dblp.uni-trier.dewww.uni-trier.de

Nasir D. Memon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
105EESintayehu Dehnie, Nasir D. Memon: Cooperative diversity with selfish users. CISS 2008: 1184-1188
104EESevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Video copy detection based on source device characteristics: a complementary approach to content-based methods. Multimedia Information Retrieval 2008: 435-442
103EESintayehu Dehnie, Nasir D. Memon: A Stochastic Model for Misbehaving Relays in Cooperative Diversity. WCNC 2008: 482-487
102EESevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Classification of digital camera-models based on demosaicing artifacts. Digital Investigation 5(1-2): 49-59 (2008)
101EEAhmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon: Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust. IEEE Transactions on Information Forensics and Security 3(3): 539-552 (2008)
2007
100EEBaris Coskun, Nasir D. Memon: Efficient Detection of Delay-Constrained Relay Nodes. ACSAC 2007: 353-362
99EESintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon: Detecting Malicious Behavior in Cooperative Diversity. CISS 2007: 895-899
98EEYagiz Sutcu, Qiming Li, Nasir D. Memon: Secure Biometric Templates from Fingerprint-Face Features. CVPR 2007
97EEYagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon: Tamper Detection Based on Regularity of Wavelet Transform Coefficients. ICIP (1) 2007: 397-400
96EEAhmet Emir Dirik, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: New Features to Identify Computer Generated Images. ICIP (4) 2007: 433-436
95EEQiming Li, Nasir D. Memon: Practical Security of Non-Invertiblewatermarking Schemes. ICIP (4) 2007: 445-448
94EEMing Jiang, Edward K. Wong, Nasir D. Memon: Robust Document Image Authentication. ICME 2007: 1131-1134
93EEYagiz Sutcu, Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Improvements on Sensor Noise Based Source Camera Identification. ICME 2007: 24-27
92EEQiming Li, Nasir D. Memon: Security Models of Digital Watermarking. MCAM 2007: 60-64
91EEHusrev T. Sencar, Qiming Li, Nasir D. Memon: A new approach to countering ambiguity attacks. MM&Sec 2007: 205-214
90EEAhmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget: Modeling user choice in the PassPoints graphical password scheme. SOUPS 2007: 20-28
89EEDan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Alphabet Partitioning Techniques for Semiadaptive Huffman Coding of Large Alphabets. IEEE Transactions on Communications 55(3): 436-443 (2007)
88EEYagiz Sutcu, Qiming Li, Nasir D. Memon: Protecting Biometric Templates With Sketch: Theory and Practice. IEEE Transactions on Information Forensics and Security 2(3-2): 503-512 (2007)
87EEHusrev T. Sencar, Nasir D. Memon: Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. IEEE Transactions on Information Forensics and Security 2(4): 664-682 (2007)
86EENasir D. Memon, Thomas Daniels: Special issue on secure knowledge management. Information Systems Frontiers 9(5): 449-450 (2007)
2006
85EEQiming Li, Yagiz Sutcu, Nasir D. Memon: Secure Sketch for Biometric Templates. ASIACRYPT 2006: 99-113
84EEDan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids. EuroVis 2006: 275-282
83EEMehdi Kharrazi, Taha Taha Sencar, Nasir D. Memon: Cover Selection for Steganographic Embedding. ICIP 2006: 117-120
82EESintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon: Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. ICIP 2006: 2313-2316
81EEKulesh Shanmugasundaram, Nasir D. Memon: Network Monitoring for Security and Forensics. ICISS 2006: 56-70
80 Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon: Identifying Digital Cameras Using CFA Interpolation. IFIP Int. Conf. Digital Forensics 2006: 289-299
79EEHamza Özer, Bülent Sankur, Nasir D. Memon, Ismail Avcibas: Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Processing 16(4): 389-401 (2006)
78EENasir D. Memon, Anindrabatha Pal: Automated reassembly of file fragmented images using greedy algorithms. IEEE Transactions on Image Processing 15(2): 385-393 (2006)
77EEJean-Camille Birget, Dawei Hong, Nasir D. Memon: Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security 1(3): 395-399 (2006)
76EEBaris Coskun, Bülent Sankur, Nasir D. Memon: Spatio-Temporal Transform Based Video Hashing. IEEE Transactions on Multimedia 8(6): 1190-1208 (2006)
