Nasir D. Memon

Orcid: 0000-0002-0103-9762

Affiliations:
  • NYU Polytechnic School of Engineering, Department of Computer Science and Engineering
  • New York University Tandon School of Engineering, Department of Computer Science and Engineering
  • Northern Illinois University, DeKalb, Department of Computer Science


According to our database1, Nasir D. Memon authored at least 290 papers between 1989 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2011, "For contributions to media security and compression".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mitigating the Impact of Attribute Editing on Face Recognition.
CoRR, 2024

AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response.
CoRR, 2024

Alpha-Wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2024

Gotcha: Real-Time Video Deepfake Detection via Challenge-Response.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Information Forensics and Security: A quarter-century-long journey.
IEEE Signal Process. Mag., July, 2023

The Effect of Inverse Square Law of Light on ENF in Videos Exposed by Rolling Shutter.
IEEE Trans. Inf. Forensics Secur., 2023

Dictionary Attacks on Speaker Verification.
IEEE Trans. Inf. Forensics Secur., 2023

Fair GANs through model rebalancing with synthetic data.
CoRR, 2023

Zero-Shot Racially Balanced Dataset Generation using an Existing Biased StyleGAN2.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Identity-Preserving Aging of Face Images via Latent Diffusion Models.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
File Fragment Type (FFT) - 75 Dataset.
Dataset, May, 2022

Computational Sensor Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2022

ENF Based Robust Media Time-Stamping.
IEEE Signal Process. Lett., 2022

True or False: Studying the Work Practices of Professional Fact-Checkers.
Proc. ACM Hum. Comput. Interact., 2022

Gotcha: A Challenge-Response System for Real-Time Deepfake Detection.
CoRR, 2022

Cross-Platform Multimodal Misinformation: Taxonomy, Characteristics and Detection for Textual Posts and Videos.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

A Dataless FaceSwap Detection Approach Using Synthetic Images.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

2021
FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Crossing the Bridge to STEM: Retaining Women Students in an Online CS Conversion Program.
ACM Trans. Comput. Educ., 2021

COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs.
Proceedings of the NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25, 2021

Hard-Attention for Scalable Image Classification.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Effect of Video Pixel-Binning on Source Attribution of Mixed Media.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Camera Fingerprint Extraction via Spatial Domain Averaged Frames.
IEEE Trans. Inf. Forensics Secur., 2020

Camera identification of multi-format devices.
Pattern Recognit. Lett., 2020

Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities.
IEEE J. Sel. Top. Signal Process., 2020

Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection.
CoRR, 2020

IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference.
IEEE Access, 2020

Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations.
Proceedings of the 8th International Conference on Learning Representations, 2020

Effects of Credibility Indicators on Social Media News Sharing Intent.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Analysis of Rolling Shutter Effect on ENF-Based Video Forensics.
IEEE Trans. Inf. Forensics Secur., 2019

Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments.
IEEE Trans. Inf. Forensics Secur., 2019

Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey.
IEEE Trans. Biom. Behav. Identity Sci., 2019

FiFTy: Large-scale File Fragment Type Identification using Neural Networks.
CoRR, 2019

Source Camera Attribution of Multi-Format Devices.
CoRR, 2019

Neural Imaging Pipelines - the Scourge or Hope of Forensics?
CoRR, 2019

Kid on the phone! Toward automatic detection of children on mobile devices.
Comput. Secur., 2019

Adversarial Optimization for Dictionary Attacks on Speaker Verification.
Proceedings of the 20th Annual Conference of the International Speech Communication Association, 2019

Factors Affecting Enf Based Time-of-recording Estimation for Video.
Proceedings of the IEEE International Conference on Acoustics, 2019

Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

MasterPrint Attack Resistance: A Maximum Cover Based Approach for Automatic Fingerprint Template Selection.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

2018
Introduction to the special issue on integrating biometrics and forensics.
Pattern Recognit. Lett., 2018

Distinctiveness, complexity, and repeatability of online signature templates.
Pattern Recognit., 2018

Tap-based user authentication for smartwatches.
Comput. Secur., 2018

Towards Camera Identification from Cropped Query Images.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Keynotes.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Emerging NUI-based methods for user authentication.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Evolutionary Methods for Generating Synthetic MasterPrint Templates: Dictionary Attack in Fingerprint Recognition.
Proceedings of the 2018 International Conference on Biometrics, 2018

Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution<sup>*</sup>.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

Encrypted Domain Skin Tone Detection For Pornographic Image Filtering.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

