Search the dblp DataBase
Nasir D. Memon :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Regunathan Radhakrishnan , Kulesh Shanmugasundaram , Nasir D. Memon Data masking: a secure-covert channel paradigm. [Citation Graph (0, 0)][DBLP ] IEEE Workshop on Multimedia Signal Processing, 2002, pp:339-342 [Conf ] Kulesh Shanmugasundaram , Mehdi Kharrazi , Nasir D. Memon Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:316-325 [Conf ] Kulesh Shanmugasundaram , Nasir D. Memon Automatic Reassembly of Document Fragments via Context Based Statistical Models. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:152-159 [Conf ] Qiming Li , Yagiz Sutcu , Nasir Memon Secure Sketch for Biometric Templates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:99-113 [Conf ] Hervé Brönnimann , Nasir D. Memon , Kulesh Shanmugasundaram String Matching on the Internet. [Citation Graph (0, 0)][DBLP ] CAAN, 2004, pp:75-89 [Conf ] Kulesh Shanmugasundaram , Hervé Brönnimann , Nasir D. Memon Payload attribution via hierarchical bloom filters. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:31-41 [Conf ] Spyros S. Magliveras , Nasir D. Memon Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:447-460 [Conf ] Lee Butterman , Nasir D. Memon Error-Resilient Block Sorting. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2001, pp:487- [Conf ] Lee Butterman , Nasir D. Memon An Error-Resilient Blocksorting Compression Algorithm. [Citation Graph (0, 0)][DBLP ] DCC, 2003, pp:417- [Conf ] Dan Chen , Yi-Jen Chiang , Nasir D. Memon , Xiaolin Wu Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions. [Citation Graph (0, 0)][DBLP ] DCC, 2003, pp:372-381 [Conf ] Dan Chen , Yi-Jen Chiang , Nasir D. Memon , Xiaolin Wu Optimized Prediction for Geometry Compression of Triangle Meshes. [Citation Graph (0, 0)][DBLP ] DCC, 2005, pp:83-92 [Conf ] Nasir D. Memon , Spyros S. Magliveras , Khalid Sayood Prediction Trees and Lossless Image Compression: An Extended Abstract. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1991, pp:83-92 [Conf ] Zan Ouyang , Nasir D. Memon , Torsten Suel Delta Encoding of Related Web Pages. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2001, pp:507- [Conf ] Xiaolin Wu , Wai Kin Choi , Nasir D. Memon Lossless Interframe Image Compression via Context Modeling. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1998, pp:378-387 [Conf ] Mikhail Sosonkin , Gleb Naumovich , Nasir D. Memon Obfuscation of design intent in object-oriented applications. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:142-153 [Conf ] Husrev T. Sencar , Nasir D. Memon Watermarking and ownership problem: a revisit. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2005, pp:93-101 [Conf ] Spyros S. Magliveras , Nasir D. Memon Random Permutations from Logarithmic Signatures. [Citation Graph (0, 0)][DBLP ] Great Lakes Computer Science Conference, 1989, pp:199-205 [Conf ] Ismail Avcibas , Sevinc Bayram , Nasir D. Memon , Mahalingam Ramkumar , Bülent Sankur A classifier design for detecting Image manipulations. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2645-2648 [Conf ] Ismail Avcibas , Nasir D. Memon , Bülent Sankur Image steganalysis with binary similarity measures. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2002, pp:645-648 [Conf ] S. Carver , Nasir D. Memon , Boon-Lock Yeo , Minerva M. Yeung On the Invertibility of Invisible Watermarking Techniques. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1997, pp:540-543 [Conf ] Rajarathnam Chandramouli , Nasir D. Memon Analysis of LSB based image steganography techniques. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2001, pp:1019-1022 [Conf ] Sorina Dumitrescu , Xiaolin Wu , Nasir D. Memon On steganalysis of random LSB embedding in continuous-tone images. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2002, pp:641-644 [Conf ] Ming Jian , Nasir D. Memon , Edward Wong , Xiaolin Wu Quantitative steganalysis of binary images. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:29-32 [Conf ] Mehdi Kharrazi , Husrev T. Sencar , Nasir D. Memon Blind source camera identification. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:709-712 [Conf ] Nasir D. Memon Adaptive Coding of DCT Coefficients by Golomb-Rice Codes. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1998, pp:516-520 [Conf ] Nasir D. Memon , Nader Moayeri A new error criterion for near-lossless image compression. [Citation Graph (0, 0)][DBLP ] ICIP (3), 1997, pp:662- [Conf ] Nasir D. Memon , David L. Neuhoff , Sunil M. Shende Optimizing Prediction Gain in Symmetric Axial Scans. [Citation Graph (0, 0)][DBLP ] ICIP, 2000, pp:- [Conf ] Nasir D. Memon , David L. Neuhoff , Sunil M. Shende On Scanning Techniques for Lossless Image Coding with Limited Context Supports. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1998, pp:503-507 [Conf ] Nasir D. Memon , Sibabrata Ray , Khalid Sayood Differential Lossless Encoding of Images Using Non-linear Predictive Techniques. [Citation Graph (0, 0)][DBLP ] ICIP (3), 1994, pp:841-845 [Conf ] Nasir D. Memon , Xiaolin Wu , Boon-Lock Yeo Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms. [Citation Graph (0, 0)][DBLP ] ICIP (3), 1998, pp:891-895 [Conf ] Debargha Mukherjee , Nasir Memon , Amir Said JPEG-matched MRC compression of compound documents. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2001, pp:434-437 [Conf ] Regunathan Radhakrishnan , Nasir D. Memon On the security of the SARI image authentication system. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2001, pp:971-974 [Conf ] Anubhav Savant , Nasir D. Memon , Torsten Suel On the scalability of an image transcoding proxy server. [Citation Graph (0, 0)][DBLP ] ICIP (1), 2003, pp:209-212 [Conf ] Sevinc Bayram , Husrev T. Sencar , Nasir D. Memon , Ismail Avcibas Source camera identification based on CFA interpolation. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2005, pp:69-72 [Conf ] Kulesh Shanmugasundaram , Nasir D. Memon Network Monitoring for Security and Forensics. [Citation Graph (0, 0)][DBLP ] ICISS, 2006, pp:56-70 [Conf ] M. Jiang , X. Wu , E. K. Wong , A. Memon Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:883-886 [Conf ] M. Ramkumar , N. Memon A system for digital rights management using key predistribution. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:431-434 [Conf ] Vikram Anantapadmanabhan , Phyllis G. Frankl , Nasir D. Memon , Gleb Naumovich Design of a Laboratory for Information Security Education. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:61-73 [Conf ] Kulesh Shanmugasundaram , Hervé Brönnimann , Nasir D. Memon Integrating Digital Forensics in Network Infrastructures. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:127-140 [Conf ] Rajarathnam Chandramouli , Nasir D. Memon How Many Pixels to Watermark? [Citation Graph (0, 0)][DBLP ] ITCC, 2000, pp:11-15 [Conf ] Rajarathnam Chandramouli , Mehdi Kharrazi , Nasir D. Memon Image Steganography and Steganalysis: Concepts and Practice. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:35-49 [Conf ] Rajarathnam Chandramouli , Nasir D. Memon A distributed detection framework for Steganalysis. [Citation Graph (0, 0)][DBLP ] ACM Multimedia Workshops, 2000, pp:123-126 [Conf ] Kulesh Shanmugasundaram , Nasir D. Memon , Anubhav Savant , Hervé Brönnimann ForNet: A Distributed Forensics Network. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:1-16 [Conf ] Nasir D. Memon , Sunil M. Shende , Ping Wah Wong On the Security of the Yeung Mintzer Authentication Watermark. [Citation Graph (0, 0)][DBLP ] PICS, 1999, pp:301-306 [Conf ] Scott Craver , Nasir D. Memon , Boon-Lock Yeo , Minerva M. Yeung Can Invisible Watermarks Resolve Rightful Ownerships? [Citation Graph (0, 0)][DBLP ] Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:310-321 [Conf ] Matthew J. Holliman , Nasir D. Memon , Boon-Lock Yeo , Minerva M. Yeung Adaptive Public Watermarking of DCT-Based Compressed Images. [Citation Graph (0, 0)][DBLP ] Storage and Retrieval for Image and Video Databases (SPIE), 1998, pp:284-295 [Conf ] Mehdi Kharrazi , Husrev T. Sencar , Nasir D. Memon Benchmarking steganographic and steganalysis techniques. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:252-263 [Conf ] Ismail Avcibas , Nasir D. Memon , Bülent Sankur , Khalid Sayood Lossless and near-lossless image compression with successive refinement. [Citation Graph (0, 0)][DBLP ] VCIP, 2001, pp:41-52 [Conf ] Zan Ouyang , Nasir D. Memon , Torsten Suel , Dimitre Trendafilov Cluster-Based Delta Compression of a Collection of Files. [Citation Graph (0, 0)][DBLP ] WISE, 2002, pp:257-268 [Conf ] Nasir D. Memon , Ping Wah Wong Protecting Digital Media Content. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1998, v:41, n:7, pp:34-43 [Journal ] Nasir D. Memon , Xiaolin Wu Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression. [Citation Graph (0, 0)][DBLP ] Comput. J., 1997, v:40, n:2/3, pp:127-136 [Journal ] Gleb Naumovich , Nasir D. Memon Preventing Piracy, Reverse Engineering, and Tampering. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:7, pp:64-71 [Journal ] K. Gopalakrishnan , Nasir D. Memon , Poorvi L. Vora Protocols for Watermark Verification. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2001, v:8, n:4, pp:66-70 [Journal ] Spyros S. Magliveras , Nasir D. Memon Algebraic Properties of Cryptosystem PGM. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1992, v:5, n:3, pp:167-183 [Journal ] Nasir D. Memon , Khalid Sayood , Spyros S. Magliveras Lossless Image Compression with a Codebook of Block Scans. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1995, v:13, n:1, pp:24-30 [Journal ] Jana Dittmann , Stefan Katzenbeisser , Nasir D. Memon Editorial. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:3, pp:215- [Journal ] Ismail Avcibas , Nasir D. Memon , Bülent Sankur , Khalid Sayood A successively refinable lossless image-coding algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2005, v:53, n:3, pp:445-452 [Journal ] Regunathan Radhakrishnan , Nasir D. Memon On the security of the digest function in the SARI image authentication system. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2002, v:12, n:11, pp:1030-0 [Journal ] Mehdi Kharrazi , Husrev T. Sencar , Nasir D. Memon Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:123-137 [Journal ] Joseph Zambreno , Alok N. Choudhary , Rahul Simha , Bhagirath Narahari , Nasir D. Memon SAFE-OPS: An approach to embedded software security. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2005, v:4, n:1, pp:189-210 [Journal ] Ismail Avcibas , Nasir D. Memon , Bülent Sankur Steganalysis using image quality metrics. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2003, v:12, n:2, pp:221-229 [Journal ] Matthew J. Holliman , Nasir D. Memon Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2000, v:9, n:3, pp:432-441 [Journal ] Nasir D. Memon , David L. Neuhoff , Sunil M. Shende An analysis of some common scanning techniques for lossless image coding. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2000, v:9, n:11, pp:1837-1848 [Journal ] Nasir D. Memon , Khalid Sayood Scan predictive vector quantization of multispectral images. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1996, v:5, n:2, pp:330-337 [Journal ] Nasir D. Memon , Ayalur Venkateswaran On ordering color maps for lossless predictive coding. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1996, v:5, n:11, pp:1522-1527 [Journal ] Nasir D. Memon , Ping Wah Wong A buyer-seller watermarking protocol. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2001, v:10, n:4, pp:643-649 [Journal ] Xiaolin Wu , Nasir D. Memon Context-based lossless interband compression-extending CALIC. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2000, v:9, n:6, pp:994-1001 [Journal ] Ping Wah Wong , Nasir D. Memon Secret and public key image watermarking schemes for image authentication and ownership verification. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2001, v:10, n:10, pp:1593-1601 [Journal ] Nasir D. Memon , Xuan Kong , J. Cinkler Context-based lossless and near-lossless compression of EEG signals. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Technology in Biomedicine, 1999, v:3, n:3, pp:231-238 [Journal ] Hamza Özer , Bülent Sankur , Nasir D. Memon , Ismail Avcibas Detection of audio covert channels using statistical footprints of hidden messages. [Citation Graph (0, 0)][DBLP ] Digital Signal Processing, 2006, v:16, n:4, pp:389-401 [Journal ] Yagiz Sutcu , Qiming Li , Nasir Memon Secure Biometric Templates from Fingerprint-Face Features. [Citation Graph (0, 0)][DBLP ] CVPR, 2007, pp:- [Conf ] Mehdi Kharrazi , Taha T. Sencar , Nasir D. Memon Cover Selection for Steganographic Embedding. [Citation Graph (0, 0)][DBLP ] ICIP, 2006, pp:117-120 [Conf ] Sintayehu Dehnie , Taha H. Sencar , Nasir D. Memon Digital Image Forensics for Identifying Computer Generated and Digital Camera Images. [Citation Graph (0, 0)][DBLP ] ICIP, 2006, pp:2313-2316 [Conf ] Dan Chen , Yi-Jen Chiang , Nasir D. Memon , Xiaolin Wu Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids. [Citation Graph (0, 0)][DBLP ] EuroVis, 2006, pp:275-282 [Conf ] Qiming Li , Nasir Memon Security Models of Digital Watermarking. [Citation Graph (0, 0)][DBLP ] MCAM, 2007, pp:60-64 [Conf ] Sintayehu Dehnie , Husrev T. Sencar , Nasir D. Memon Detecting Malicious Behavior in Cooperative Diversity. [Citation Graph (0, 0)][DBLP ] CISS, 2007, pp:895-899 [Conf ] Husrev T. Sencar , Qiming Li , Nasir Memon A new approach to countering ambiguity attacks. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:205-214 [Conf ] Yagiz Sutcu , Husrev T. Sencar , Nasir Memon A secure biometric authentication scheme based on robust hashing. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2005, pp:111-116 [Conf ] Hamza Özer , Bülent Sankur , Nasir D. Memon An SVD-based audio watermarking technique. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2005, pp:51-56 [Conf ] Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. [Citation Graph (, )][DBLP ] Efficient Detection of Delay-Constrained Relay Nodes. [Citation Graph (, )][DBLP ] Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes. [Citation Graph (, )][DBLP ] CoCoST: A Computational Cost Efficient Classifier. [Citation Graph (, )][DBLP ] Tamper Detection Based on Regularity of Wavelet Transform Coefficients. [Citation Graph (, )][DBLP ] New Features to Identify Computer Generated Images. [Citation Graph (, )][DBLP ] Practical Security of Non-Invertiblewatermarking Schemes. [Citation Graph (, )][DBLP ] Image tamper detection based on demosaicing artifacts. [Citation Graph (, )][DBLP ] Improvements on Sensor Noise Based Source Camera Identification. [Citation Graph (, )][DBLP ] Robust Document Image Authentication. [Citation Graph (, )][DBLP ] Identifying Digital Cameras Using CFA Interpolation. [Citation Graph (, )][DBLP ] Video copy detection based on source device characteristics: a complementary approach to content-based methods. [Citation Graph (, )][DBLP ] Cooperative diversity with selfish users. [Citation Graph (, )][DBLP ] Authentication using graphical passwords: effects of tolerance and image choice. [Citation Graph (, )][DBLP ] Modeling user choice in the PassPoints graphical password scheme. [Citation Graph (, )][DBLP ] A simple technique for estimating message lengths for additive noise steganography. [Citation Graph (, )][DBLP ] A Stochastic Model for Misbehaving Relays in Cooperative Diversity. [Citation Graph (, )][DBLP ] Flatbed scanner identification based on dust and scratches over scanner platen. [Citation Graph (, )][DBLP ] A dynamic game model for Amplify-and-Forward cooperative communications. [Citation Graph (, )][DBLP ] An efficient and robust method for detecting copy-move forgery. [Citation Graph (, )][DBLP ] Efficient techniques for sensor fingerprint matching in large image and video databases. [Citation Graph (, )][DBLP ] Classification of digital camera-models based on demosaicing artifacts. [Citation Graph (, )][DBLP ] Search in 0.071secs, Finished in 0.076secs