75EEMahalingam Ramkumar, Nasir D. Memon: Secure collaborations over message boards. IJSN 1(1/2): 113-124 (2006)
74EEMehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. T. Data Hiding and Multimedia Security: 123-137 (2006)
2005
73EEDan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Optimized Prediction for Geometry Compression of Triangle Meshes. DCC 2005: 83-92
72EEHusrev T. Sencar, Nasir D. Memon: Watermarking and ownership problem: a revisit. Digital Rights Management Workshop 2005: 93-101
71EESevinc Bayram, Husrev T. Sencar, Nasir D. Memon, Ismail Avcibas: Source camera identification based on CFA interpolation. ICIP (3) 2005: 69-72
70 Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon: Integrating Digital Forensics in Network Infrastructures. IFIP Int. Conf. Digital Forensics 2005: 127-140
69EEYagiz Sutcu, Husrev T. Sencar, Nasir D. Memon: A secure biometric authentication scheme based on robust hashing. MM&Sec 2005: 111-116
68EEHamza Özer, Bülent Sankur, Nasir D. Memon: An SVD-based audio watermarking technique. MM&Sec 2005: 51-56
67EESusan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon: Authentication using graphical passwords: effects of tolerance and image choice. SOUPS 2005: 1-12
66 Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Benchmarking steganographic and steganalysis techniques. Security, Steganography, and Watermarking of Multimedia Contents 2005: 252-263
65EEJoseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon: SAFE-OPS: An approach to embedded software security. ACM Trans. Embedded Comput. Syst. 4(1): 189-210 (2005)
64EEMahalingam Ramkumar, Nasir D. Memon: An efficient key predistribution scheme for ad hoc network security. IEEE Journal on Selected Areas in Communications 23(3): 611-621 (2005)
63EEIsmail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood: A successively refinable lossless image-coding algorithm. IEEE Transactions on Communications 53(3): 445-452 (2005)
62EESusan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon: PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Man-Machine Studies 63(1-2): 102-127 (2005)
61EERegunathan Radhakrishnan, Mehdi Kharrazi, Nasir D. Memon: Data Masking: A New Approach for Steganography? VLSI Signal Processing 41(3): 293-303 (2005)
2004
60EEKulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon: Payload attribution via hierarchical bloom filters. ACM Conference on Computer and Communications Security 2004: 31-41
59EEKulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon: Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. ACSAC 2004: 316-325
58EEHervé Brönnimann, Nasir D. Memon, Kulesh Shanmugasundaram: String Matching on the Internet. CAAN 2004: 75-89
57EEMing Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu: A simple technique for estimating message lengths for additive noise steganography. ICARCV 2004: 983-986
56 Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mahalingam Ramkumar, Bülent Sankur: A classifier design for detecting Image manipulations. ICIP 2004: 2645-2648
55EEMing Jiang, Nasir D. Memon, Edward K. Wong, Xiaolin Wu: Quantitative steganalysis of binary images. ICIP 2004: 29-32
54EEMehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon: Blind source camera identification. ICIP 2004: 709-712
53 Mahalingam Ramkumar, Nasir D. Memon: A system for digital rights management using key predistribution. ICME 2004: 431-434
52 Ming Jiang, Xiaolin Wu, Edward K. Wong, Nasir D. Memon: Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. ICME 2004: 883-886
2003
51EEKulesh Shanmugasundaram, Nasir D. Memon: Automatic Reassembly of Document Fragments via Context Based Statistical Models. ACSAC 2003: 152-159
50EEDan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu: Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions. DCC 2003: 372-381
49EELee Butterman, Nasir D. Memon: An Error-Resilient Blocksorting Compression Algorithm. DCC 2003: 417
48EEMikhail Sosonkin, Gleb Naumovich, Nasir D. Memon: Obfuscation of design intent in object-oriented applications. Digital Rights Management Workshop 2003: 142-153
47 Anubhav Savant, Nasir D. Memon, Torsten Suel: On the scalability of an image transcoding proxy server. ICIP (1) 2003: 209-212
46EERajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon: Image Steganography and Steganalysis: Concepts and Practice. IWDW 2003: 35-49
45EEKulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann: ForNet: A Distributed Forensics Network. MMM-ACNS 2003: 1-16
44 Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich: Design of a Laboratory for Information Security Education. World Conference on Information Security Education 2003: 61-73
43EEGleb Naumovich, Nasir D. Memon: Preventing Piracy, Reverse Engineering, and Tampering. IEEE Computer 36(7): 64-71 (2003)
42EEIsmail Avcibas, Nasir D. Memon, Bülent Sankur: Steganalysis using image quality metrics. IEEE Transactions on Image Processing 12(2): 221-229 (2003)
41EEJana Dittmann, Stefan Katzenbeisser, Nasir D. Memon: Editorial. Multimedia Syst. 9(3): 215 (2003)
2002
40 Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon: On steganalysis of random LSB embedding in continuous-tone images. ICIP (3) 2002: 641-644
39 Ismail Avcibas, Nasir D. Memon, Bülent Sankur: Image steganalysis with binary similarity measures. ICIP (3) 2002: 645-648
38 Regunathan Radhakrishnan, Kulesh Shanmugasundaram, Nasir D. Memon: Data masking: a secure-covert channel paradigm. IEEE Workshop on Multimedia Signal Processing 2002: 339-342
37EEZan Ouyang, Nasir D. Memon, Torsten Suel, Dimitre Trendafilov: Cluster-Based Delta Compression of a Collection of Files. WISE 2002: 257-268
36 Regunathan Radhakrishnan, Nasir D. Memon: On the security of the digest function in the SARI image authentication system. IEEE Trans. Circuits Syst. Video Techn. 12(11): 1030- (2002)
2001
35EELee Butterman, Nasir D. Memon: Error-Resilient Block Sorting. Data Compression Conference 2001: 487
34EEZan Ouyang, Nasir D. Memon, Torsten Suel: Delta Encoding of Related Web Pages. Data Compression Conference 2001: 507
33EERajarathnam Chandramouli, Nasir D. Memon: Analysis of LSB based image steganography techniques. ICIP (3) 2001: 1019-1022
32EEDebargha Mukherjee, Nasir D. Memon, Amir Said: JPEG-matched MRC compression of compound documents. ICIP (3) 2001: 434-437
31EERegunathan Radhakrishnan, Nasir D. Memon: On the security of the SARI image authentication system. ICIP (3) 2001: 971-974
30 Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood: Lossless and near-lossless image compression with successive refinement. VCIP 2001: 41-52
29EEK. Gopalakrishnan, Nasir D. Memon, Poorvi L. Vora: Protocols for Watermark Verification. IEEE MultiMedia 8(4): 66-70 (2001)
28EEPing Wah Wong, Nasir D. Memon: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10(10): 1593-1601 (2001)
27EENasir D. Memon, Ping Wah Wong: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10(4): 643-649 (2001)
2000
26EERajarathnam Chandramouli, Nasir D. Memon: A distributed detection framework for Steganalysis. ACM Multimedia Workshops 2000: 123-126
25 Nasir D. Memon, David L. Neuhoff, Sunil M. Shende: Optimizing Prediction Gain in Symmetric Axial Scans. ICIP 2000
24EERajarathnam Chandramouli, Nasir D. Memon: How Many Pixels to Watermark? ITCC 2000: 11-15
23EENasir D. Memon, David L. Neuhoff, Sunil M. Shende: An analysis of some common scanning techniques for lossless image coding. IEEE Transactions on Image Processing 9(11): 1837-1848 (2000)
22EEMatthew J. Holliman, Nasir D. Memon: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9(3): 432-441 (2000)
21EEXiaolin Wu, Nasir D. Memon: Context-based lossless interband compression-extending CALIC. IEEE Transactions on Image Processing 9(6): 994-1001 (2000)
1999
20 Nasir D. Memon, Sunil M. Shende, Ping Wah Wong: On the Security of the Yeung Mintzer Authentication Watermark. PICS 1999: 301-306
19 Nasir D. Memon, Xuan Kong, J. Cinkler: Context-based lossless and near-lossless compression of EEG signals. IEEE Transactions on Information Technology in Biomedicine 3(3): 231-238 (1999)
1998
18EEXiaolin Wu, Wai Kin Choi, Nasir D. Memon: Lossless Interframe Image Compression via Context Modeling. Data Compression Conference 1998: 378-387
17 Nasir D. Memon, David L. Neuhoff, Sunil M. Shende: On Scanning Techniques for Lossless Image Coding with Limited Context Supports. ICIP (1) 1998: 503-507
16 Nasir D. Memon: Adaptive Coding of DCT Coefficients by Golomb-Rice Codes. ICIP (1) 1998: 516-520
15 Nasir D. Memon, Xiaolin Wu, Boon-Lock Yeo: Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms. ICIP (3) 1998: 891-895
