The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nasir D. Memon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Regunathan Radhakrishnan, Kulesh Shanmugasundaram, Nasir D. Memon
    Data masking: a secure-covert channel paradigm. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:339-342 [Conf]
  2. Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon
    Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:316-325 [Conf]
  3. Kulesh Shanmugasundaram, Nasir D. Memon
    Automatic Reassembly of Document Fragments via Context Based Statistical Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:152-159 [Conf]
  4. Qiming Li, Yagiz Sutcu, Nasir Memon
    Secure Sketch for Biometric Templates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:99-113 [Conf]
  5. Hervé Brönnimann, Nasir D. Memon, Kulesh Shanmugasundaram
    String Matching on the Internet. [Citation Graph (0, 0)][DBLP]
    CAAN, 2004, pp:75-89 [Conf]
  6. Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon
    Payload attribution via hierarchical bloom filters. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:31-41 [Conf]
  7. Spyros S. Magliveras, Nasir D. Memon
    Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:447-460 [Conf]
  8. Lee Butterman, Nasir D. Memon
    Error-Resilient Block Sorting. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2001, pp:487- [Conf]
  9. Lee Butterman, Nasir D. Memon
    An Error-Resilient Blocksorting Compression Algorithm. [Citation Graph (0, 0)][DBLP]
    DCC, 2003, pp:417- [Conf]
  10. Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu
    Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions. [Citation Graph (0, 0)][DBLP]
    DCC, 2003, pp:372-381 [Conf]
  11. Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu
    Optimized Prediction for Geometry Compression of Triangle Meshes. [Citation Graph (0, 0)][DBLP]
    DCC, 2005, pp:83-92 [Conf]
  12. Nasir D. Memon, Spyros S. Magliveras, Khalid Sayood
    Prediction Trees and Lossless Image Compression: An Extended Abstract. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1991, pp:83-92 [Conf]
  13. Zan Ouyang, Nasir D. Memon, Torsten Suel
    Delta Encoding of Related Web Pages. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2001, pp:507- [Conf]
  14. Xiaolin Wu, Wai Kin Choi, Nasir D. Memon
    Lossless Interframe Image Compression via Context Modeling. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1998, pp:378-387 [Conf]
  15. Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
    Obfuscation of design intent in object-oriented applications. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:142-153 [Conf]
  16. Husrev T. Sencar, Nasir D. Memon
    Watermarking and ownership problem: a revisit. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:93-101 [Conf]
  17. Spyros S. Magliveras, Nasir D. Memon
    Random Permutations from Logarithmic Signatures. [Citation Graph (0, 0)][DBLP]
    Great Lakes Computer Science Conference, 1989, pp:199-205 [Conf]
  18. Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mahalingam Ramkumar, Bülent Sankur
    A classifier design for detecting Image manipulations. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2645-2648 [Conf]
  19. Ismail Avcibas, Nasir D. Memon, Bülent Sankur
    Image steganalysis with binary similarity measures. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2002, pp:645-648 [Conf]
  20. S. Carver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung
    On the Invertibility of Invisible Watermarking Techniques. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1997, pp:540-543 [Conf]
  21. Rajarathnam Chandramouli, Nasir D. Memon
    Analysis of LSB based image steganography techniques. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:1019-1022 [Conf]
  22. Sorina Dumitrescu, Xiaolin Wu, Nasir D. Memon
    On steganalysis of random LSB embedding in continuous-tone images. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2002, pp:641-644 [Conf]
  23. Ming Jian, Nasir D. Memon, Edward Wong, Xiaolin Wu
    Quantitative steganalysis of binary images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:29-32 [Conf]
  24. Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
    Blind source camera identification. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:709-712 [Conf]
  25. Nasir D. Memon
    Adaptive Coding of DCT Coefficients by Golomb-Rice Codes. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1998, pp:516-520 [Conf]
  26. Nasir D. Memon, Nader Moayeri
    A new error criterion for near-lossless image compression. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1997, pp:662- [Conf]
  27. Nasir D. Memon, David L. Neuhoff, Sunil M. Shende
    Optimizing Prediction Gain in Symmetric Axial Scans. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  28. Nasir D. Memon, David L. Neuhoff, Sunil M. Shende
    On Scanning Techniques for Lossless Image Coding with Limited Context Supports. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1998, pp:503-507 [Conf]
  29. Nasir D. Memon, Sibabrata Ray, Khalid Sayood
    Differential Lossless Encoding of Images Using Non-linear Predictive Techniques. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1994, pp:841-845 [Conf]
  30. Nasir D. Memon, Xiaolin Wu, Boon-Lock Yeo
    Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1998, pp:891-895 [Conf]
  31. Debargha Mukherjee, Nasir Memon, Amir Said
    JPEG-matched MRC compression of compound documents. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:434-437 [Conf]
  32. Regunathan Radhakrishnan, Nasir D. Memon
    On the security of the SARI image authentication system. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:971-974 [Conf]
  33. Anubhav Savant, Nasir D. Memon, Torsten Suel
    On the scalability of an image transcoding proxy server. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2003, pp:209-212 [Conf]
  34. Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon, Ismail Avcibas
    Source camera identification based on CFA interpolation. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:69-72 [Conf]
  35. Kulesh Shanmugasundaram, Nasir D. Memon
    Network Monitoring for Security and Forensics. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:56-70 [Conf]
  36. M. Jiang, X. Wu, E. K. Wong, A. Memon
    Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:883-886 [Conf]
  37. M. Ramkumar, N. Memon
    A system for digital rights management using key predistribution. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:431-434 [Conf]
  38. Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich
    Design of a Laboratory for Information Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:61-73 [Conf]
  39. Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon
    Integrating Digital Forensics in Network Infrastructures. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:127-140 [Conf]
  40. Rajarathnam Chandramouli, Nasir D. Memon
    How Many Pixels to Watermark? [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:11-15 [Conf]
