David L. Neuhoff, Sunil M. Shende: An analysis of some common scanning techniques for lossless image coding. IEEE Transactions on Image Processing 9(11): 1837-1848 (2000) |
22 | EE | Matthew J. Holliman, Nasir D. Memon: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9(3): 432-441 (2000) |
21 | EE | Xiaolin Wu, Nasir D. Memon: Context-based lossless interband compression-extending CALIC. IEEE Transactions on Image Processing 9(6): 994-1001 (2000) |
1999 | ||
20 | Nasir D. Memon, Sunil M. Shende, Ping Wah Wong: On the Security of the Yeung Mintzer Authentication Watermark. PICS 1999: 301-306 | |
19 | Nasir D. Memon, Xuan Kong, J. Cinkler: Context-based lossless and near-lossless compression of EEG signals. IEEE Transactions on Information Technology in Biomedicine 3(3): 231-238 (1999) | |
1998 | ||
18 | EE | Xiaolin Wu, Wai Kin Choi, Nasir D. Memon: Lossless Interframe Image Compression via Context Modeling. Data Compression Conference 1998: 378-387 |
17 | Nasir D. Memon, David L. Neuhoff, Sunil M. Shende: On Scanning Techniques for Lossless Image Coding with Limited Context Supports. ICIP (1) 1998: 503-507 | |
16 | Nasir D. Memon: Adaptive Coding of DCT Coefficients by Golomb-Rice Codes. ICIP (1) 1998: 516-520 | |
15 | Nasir D. Memon, Xiaolin Wu, Boon-Lock Yeo: Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms. ICIP (3) 1998: 891-895 | |
14 | Matthew J. Holliman, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung: Adaptive Public Watermarking of DCT-Based Compressed Images. Storage and Retrieval for Image and Video Databases (SPIE) 1998: 284-295 | |
13 | EE | Nasir D. Memon, Ping Wah Wong: Protecting Digital Media Content. Commun. ACM 41(7): 34-43 (1998) |
1997 | ||
12 | EE | S. Carver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung: On the Invertibility of Invisible Watermarking Techniques. ICIP (1) 1997: 540-543 |
11 | EE | Nasir D. Memon, Nader Moayeri: A new error criterion for near-lossless image compression. ICIP (3) 1997: 662 |
10 | Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung: Can Invisible Watermarks Resolve Rightful Ownerships? Storage and Retrieval for Image and Video Databases (SPIE) 1997: 310-321 | |
9 | Nasir D. Memon, Xiaolin Wu: Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression. Comput. J. 40(2/3): 127-136 (1997) | |
1996 | ||
8 | EE | Nasir D. Memon, Ayalur Venkateswaran: On ordering color maps for lossless predictive coding. IEEE Transactions on Image Processing 5(11): 1522-1527 (1996) |
7 | EE | Nasir D. Memon, Khalid Sayood: Scan predictive vector quantization of multispectral images. IEEE Transactions on Image Processing 5(2): 330-337 (1996) |
1995 | ||
6 | Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras: Lossless Image Compression with a Codebook of Block Scans. IEEE Journal on Selected Areas in Communications 13(1): 24-30 (1995) | |
1994 | ||
5 | Nasir D. Memon, Sibabrata Ray, Khalid Sayood: Differential Lossless Encoding of Images Using Non-linear Predictive Techniques. ICIP (3) 1994: 841-845 | |
1992 | ||
4 | Spyros S. Magliveras, Nasir D. Memon: Algebraic Properties of Cryptosystem PGM. J. Cryptology 5(3): 167-183 (1992) | |
1991 | ||
3 | Nasir D. Memon, Spyros S. Magliveras, Khalid Sayood: Prediction Trees and Lossless Image Compression: An Extended Abstract. Data Compression Conference 1991: 83-92 | |
1989 | ||
2 | EE | Spyros S. Magliveras, Nasir D. Memon: Properties of Cryptosystem PGM. CRYPTO 1989: 447-460 |
1 | Spyros S. Magliveras, Nasir D. Memon: Random Permutations from Logarithmic Signatures. Great Lakes Computer Science Conference 1989: 199-205 |