No photo of Nasir Memon

Nasir Memon

Full Professor CIS; Principal Investigator

    1990 …2019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    Filter
    Conference contribution
    2010

    Tracking encrypted voip calls via robust hashing of network flows

    Coskun, B. & Memon, N., Nov 8 2010, 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings. p. 1818-1821 4 p. 5495398. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2009

    A dynamic game model for amplify-and-forward cooperative communications

    Dehnie, S. & Memon, N., Sep 23 2009, 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings, ICASSP 2009. p. 3485-3488 4 p. 4960376. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    An efficient and robust method for detecting copy-move forgery

    Bayram, S., Sencar, H. T. & Memon, N., Sep 23 2009, 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings, ICASSP 2009. p. 1053-1056 4 p. 4959768. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    CoCoST: A computational cost sensitive classifier

    Li, L., Topkara, U., Coskun, B. & Memon, N., Dec 1 2009, ICDM 2009 - The 9th IEEE International Conference on Data Mining. p. 268-277 10 p. 5360252. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Design and analysis of fuzzy extractors for faces

    Sutcu, Y., Li, Q. & Memon, N., Sep 14 2009, Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI. 73061X. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 7306).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Flatbed scanner identification based on dust and scratches over scanner platen

    Dirik, A. E., Sencar, H. T. & Memon, N., Sep 23 2009, 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings, ICASSP 2009. p. 1385-1388 4 p. 4959851. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Identification and recovery of JPEG files with missing fragments

    Sencar, H. T. & Memon, N., 2009, DFRWS 2009 Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Image tamper detection based on demosaicing artifacts

    Dirik, A. E. & Memon, N., Jan 1 2009, 2009 IEEE International Conference on Image Processing, ICIP 2009 - Proceedings. IEEE Computer Society, p. 1497-1500 4 p. 5414611. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Online sketching of network flows for real-time stepping-stone detection

    Coskun, B. & Memon, N., Dec 1 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. p. 473-483 11 p. 5380704. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Out-of-core progressive lossless compression and selective decompression of large triangle meshes

    Du, Z., Jaromersky, P., Chiang, Y. J. & Memon, N., 2009, Proceedings - 2009 Data Compression Conference, DCC 2009. p. 420-429 10 p. 4976486. (Proceedings - 2009 Data Compression Conference, DCC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Source class identification for DSLR and compact cameras

    Fang, Y., Dirik, A. E., Sun, X. & Memon, N., Dec 1 2009, 2009 IEEE International Workshop on Multimedia Signal Processing, MMSP '09. 5293342. (2009 IEEE International Workshop on Multimedia Signal Processing, MMSP '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2008

    A stochastic model for misbehaving relays in cooperative diversity

    Dehnie, S. & Memon, N., Sep 18 2008, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. p. 482-487 6 p. 4489121. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cooperative diversity as a dynamic game with incomplete information

    Dehnie, S. & Memon, N., Dec 1 2008, 2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success. 4753035. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cooperative diversity with selfish users

    Dehnie, S. & Memon, N., Sep 22 2008, CISS 2008, The 42nd Annual Conference on Information Sciences and Systems. p. 1184-1188 5 p. 4558698. (CISS 2008, The 42nd Annual Conference on Information Sciences and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detecting file fragmentation point using sequential hypothesis testing

    Pal, A., Sencar, H. T. & Memon, N., 2008, DFRWS 2008 Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detection of misbehavior in cooperative diversity

    Dehnie, S. & Memon, N., Dec 1 2008, 2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success. 4753037. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Video copy detection based on source device characteristics: A complementary approach to content-based methods

    Bayram, S., Sencar, H. T. & Memon, N., Dec 1 2008, Proceedings of the 1st International ACM Conference on Multimedia Information Retrieval, MIR2008, Co-located with the 2008 ACM International Conference on Multimedia, MM'08. p. 435-442 8 p. (Proceedings of the 1st International ACM Conference on Multimedia Information Retrieval, MIR2008, Co-located with the 2008 ACM International Conference on Multimedia, MM'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2007