2017
PRNU-Based Camera Attribution From Multiple Seam-Carved Images.
IEEE Trans. Inf. Forensics Secur., 2017

MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2017

IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images.
IEEE Trans. Inf. Forensics Secur., 2017

How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight].
IEEE Signal Process. Mag., 2017

Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach.
IEEE Signal Process. Lett., 2017

Cultural and Psychological Factors in Cyber-Security.
J. Mobile Multimedia, 2017

DeepMasterPrint: Generating Fingerprints for Presentation Attacks.
CoRR, 2017

Mind your SMSes: Mitigating social engineering in second factor authentication.
Comput. Secur., 2017

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices.
Comput. Secur., 2017

Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool.
Comput. Secur., 2017

Image carving with missing headers and missing fragments.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Smartwatches Locking Methods: A Comparative Study.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Fast camera fingerprint matching in very large databases.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper.
Proceedings of the Financial Cryptography and Data Security, 2017

Detecting Structurally Anomalous Logins Within Enterprise Networks.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

2016
InVEST: Intelligent visual email search and triage.
Digit. Investig., 2016

Source camera attribution using stabilized video.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Detecting malicious logins in enterprise networks using visualization.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

Cultural and psychological factors in cyber-security.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

PRNU based source attribution with a collection of seam-carved images.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing.
IEEE Trans. Inf. Forensics Secur., 2015

Cybersecurity Competitions: The Human Angle.
IEEE Secur. Priv., 2015

Verification Code Forwarding Attack (Short Paper).
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

An HMM-based multi-sensor approach for continuous mobile authentication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Recent advances in counter PRNU based source attribution and beyond.
Proceedings of the Media Watermarking, 2015

Quality of online signature templates.
Proceedings of the IEEE International Conference on Identity, 2015

Investigating users' readiness to trade-off biometric fingerprint data.
Proceedings of the IEEE International Conference on Identity, 2015

Leap Motion Controller for Authentication via Hand Geometry and Gestures.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass.
Proceedings of the Financial Cryptography and Data Security, 2015

Glass OTP: Secure and Convenient User Authentication on Google Glass.
Proceedings of the Financial Cryptography and Data Security, 2015

Photo Forensics: There is More to a Picture Than Meets the Eye.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

2014
Multitouch Gesture-Based Authentication.
IEEE Trans. Inf. Forensics Secur., 2014

Online Signature Verification on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2014

Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution.
IEEE Trans. Inf. Forensics Secur., 2014

Detecting documents forged by printing and copying.
EURASIP J. Adv. Signal Process., 2014

Leveraging Personalization To Facilitate Privacy.
CoRR, 2014

A robust model for paper reviewer assignment.
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014

I-VEST: Intelligent visual email search and triage.
Proceedings of the 9th IEEE Conference on Visual Analytics Science and Technology, 2014

A semi-automatic deshredding method based on curve matching.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Towards automatic detection of child pornography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Finger-drawn pin authentication on touch devices.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

An HMM-based behavior modeling approach for continuous mobile authentication.
Proceedings of the IEEE International Conference on Acoustics, 2014

Touchpad Input for Continuous Biometric Authentication.
Proceedings of the Communications and Multimedia Security, 2014

2013
Phishing, Personality Traits and Facebook
CoRR, 2013

A pilot study of cyber security and privacy related behavior and personality traits.
Proceedings of the 22nd International World Wide Web Conference, 2013

Seam-carving based anonymization against image & video source attribution.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2013

Mining Groups of Common Interest: Discovering Topical Communities with Network Flows.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2013

A cost-effective decision tree based approach to steganalysis.
Proceedings of the Media Watermarking, 2013

Selective Robust Image Encryption for Social Networks.
Proceedings of the Multimedia Communications, Services and Security, 2013

A Simple and Effective Method for Online Signature Verification.
Proceedings of the 2013 BIOSIG, 2013

Secure Sketches for Protecting Biometric Templates.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization.
IEEE Trans. Inf. Forensics Secur., 2012

Winning Cybersecurity One Challenge at a Time.
IEEE Secur. Priv., 2012

Biometric-rich gestures: a novel approach to authentication on multi-touch devices.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Investigating multi-touch gestures as a novel biometric modality.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

2010
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Efficient techniques for sensor fingerprint matching in large image and video databases.
Proceedings of the Media Forensics and Security II, 2010

How to Measure Biometric Information?
Proceedings of the 20th International Conference on Pattern Recognition, 2010

An Ensemble of Classifiers Approach to Steganalysis.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Tracking encrypted VoIP calls via robust hashing of network flows.
Proceedings of the IEEE International Conference on Acoustics, 2010

Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Editorial.
IEEE Trans. Inf. Forensics Secur., 2009

