Nasir Memon
Nasir Memon
Professor of Comp Sc. and Eng, New York University, Tandon School of Engineering
Verified email at - Homepage
Cited by
Cited by
Context-based, adaptive, lossless image coding
X Wu, N Memon
IEEE transactions on Communications 4 (45), 437-444, 1997
PassPoints: Design and longitudinal evaluation of a graphical password system
S Wiedenbeck, J Waters, JC Birget, A Brodskiy, N Memon
International journal of human-computer studies 63 (1-2), 102-127, 2005
Using host symptoms, host roles, and/or host reputation for detection of host infection
N Memon, K Shanmugasundaram
US Patent App. 12/723,272, 2010
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
Secret and public key image watermarking schemes for image authentication and ownership verification
PW Wong, N Memon
IEEE transactions on image processing 10 (10), 1593-1601, 2001
Steganalysis using image quality metrics
I Avcibas, N Memon, B Sankur
IEEE transactions on Image Processing 12 (2), 221-229, 2003
An efficient and robust method for detecting copy-move forgery
S Bayram, HT Sencar, N Memon
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
Analysis of LSB based image steganography techniques
R Chandramouli, N Memon
Proceedings 2001 international conference on image processing (Cat. No …, 2001
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
M Holliman, N Memon
IEEE Transactions on image processing 9 (3), 432-441, 2000
Authentication using graphical passwords: Effects of tolerance and image choice
S Wiedenbeck, J Waters, JC Birget, A Brodskiy, N Memon
Proceedings of the 2005 symposium on Usable privacy and security, 1-12, 2005
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004
A buyer-seller watermarking protocol
N Memon, PW Wong
IEEE Transactions on image processing 10 (4), 643-649, 2001
Source camera identification based on CFA interpolation
S Bayram, H Sencar, N Memon, I Avcibas
IEEE international conference on image processing 2005 3, III-69, 2005
Blind source camera identification
M Kharrazi, HT Sencar, N Memon
2004 International Conference on Image Processing, 2004. ICIP'04. 1, 709-712, 2004
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
N Sae-Bae, K Ahmed, K Isbister, N Memon
proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
Protecting digital media content
N Memon, PW Wong
Communications of the ACM 41 (7), 35-43, 1998
Modeling user choice in the PassPoints graphical password scheme
AE Dirik, N Memon, JC Birget
Proceedings of the 3rd symposium on Usable privacy and security, 20-28, 2007
Image steganalysis with binary similarity measures
İ Avcıbaş, M Kharrazi, N Memon, B Sankur
EURASIP Journal on Advances in Signal Processing 2005, 1-9, 2005
Protecting biometric templates with sketch: Theory and practice
Y Sutcu, Q Li, N Memon
IEEE Transactions on Information Forensics and Security 2 (3), 503-512, 2007
The system can't perform the operation now. Try again later.
Articles 1–20