  41. Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon
    Image Steganography and Steganalysis: Concepts and Practice. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:35-49 [Conf]
  42. Rajarathnam Chandramouli, Nasir D. Memon
    A distributed detection framework for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia Workshops, 2000, pp:123-126 [Conf]
  43. Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann
    ForNet: A Distributed Forensics Network. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:1-16 [Conf]
  44. Nasir D. Memon, Sunil M. Shende, Ping Wah Wong
    On the Security of the Yeung Mintzer Authentication Watermark. [Citation Graph (0, 0)][DBLP]
    PICS, 1999, pp:301-306 [Conf]
  45. Scott Craver, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung
    Can Invisible Watermarks Resolve Rightful Ownerships? [Citation Graph (0, 0)][DBLP]
    Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:310-321 [Conf]
  46. Matthew J. Holliman, Nasir D. Memon, Boon-Lock Yeo, Minerva M. Yeung
    Adaptive Public Watermarking of DCT-Based Compressed Images. [Citation Graph (0, 0)][DBLP]
    Storage and Retrieval for Image and Video Databases (SPIE), 1998, pp:284-295 [Conf]
  47. Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
    Benchmarking steganographic and steganalysis techniques. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:252-263 [Conf]
  48. Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood
    Lossless and near-lossless image compression with successive refinement. [Citation Graph (0, 0)][DBLP]
    VCIP, 2001, pp:41-52 [Conf]
  49. Zan Ouyang, Nasir D. Memon, Torsten Suel, Dimitre Trendafilov
    Cluster-Based Delta Compression of a Collection of Files. [Citation Graph (0, 0)][DBLP]
    WISE, 2002, pp:257-268 [Conf]
  50. Nasir D. Memon, Ping Wah Wong
    Protecting Digital Media Content. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:7, pp:34-43 [Journal]
  51. Nasir D. Memon, Xiaolin Wu
    Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1997, v:40, n:2/3, pp:127-136 [Journal]
  52. Gleb Naumovich, Nasir D. Memon
    Preventing Piracy, Reverse Engineering, and Tampering. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:7, pp:64-71 [Journal]
  53. K. Gopalakrishnan, Nasir D. Memon, Poorvi L. Vora
    Protocols for Watermark Verification. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:4, pp:66-70 [Journal]
  54. Spyros S. Magliveras, Nasir D. Memon
    Algebraic Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:3, pp:167-183 [Journal]
  55. Nasir D. Memon, Khalid Sayood, Spyros S. Magliveras
    Lossless Image Compression with a Codebook of Block Scans. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:1, pp:24-30 [Journal]
  56. Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon
    Editorial. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:215- [Journal]
  57. Ismail Avcibas, Nasir D. Memon, Bülent Sankur, Khalid Sayood
    A successively refinable lossless image-coding algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:3, pp:445-452 [Journal]
  58. Regunathan Radhakrishnan, Nasir D. Memon
    On the security of the digest function in the SARI image authentication system. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2002, v:12, n:11, pp:1030-0 [Journal]
  59. Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
    Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:123-137 [Journal]
  60. Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon
    SAFE-OPS: An approach to embedded software security. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2005, v:4, n:1, pp:189-210 [Journal]
  61. Ismail Avcibas, Nasir D. Memon, Bülent Sankur
    Steganalysis using image quality metrics. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2003, v:12, n:2, pp:221-229 [Journal]
  62. Matthew J. Holliman, Nasir D. Memon
    Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2000, v:9, n:3, pp:432-441 [Journal]
  63. Nasir D. Memon, David L. Neuhoff, Sunil M. Shende
    An analysis of some common scanning techniques for lossless image coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2000, v:9, n:11, pp:1837-1848 [Journal]
  64. Nasir D. Memon, Khalid Sayood
    Scan predictive vector quantization of multispectral images. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1996, v:5, n:2, pp:330-337 [Journal]
  65. Nasir D. Memon, Ayalur Venkateswaran
    On ordering color maps for lossless predictive coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1996, v:5, n:11, pp:1522-1527 [Journal]
  66. Nasir D. Memon, Ping Wah Wong
    A buyer-seller watermarking protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2001, v:10, n:4, pp:643-649 [Journal]
  67. Xiaolin Wu, Nasir D. Memon
    Context-based lossless interband compression-extending CALIC. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2000, v:9, n:6, pp:994-1001 [Journal]
  68. Ping Wah Wong, Nasir D. Memon
    Secret and public key image watermarking schemes for image authentication and ownership verification. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2001, v:10, n:10, pp:1593-1601 [Journal]
  69. Nasir D. Memon, Xuan Kong, J. Cinkler
    Context-based lossless and near-lossless compression of EEG signals. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 1999, v:3, n:3, pp:231-238 [Journal]
  70. Hamza Özer, Bülent Sankur, Nasir D. Memon, Ismail Avcibas
    Detection of audio covert channels using statistical footprints of hidden messages. [Citation Graph (0, 0)][DBLP]
    Digital Signal Processing, 2006, v:16, n:4, pp:389-401 [Journal]
  71. Yagiz Sutcu, Qiming Li, Nasir Memon
    Secure Biometric Templates from Fingerprint-Face Features. [Citation Graph (0, 0)][DBLP]
    CVPR, 2007, pp:- [Conf]
  72. Mehdi Kharrazi, Taha T. Sencar, Nasir D. Memon
    Cover Selection for Steganographic Embedding. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:117-120 [Conf]
  73. Sintayehu Dehnie, Taha H. Sencar, Nasir D. Memon
    Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:2313-2316 [Conf]
  74. Dan Chen, Yi-Jen Chiang, Nasir D. Memon, Xiaolin Wu
    Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids. [Citation Graph (0, 0)][DBLP]
    EuroVis, 2006, pp:275-282 [Conf]
  75. Qiming Li, Nasir Memon
    Security Models of Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:60-64 [Conf]
  76. Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon
    Detecting Malicious Behavior in Cooperative Diversity. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:895-899 [Conf]
  77. Husrev T. Sencar, Qiming Li, Nasir Memon
    A new approach to countering ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:205-214 [Conf]
  78. Yagiz Sutcu, Husrev T. Sencar, Nasir Memon
    A secure biometric authentication scheme based on robust hashing. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:111-116 [Conf]
  79. Hamza Özer, Bülent Sankur, Nasir D. Memon
    An SVD-based audio watermarking technique. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:51-56 [Conf]