The evolution of file carving.
IEEE Signal Process. Mag., 2009

Digital Forensics.
IEEE Secur. Priv., 2009

Modeling Misbehavior in Cooperative Diversity: A Dynamic Game Approach.
EURASIP J. Adv. Signal Process., 2009

Identification and recovery of JPEG files with missing fragments.
Digit. Investig., 2009

Circuits and systems for real-time security and copyright protection of multimedia.
Comput. Electr. Eng., 2009

Source class identification for DSLR and compact cameras.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009

Image tamper detection based on demosaicing artifacts.
Proceedings of the International Conference on Image Processing, 2009

CoCoST: A Computational Cost Efficient Classifier.
Proceedings of the ICDM 2009, 2009

Flatbed scanner identification based on dust and scratches over scanner platen.
Proceedings of the IEEE International Conference on Acoustics, 2009

A dynamic game model for Amplify-and-Forward cooperative communications.
Proceedings of the IEEE International Conference on Acoustics, 2009

An efficient and robust method for detecting copy-move forgery.
Proceedings of the IEEE International Conference on Acoustics, 2009

Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

Online Sketching of Network Flows for Real-Time Stepping-Stone Detection.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust.
IEEE Trans. Inf. Forensics Secur., 2008

Detecting file fragmentation point using sequential hypothesis testing.
Digit. Investig., 2008

Classification of digital camera-models based on demosaicing artifacts.
Digit. Investig., 2008

A Stochastic Model for Misbehaving Relays in Cooperative Diversity.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Video copy detection based on source device characteristics: a complementary approach to content-based methods.
Proceedings of the 1st ACM SIGMM International Conference on Multimedia Information Retrieval, 2008

Cooperative diversity with selfish users.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Protecting Biometric Templates With Sketch: Theory and Practice.
IEEE Trans. Inf. Forensics Secur., 2007

Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks.
IEEE Trans. Inf. Forensics Secur., 2007

Alphabet Partitioning Techniques for Semiadaptive Huffman Coding of Large Alphabets.
IEEE Trans. Commun., 2007

Special issue on secure knowledge management.
Inf. Syst. Frontiers, 2007

How to protect biometric templates.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Modeling user choice in the PassPoints graphical password scheme.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

A new approach to countering ambiguity attacks.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Security Models of Digital Watermarking.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Improvements on Sensor Noise Based Source Camera Identification.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Robust Document Image Authentication.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Tamper Detection Based on Regularity of Wavelet Transform Coefficients.
Proceedings of the International Conference on Image Processing, 2007

Practical Security of Non-Invertiblewatermarking Schemes.
Proceedings of the International Conference on Image Processing, 2007

New Features to Identify Computer Generated Images.
Proceedings of the International Conference on Image Processing, 2007

Secure Biometric Templates from Fingerprint-Face Features.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

Detecting Malicious Behavior in Cooperative Diversity.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

Efficient Detection of Delay-Constrained Relay Nodes.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Spatio-Temporal Transform Based Video Hashing.
IEEE Trans. Multim., 2006

Automated reassembly of file fragmented images using greedy algorithms.
IEEE Trans. Image Process., 2006

Graphical passwords based on robust discretization.
IEEE Trans. Inf. Forensics Secur., 2006

Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography.
Trans. Data Hiding Multim. Secur., 2006

Performance study of common image steganography and steganalysis techniques.
J. Electronic Imaging, 2006

Image manipulation detection.
J. Electronic Imaging, 2006

Secure collaborations over message boards.
Int. J. Secur. Networks, 2006

Detection of audio covert channels using statistical footprints of hidden messages.
Digit. Signal Process., 2006

Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids.
Proceedings of the 8th Joint Eurographics - IEEE VGTC Symposium on Visualization, 2006

Identifying Digital Cameras Using CFA Interpolation.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Network Monitoring for Security and Forensics.
Proceedings of the Information Systems Security, Second International Conference, 2006

Cover Selection for Steganographic Embedding.
Proceedings of the International Conference on Image Processing, 2006

Digital Image Forensics for Identifying Computer Generated and Digital Camera Images.
Proceedings of the International Conference on Image Processing, 2006

Protocol Masking to Evade Network Surveillance.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

Confusion/Diffusion Capabilities of Some Robust Hash Functions.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

Secure Sketch for Biometric Templates.
Proceedings of the Advances in Cryptology, 2006

2005
Data Masking: A New Approach for Steganography?
J. VLSI Signal Process., 2005

SAFE-OPS: An approach to embedded software security.
ACM Trans. Embed. Comput. Syst., 2005