14 Matthew J. Holliman, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung: Adaptive Public Watermarking of DCT-Based Compressed Images. Storage and Retrieval for Image and Video Databases (SPIE) 1998: 284-295
13EENasir D. Memon, Ping Wah Wong: Protecting Digital Media Content. Commun. ACM 41(7): 34-43 (1998)
1997
12EES. Carver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung: On the Invertibility of Invisible Watermarking Techniques. ICIP (1) 1997: 540-543
11EENasir D. Memon, Nader Moayeri: A new error criterion for near-lossless image compression. ICIP (3) 1997: 662
10 Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung: Can Invisible Watermarks Resolve Rightful Ownerships? Storage and Retrieval for Image and Video Databases (SPIE) 1997: 310-321
9 Nasir D. Memon, Xiaolin Wu: Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression. Comput. J. 40(2/3): 127-136 (1997)
1996
8EENasir D. Memon, Ayalur Venkateswaran: On ordering color maps for lossless predictive coding. IEEE Transactions on Image Processing 5(11): 1522-1527 (1996)
7EENasir D. Memon, Khalid Sayood: Scan predictive vector quantization of multispectral images. IEEE Transactions on Image Processing 5(2): 330-337 (1996)
1995
6 Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras: Lossless Image Compression with a Codebook of Block Scans. IEEE Journal on Selected Areas in Communications 13(1): 24-30 (1995)
1994
5 Nasir D. Memon, Sibabrata Ray, Khalid Sayood: Differential Lossless Encoding of Images Using Non-linear Predictive Techniques. ICIP (3) 1994: 841-845
1992
4 Spyros S. Magliveras, Nasir D. Memon: Algebraic Properties of Cryptosystem PGM. J. Cryptology 5(3): 167-183 (1992)
1991
3 Nasir D. Memon, Spyros S. Magliveras, Khalid Sayood: Prediction Trees and Lossless Image Compression: An Extended Abstract. Data Compression Conference 1991: 83-92
1989
2EESpyros S. Magliveras, Nasir D. Memon: Properties of Cryptosystem PGM. CRYPTO 1989: 447-460
1 Spyros S. Magliveras, Nasir D. Memon: Random Permutations from Logarithmic Signatures. Great Lakes Computer Science Conference 1989: 199-205

Coauthor Index

1Vikram Anantapadmanabhan [44]
2Ismail Avcibas [30] [39] [42] [56] [63] [71] [79]
3Sevinc Bayram [56] [71] [80] [93] [96] [102] [104]
4Jean-Camille Birget [62] [67] [77] [90]
5Alex Brodskiy [62] [67]
6Hervé Brönnimann [45] [58] [60] [70]
7Lee Butterman [35] [49]
8S. Carver [12]
9Rajarathnam Chandramouli [24] [26] [33] [46]
10Dan Chen [50] [73] [84] [89]
11Yi-Jen Chiang [50] [73] [84] [89]
12Wai Kin Choi [18]
13Alok N. Choudhary [65]
14J. Cinkler [19]
15Baris Coskun [76] [97] [100]
16Scott Craver [10]
17Thomas Daniels [86]
18Sintayehu Dehnie [82] [99] [103] [105]
19Ahmet Emir Dirik [90] [96] [101]
20Jana Dittmann [41]
21Sorina Dumitrescu [40]
22Phyllis G. Frankl [44]
23K. Gopalakrishnan [29]
24Matthew J. Holliman [14] [22]
25Dawei Hong [77]
26Ming Jiang [52] [55] [57] [94]
27Stefan Katzenbeisser [41]
28Mehdi Kharrazi [46] [54] [59] [61] [66] [74] [83]
29Xuan Kong [19]
30Qiming Li [85] [88] [91] [92] [95] [98]
31Spyros S. Magliveras [1] [2] [3] [4] [6]
32Nader Moayeri [11]
33Debargha Mukherjee [32]
34Bhagirath Narahari [65]
35Gleb Naumovich [43] [44] [48]
36David L. Neuhoff [17] [23] [25]
37Zan Ouyang [34] [37]
38Hamza Özer [68] [79]
39Anindrabatha Pal [78]
40Regunathan Radhakrishnan [31] [36] [38] [61]
41Mahalingam Ramkumar [53] [56] [64] [75]
42Sibabrata Ray [5]
43Amir Said [32]
44Bülent Sankur [30] [39] [42] [56] [63] [68] [76] [79]
45Anubhav Savant [45] [47]
46Khalid Sayood [3] [5] [6] [7] [30] [63]
47Husrev T. Sencar [54] [66] [69] [71] [72] [74] [80] [82] [87] [91] [93] [96] [97] [99] [101] [102] [104]
48Taha Taha Sencar [83]
49Kulesh Shanmugasundaram [38] [45] [51] [58] [59] [60] [70] [81]
50Sunil M. Shende [17] [20] [23] [25]
51Rahul Simha [65]
52Mikhail Sosonkin [48]
53Torsten Suel [34] [37] [47]
54Yagiz Sutcu [69] [85] [88] [93] [97] [98]
55Dimitre Trendafilov [37]
56Ayalur Venkateswaran [8]
57Poorvi L. Vora [29]
58Jim Waters [62] [67]
59Susan Wiedenbeck [62] [67]
60Edward K. Wong [52] [55] [57] [94]
61Ping Wah Wong [13] [20] [27] [28]
62Xiaolin Wu [9] [15] [18] [21] [40] [50] [52] [55] [57] [73] [84] [89]
63Boon-Lock Yeo [10] [12] [14] [15]
64Minerva M. Yeung [10] [12] [14]
65Joseph Zambreno [65]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)