  80. Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. [Citation Graph (, )][DBLP]


  81. Efficient Detection of Delay-Constrained Relay Nodes. [Citation Graph (, )][DBLP]


  82. Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes. [Citation Graph (, )][DBLP]


  83. CoCoST: A Computational Cost Efficient Classifier. [Citation Graph (, )][DBLP]


  84. Tamper Detection Based on Regularity of Wavelet Transform Coefficients. [Citation Graph (, )][DBLP]


  85. New Features to Identify Computer Generated Images. [Citation Graph (, )][DBLP]


  86. Practical Security of Non-Invertiblewatermarking Schemes. [Citation Graph (, )][DBLP]


  87. Image tamper detection based on demosaicing artifacts. [Citation Graph (, )][DBLP]


  88. Improvements on Sensor Noise Based Source Camera Identification. [Citation Graph (, )][DBLP]


  89. Robust Document Image Authentication. [Citation Graph (, )][DBLP]


  90. Identifying Digital Cameras Using CFA Interpolation. [Citation Graph (, )][DBLP]


  91. Video copy detection based on source device characteristics: a complementary approach to content-based methods. [Citation Graph (, )][DBLP]


  92. Cooperative diversity with selfish users. [Citation Graph (, )][DBLP]


  93. Authentication using graphical passwords: effects of tolerance and image choice. [Citation Graph (, )][DBLP]


  94. Modeling user choice in the PassPoints graphical password scheme. [Citation Graph (, )][DBLP]


  95. A simple technique for estimating message lengths for additive noise steganography. [Citation Graph (, )][DBLP]


  96. A Stochastic Model for Misbehaving Relays in Cooperative Diversity. [Citation Graph (, )][DBLP]


  97. Flatbed scanner identification based on dust and scratches over scanner platen. [Citation Graph (, )][DBLP]


  98. A dynamic game model for Amplify-and-Forward cooperative communications. [Citation Graph (, )][DBLP]


  99. An efficient and robust method for detecting copy-move forgery. [Citation Graph (, )][DBLP]


  100. Efficient techniques for sensor fingerprint matching in large image and video databases. [Citation Graph (, )][DBLP]


  101. Classification of digital camera-models based on demosaicing artifacts. [Citation Graph (, )][DBLP]


Search in 0.071secs, Finished in 0.076secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002