A successively refinable lossless image-coding algorithm.
IEEE Trans. Commun., 2005

An efficient key predistribution scheme for ad hoc network security.
IEEE J. Sel. Areas Commun., 2005

On the security of the visual hash function.
J. Electronic Imaging, 2005

PassPoints: Design and longitudinal evaluation of a graphical password system.
Int. J. Hum. Comput. Stud., 2005

Perceptual Audio Hashing Functions.
EURASIP J. Adv. Signal Process., 2005

Image Steganalysis with Binary Similarity Measures.
EURASIP J. Adv. Signal Process., 2005

Benchmarking steganographic and steganalysis techniques.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Authentication using graphical passwords: effects of tolerance and image choice.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Steganalysis of Degraded Document Images.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

A secure biometric authentication scheme based on robust hashing.
Proceedings of the 7th workshop on Multimedia & Security, 2005

An SVD-based audio watermarking technique.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Integrating Digital Forensics in Network Infrastructures.
Proceedings of the Advances in Digital Forensics, 2005

Source camera identification based on CFA interpolation.
Proceedings of the 2005 International Conference on Image Processing, 2005

PSteg: steganographic embedding through patching.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Steganalysis of halftone images.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Geometry compression of tetrahedral meshes using optimized prediction.
Proceedings of the 13th European Signal Processing Conference, 2005

Image manipulation detection with Binary Similarity Measures.
Proceedings of the 13th European Signal Processing Conference, 2005

Watermarking and ownership problem: a revisit.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

Optimized Prediction for Geometry Compression of Triangle Meshes.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

2004
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance.
IACR Cryptol. ePrint Arch., 2004

Editorial.
EURASIP J. Adv. Signal Process., 2004

A system for digital rights management using key predistribution.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Steganalysis of boundary-based steganography using autoregressive model of digital boundaries.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Blind source camera identification.
Proceedings of the 2004 International Conference on Image Processing, 2004

Quantitative steganalysis of binary images.
Proceedings of the 2004 International Conference on Image Processing, 2004

A classifier design for detecting Image manipulations.
Proceedings of the 2004 International Conference on Image Processing, 2004

Multiple-description geometry compression for networked interactive 3D graphics.
Proceedings of the Third International Conference on Image and Graphics, 2004

A simple technique for estimating message lengths for additive noise steganography.
Proceedings of the 8th International Conference on Control, 2004

Information flow based routing algorithms for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

An efficient random key pre-distribution scheme.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Robust audio hashing for audio identification.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Payload attribution via hierarchical bloom filters.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

String Matching on the Internet.
Proceedings of the Combinatorial and Algorithmic Aspects of Networking, 2004

Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
On sequential watermark detection.
IEEE Trans. Signal Process., 2003

Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery.
IEEE Trans. Signal Process., 2003

Steganalysis using image quality metrics.
IEEE Trans. Image Process., 2003

Image processing for halftones.
IEEE Signal Process. Mag., 2003

Security of data hiding technologies.
Signal Process., 2003

Editorial.
Multim. Syst., 2003

HARPS: HAshed Random Preloaded Subset Key Distribution.
IACR Cryptol. ePrint Arch., 2003

Robust discretization, with an application to graphical passwords.
IACR Cryptol. ePrint Arch., 2003

Preventing Piracy, Reverse Engineering, and Tampering.
Computer, 2003

Steganalysis of audio based on audio quality metrics.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Steganography capacity: a steganalysis perspective.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

ForNet: A Distributed Forensics Network.
Proceedings of the Computer Network Security, 2003

Image Steganography and Steganalysis: Concepts and Practice.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Design of a Laboratory for Information Security Education.
Proceedings of the Security Education and Critical Infrastructures, 2003

On the scalability of an image transcoding proxy server.
Proceedings of the 2003 International Conference on Image Processing, 2003

Automated reassembly of fragmented images.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Obfuscation of design intent in object-oriented applications.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003

An Error-Resilient Blocksorting Compression Algorithm.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003

Automatic Reassembly of Document Fragments via Context Based Statistical Models.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
On the security of the digest function in the SARI image authentication system.
IEEE Trans. Circuits Syst. Video Technol., 2002

A progressive Lossless/Near-Lossless image compression algorithm.
IEEE Signal Process. Lett., 2002

Cryptanalysis of the Yeung - Mintzer fragile watermarking technique.
J. Electronic Imaging, 2002

Cluster-Based Delta Compression of a Collection of Files.
Proceedings of the 3rd International Conference on Web Information Systems Engineering, 2002

Audio content authentication based on psycho-acoustic model.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Adaptive steganography.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