    A geometric transformation to protect minutiae-based fingerprint templates

    Sutcu, Y., Sencar, H. T. & Memon, N., Nov 5 2007, Biometric Technology for Human Identification IV. 65390E. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6539).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new approach to countering ambiguity attacks

    Sencar, H. T., Li, Q. & Memon, N., Dec 1 2007, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. p. 205-214 10 p. (MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cooperative diversity in the presence of a misbehaving relay: Performance analysis

    Dehnie, S., Senear, H. T. & Memon, N., Dec 1 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567377. (2007 IEEE Sarnoff Symposium, SARNOFF).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detecting malicious behavior in cooperative diversity

    Dehnie, S., Senear, H. T. & Memon, N., Dec 1 2007, Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings. p. 895-899 5 p. 4298437. (Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient detection of delay-constrained relay nodes

    Coskun, B. & Memon, N., Dec 1 2007, Proceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007. p. 353-362 10 p. 04413002. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How to protect biometrie templates

    Sutcu, Y., Li, Q. & Memon, N., Sep 3 2007, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents IX. 650514. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6505).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improvements on sensor noise based source camera identification

    Sutcu, Y., Bayram, S., Sencar, H. T. & Memon, N., Dec 1 2007, Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007. p. 24-27 4 p. 4284577. (Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Modeling user choice in the PassPoints graphical password scheme

    Dirik, A. E., Memon, N. & Birget, J. C., Dec 14 2007, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security. p. 20-28 9 p. (ACM International Conference Proceeding Series; vol. 229).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    New features to identify computer generated images

    Dirik, A. E., Bayram, S., Senear, H. T. & Memon, N., Jan 1 2007, 2007 IEEE International Conference on Image Processing, ICIP 2007 Proceedings. IEEE Computer Society, p. IV433-IV436 4380047. (Proceedings - International Conference on Image Processing, ICIP; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Practical security of non-invertible watermarking schemes

    Li, Q. & Memon, N., Jan 1 2007, 2007 IEEE International Conference on Image Processing, ICIP 2007 Proceedings. IEEE Computer Society, p. IV445-IV448 4380050. (Proceedings - International Conference on Image Processing, ICIP; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Robust document image authentication

    Jiang, M., Wong, E. K. & Memon, N., Dec 1 2007, Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007. p. 1131-1134 4 p. 4284854. (Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Secure biometric templates from fingerprint-face features

    Sutcu, Y., Li, Q. & Memon, N., Oct 12 2007, 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR'07. 4270383. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security models of digital watermarking

    Li, Q. & Memon, N., Dec 24 2007, Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. p. 60-64 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4577 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Source camera identification based on sensor dust characteristics

    Dirik, A. E., Senear, H. T. & Memon, N., 2007, Proceedings - SAFE 2007: Workshop on Signal Processing Applications for Public Security and Forensics. Institute of Electrical and Electronics Engineers Inc., 4218950

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Volleystore: A parasitic storage framework

    Rosenfeld, K., Sencar, H. T. & Memon, N., Dec 1 2007, Proceedings of the 2007 IEEEWorkshop on Information Assurance, IAW'07. p. 67-75 9 p. 4267544. (Proceedings of the 2007 IEEE Workshop on Information Assurance, IAW).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2006

    An SVD-based audio watermarking technique

    Özer, H., Sankur, B. & Memon, N., Sep 4 2006, Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05. p. 51-56 6 p. (Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A secure biometric authentication scheme based on robust hashing

    Sutcu, Y., Sencar, H. T. & Memon, N., Sep 4 2006, Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05. p. 111-116 6 p. (Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Confusion/diffusion capabilities of some robust hash functions

    Coskun, B. & Memon, N., Jan 1 2006, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1188-1193 6 p. 4067986. (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cover selection for steganographic embedding

