Follow
Nasir Memon
Nasir Memon
Professor of Comp Sc. and Eng, New York University, Tandon School of Engineering
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Context-based, adaptive, lossless image coding
X Wu, N Memon
IEEE transactions on Communications 4 (45), 437-444, 1997
14301997
PassPoints: Design and longitudinal evaluation of a graphical password system
S Wiedenbeck, J Waters, JC Birget, A Brodskiy, N Memon
International journal of human-computer studies 63 (1-2), 102-127, 2005
11122005
Using host symptoms, host roles, and/or host reputation for detection of host infection
N Memon, K Shanmugasundaram
US Patent App. 12/723,272, 2010
8952010
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
8751998
Secret and public key image watermarking schemes for image authentication and ownership verification
PW Wong, N Memon
IEEE transactions on image processing 10 (10), 1593-1601, 2001
8442001
Steganalysis using image quality metrics
I Avcibas, N Memon, B Sankur
IEEE transactions on Image Processing 12 (2), 221-229, 2003
7712003
An efficient and robust method for detecting copy-move forgery
S Bayram, HT Sencar, N Memon
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
7122009
Analysis of LSB based image steganography techniques
R Chandramouli, N Memon
Proceedings 2001 international conference on image processing (Cat. No …, 2001
6922001
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
M Holliman, N Memon
IEEE Transactions on image processing 9 (3), 432-441, 2000
6602000
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004
623*2004
Authentication using graphical passwords: Effects of tolerance and image choice
S Wiedenbeck, J Waters, JC Birget, A Brodskiy, N Memon
Proceedings of the 2005 symposium on Usable privacy and security, 1-12, 2005
6192005
A buyer-seller watermarking protocol
N Memon, PW Wong
IEEE Transactions on image processing 10 (4), 643-649, 2001
5452001
Source camera identification based on CFA interpolation
S Bayram, H Sencar, N Memon, I Avcibas
IEEE international conference on image processing 2005 3, III-69, 2005
4702005
Blind source camera identification
M Kharrazi, HT Sencar, N Memon
2004 International Conference on Image Processing, 2004. ICIP'04. 1, 709-712, 2004
4692004
Protecting digital media content
N Memon, PW Wong
Communications of the ACM 41 (7), 35-43, 1998
4101998
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
N Sae-Bae, K Ahmed, K Isbister, N Memon
proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
4062012
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
4031997
Modeling user choice in the PassPoints graphical password scheme
AE Dirik, N Memon, JC Birget
Proceedings of the 3rd symposium on Usable privacy and security, 20-28, 2007
3472007
Image steganalysis with binary similarity measures
İ Avcıbaş, M Kharrazi, N Memon, B Sankur
EURASIP Journal on Advances in Signal Processing 2005, 1-9, 2005
3462005
Protecting biometric templates with sketch: Theory and practice
Y Sutcu, Q Li, N Memon
IEEE Transactions on Information Forensics and Security 2 (3), 503-512, 2007
3162007
The system can't perform the operation now. Try again later.
Articles 1–20