On steganalysis of random LSB embedding in continuous-tone images.
Proceedings of the 2002 International Conference on Image Processing, 2002

Image steganalysis with binary similarity measures.
Proceedings of the 2002 International Conference on Image Processing, 2002

Data masking: a secure-covert channel paradigm.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
Secret and public key image watermarking schemes for image authentication and ownership verification.
IEEE Trans. Image Process., 2001

A buyer-seller watermarking protocol.
IEEE Trans. Image Process., 2001

Protocols for Watermark Verification.
IEEE Multim., 2001

Lossless and near-lossless image compression with successive refinement.
Proceedings of the Visual Communications and Image Processing 2001, 2001

Data hiding in binary text documents.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Steganalysis of watermarking techniques using image quality metrics.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Steganalysis based on image quality metrics.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

On the security of the SARI image authentication system.
Proceedings of the 2001 International Conference on Image Processing, 2001

JPEG-matched MRC compression of compound documents.
Proceedings of the 2001 International Conference on Image Processing, 2001

Analysis of LSB based image steganography techniques.
Proceedings of the 2001 International Conference on Image Processing, 2001

Delta Encoding of Related Web Pages.
Proceedings of the Data Compression Conference, 2001

Error-Resilient Block Sorting.
Proceedings of the Data Compression Conference, 2001

2000
Context-based lossless interband compression-extending CALIC.
IEEE Trans. Image Process., 2000

An analysis of some common scanning techniques for lossless image coding.
IEEE Trans. Image Process., 2000

Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.
IEEE Trans. Image Process., 2000

Secret and public key authentication watermarking schemes that resist vector quantization attack.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Distortion-bounded authentication techniques.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Further attacks on Yeung-Mintzer fragile watermarking scheme.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

A distributed detection framework for Steganalysis.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

How Many Pixels to Watermark?
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Optimizing Prediction Gain in Symmetric Axial Scans.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Context-based lossless and near-lossless compression of EEG signals.
IEEE Trans. Inf. Technol. Biomed., 1999

Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Watermark extimation through local pixel correlation.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

On the Security of the Yeung Mintzer Authentication Watermark.
Proceedings of the PICS 1999: Proceedings of the Conference on Image Processing, 1999

1998
A 2-D vector excitation coding technique.
Signal Process., 1998

Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications.
IEEE J. Sel. Areas Commun., 1998

Near-lossless image compression techniques.
J. Electronic Imaging, 1998

Protecting Digital Media Content.
Commun. ACM, 1998

Adaptive Public Watermarking of DCT-Based Compressed Images.
Proceedings of the Storage and Retrieval for Image and Video Databases VI, 1998

Improved Techniques for Lossless Image Compression with Reversible Integer Wavelet Transforms.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

On Scanning Techniques for Lossless Image Coding with Limited Context Supports.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Adaptive Coding of DCT Coefficients by Golomb-Rice Codes.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Lossless Interframe Image Compression via Context Modeling.
Proceedings of the Data Compression Conference, 1998

1997
Context-based, adaptive, lossless image coding.
IEEE Trans. Commun., 1997

Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression.
Comput. J., 1997

Can Invisible Watermarks Resolve Rightful Ownerships?
Proceedings of the Storage and Retrieval for Image and Video Databases V, 1997

A new error criterion for near-lossless image compression.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

On the Invertibility of Invisible Watermarking Techniques.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
On ordering color maps for lossless predictive coding.
IEEE Trans. Image Process., 1996

Scan predictive vector quantization of multispectral images.
IEEE Trans. Image Process., 1996

Lossless compression of video sequences.
IEEE Trans. Commun., 1996

CALIC-a context based adaptive lossless image codec.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
Lossless Image Compression with a Codebook of Block Scans.
IEEE J. Sel. Areas Commun., 1995

An asymmetric lossless image compression technique.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

1994
Lossless compression of multispectral image data.
IEEE Trans. Geosci. Remote. Sens., 1994

Differential Lossless Encoding of Images Using Non-linear Predictive Techniques.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

1993
Simple method for enhancing the performance of lossy plus lossless image compression schemes.
J. Electronic Imaging, 1993

1992
Algebraic Properties of Cryptosystem PGM.
J. Cryptol., 1992

1991
Prediction Trees and Lossless Image Compression: An Extended Abstract.
Proceedings of the IEEE Data Compression Conference, 1991

1989
Random Permutations from Logarithmic Signatures.
Proceedings of the Computing in the 90's, 1989

Properties of Cryptosystem PGM.
Proceedings of the Advances in Cryptology, 1989


  Loading...