    Kharrazi, M., Sencar, H. T. & Memon, N., Dec 1 2006, 2006 IEEE International Conference on Image Processing, ICIP 2006 - Proceedings. p. 117-120 4 p. 4106480. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Digital image forensics for identifying computer generated and digital camera images

    Dehnie, S., Sencar, T. & Memon, N., Dec 1 2006, 2006 IEEE International Conference on Image Processing, ICIP 2006 - Proceedings. p. 2313-2316 4 p. 4107029. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improving steganalysis by fusion techniques: A case study with image steganography

    Kharrazi, M., Senear, H. T. & Memon, N., Jan 1 2006, Transactions on Data Hiding and Multimedia Security I. Springer Verlag, p. 123-137 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4300 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improving steganalysis by fusion techniques: A case study with image steganography

    Kharrazi, M., Sencar, H. T. & Memon, N., Apr 17 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging. 607205. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6072).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Network monitoring for security and forensics

    Shanmugasundaram, K. & Memon, N., Jan 1 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Atluri, V. & Bagchi, A. (eds.). Springer Verlag, p. 56-70 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Protocol masking to evade network surveillance

    Nurilov, S., Shanmugasundaram, K. & Memon, N., Jan 1 2006, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1467-1472 6 p. 4068037. (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Secure sketch for biometric templates

    Li, Q., Sutcu, Y. & Memon, N., Dec 1 2006, Advances in Cryptology - ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security issues in watermarking applications - A deeper look

    Li, Q., Memon, N. & Sencar, H. T., Dec 1 2006, Proceedings of the ACM International Workshop on Multimedia Contents Protection and Security, MCPS 2006. p. 23-28 6 p. (Proceedings of the ACM International Multimedia Conference and Exhibition).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Tamper detection based on regularity of wavelet transform coefficients

    Sutcu, Y., Coskun, B., Sencar, H. T. & Memon, N., Dec 1 2006, 2007 IEEE International Conference on Image Processing, ICIP 2007 Proceedings. p. I397-I400 4378975. (Proceedings - International Conference on Image Processing, ICIP; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2005

    A DRM based on renewable broadcast encryption

    Ramkumar, M. & Memon, N., 2005, Proceedings of SPIE - The International Society for Optical Engineering. Li, S., Pereira, F., Shum, H. Y. & Tescher, A. G. (eds.). 2 ed. Vol. 5960. p. 1101-1111 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A hierarchical key pre-distribution scheme

    Ramkumar, M., Memon, N. & Simha, R., Dec 1 2005, 2005 IEEE International Conference on Electro Information Technology. 1626994. (2005 IEEE International Conference on Electro Information Technology; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication using graphical passwords: Effects of tolerance and image choice

    Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A. & Memon, N., Dec 1 2005, SOUPS 2005 - Proceedings of the Symposium on Usable Privacy and Security. p. 1-12 12 p. (ACM International Conference Proceeding Series; vol. 93).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Benchmarking steganographic and steganalysis techniques

    Kharrazi, M., Sencar, H. T. & Memon, N., 2005, Proceedings of SPIE - The International Society for Optical Engineering. Delp III, E. J. & Wong, P. W. (eds.). Vol. 5681. p. 252-263 12 p. 26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Geometry compression of tetrahedral meshes using optimized prediction

    Chen, D., Chiang, Y. J., Memon, N. & Wu, X., Dec 1 2005, 13th European Signal Processing Conference, EUSIPCO 2005. p. 1906-1909 4 p. (13th European Signal Processing Conference, EUSIPCO 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Image manipulation detection with Binary Similarity Measures

    Bayram, S., Avcibaş, I., Sankur, B. & Memon, N., Dec 1 2005, 13th European Signal Processing Conference, EUSIPCO 2005. p. 2139-2142 4 p. (13th European Signal Processing Conference, EUSIPCO 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution