Nasir D. Memon
#123,424
Most Influential Person Now
Nasir D. Memon's AcademicInfluence.com Rankings
Nasir D. Memonengineering Degrees
Engineering
#3972
World Rank
#5120
Historical Rank
Electrical Engineering
#963
World Rank
#1038
Historical Rank

Nasir D. Memoncomputer-science Degrees
Computer Science
#5070
World Rank
#5356
Historical Rank
Information Management
#46
World Rank
#48
Historical Rank
Algorithms
#169
World Rank
#172
Historical Rank
Database
#2225
World Rank
#2340
Historical Rank

Download Badge
Engineering Computer Science
Nasir D. Memon's Degrees
- PhD Electrical Engineering University of Southern California
- Masters Electrical Engineering University of Southern California
Why Is Nasir D. Memon Influential?
(Suggest an Edit or Addition)Nasir D. Memon's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Context-based, adaptive, lossless image coding (1997) (1063)
- PassPoints: Design and longitudinal evaluation of a graphical password system (2005) (874)
- Steganalysis using image quality metrics (2003) (657)
- Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications (1998) (617)
- Secret and public key image watermarking schemes for image authentication and ownership verification (2001) (616)
- Analysis of LSB based image steganography techniques (2001) (608)
- An efficient and robust method for detecting copy-move forgery (2009) (555)
- Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes (2000) (461)
- Authentication using graphical passwords: effects of tolerance and image choice (2005) (406)
- A buyer-seller watermarking protocol (1998) (400)
- Blind source camera identification (2004) (339)
- Biometric-rich gestures: a novel approach to authentication on multi-touch devices (2012) (319)
- Source camera identification based on CFA interpolation (2005) (317)
- Image Steganography and Steganalysis: Concepts and Practice (2003) (299)
- Protecting digital media content (1998) (289)
- Modeling user choice in the PassPoints graphical password scheme (2007) (287)
- Image Steganalysis with Binary Similarity Measures (2002) (258)
- Can invisible watermarks resolve rightful ownerships? (1997) (245)
- Image manipulation detection (2006) (242)
- Protecting Biometric Templates With Sketch: Theory and Practice (2007) (239)
- Spatio–Temporal Transform Based Video Hashing (2006) (222)
- Context-based lossless interband compression-extending CALIC (2000) (207)
- On steganalysis of random LSB embedding in continuous-tone images (2002) (183)
- Digital Forensics (2009) (180)
- Image Steganography: Concepts and Practice (2004) (173)
- Overview of State-of-the-Art in Digital Image Forensics (2007) (169)
- CALIC-a context based adaptive lossless image codec (1996) (169)
- Image tamper detection based on demosaicing artifacts (2009) (167)
- A secure biometric authentication scheme based on robust hashing (2005) (165)
- Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust (2008) (151)
- Online Signature Verification on Mobile Devices (2014) (150)
- The evolution of file carving (2009) (147)
- A classifier design for detecting image manipulations (2004) (138)
- Data hiding in binary text documents (2001) (131)
- Performance study of common image steganography and steganalysis techniques (2006) (131)
- Secure Biometric Templates from Fingerprint-Face Features (2007) (128)
- A pilot study of cyber security and privacy related behavior and personality traits (2013) (126)
- Secure Sketch for Biometric Templates (2006) (121)
- Steganalysis of audio based on audio quality metrics (2003) (120)
- Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression (1997) (119)
- DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution* (2017) (115)
- Preventing Piracy, Reverse Engineering, and Tampering (2003) (113)
- Digital Image Forensics: There is More to a Picture than Meets the Eye (2012) (112)
- MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems (2017) (111)
- Lossless image compression: a comparative study (1995) (109)
- Multitouch Gesture-Based Authentication (2014) (105)
- Graphical passwords based on robust discretization (2006) (102)
- Detecting file fragmentation point using sequential hypothesis testing (2008) (101)
- Payload attribution via hierarchical bloom filters (2004) (98)
- An efficient key predistribution scheme for ad hoc network security (2005) (97)
- ForNet: A Distributed Forensics Network (2003) (96)
- Digital Image Forensics for Identifying Computer Generated and Digital Camera Images (2006) (96)
- An SVD based audio watermarking technique (2005) (96)
- Lossless compression of multispectral image data (1994) (95)
- Automated reassembly of file fragmented images using greedy algorithms (2006) (95)
- New Features to Identify Computer Generated Images (2007) (94)
- Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (2015) (94)
- Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts (2010) (92)
- IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION (2005) (91)
- Cryptanalysis of the Yeung - Mintzer fragile watermarking technique (2002) (91)
- Classification of digital camera-models based on demosaicing artifacts (2008) (90)
- Algorithms for Delta Compression and Remote File Synchronization (2003) (89)
- Improvements on Sensor Noise Based Source Camera Identification (2007) (87)
- Robust discretization, with an application to graphical passwords (2003) (83)
- An analysis of some common scanning techniques for lossless image coding (1997) (82)
- Source Camera Identification Based on Sensor Dust Characteristics (2007) (79)
- Benchmarking steganographic and steganalysis techniques (2005) (79)
- On the invertibility of invisible watermarking techniques (1997) (76)
- Steganalysis of watermarking techniques using image quality metrics (2001) (75)
- Lossless compression of video sequences (1996) (75)
- Secret and public key authentication watermarking schemes that resist vector quantization attack (2000) (74)
- A robust model for paper reviewer assignment (2014) (74)
- Further attacks on Yeung-Mintzer fragile watermarking scheme (2000) (74)
- Effects of Credibility Indicators on Social Media News Sharing Intent (2020) (72)
- Cover Selection for Steganographic Embedding (2006) (72)
- Steganography capacity: a steganalysis perspective (2003) (71)
- Tamper Detection Based on Regularity of Wavelet Transform Coefficients (2007) (70)
- On ordering color maps for lossless predictive coding (1996) (70)
- A progressive Lossless/Near-Lossless image compression algorithm (2002) (70)
- Protocols for Watermark Verification (2001) (68)
- Image manipulation detection with Binary Similarity Measures (2005) (68)
- DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices (2017) (66)
- Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis (2017) (66)
- Near-lossless image compression techniques (1998) (63)
- Efficient Sensor Fingerprint Matching Through Fingerprint Binarization (2012) (63)
- Obfuscation of design intent in object-oriented applications (2003) (62)
- zdelta: An efficient delta compression tool (2002) (60)
- Perceptual Audio Hashing Functions (2005) (59)
- Identification and recovery of JPEG files with missing fragments (2009) (59)
- Data Masking: A New Approach for Steganography? (2005) (58)
- Cluster-based delta compression of a collection of files (2002) (57)
- Improving steganalysis by fusion techniques: a case study with image steganography (2006) (55)
- Detection of audio covert channels using statistical footprints of hidden messages (2006) (53)
- Algebraic properties of cryptosystem PGM (1992) (53)
- Steganalysis based on image quality metrics (2001) (52)
- Investigating multi-touch gestures as a novel biometric modality (2012) (51)
- Recent developments in document image watermarking and data hiding (2001) (50)
- Source camera attribution using stabilized video (2016) (50)
- SAFE-OPS: An approach to embedded software security (2005) (48)
- Mind your SMSes: Mitigating social engineering in second factor authentication (2017) (46)
- On the Security of the Yeung Mintzer Authentication Watermark (1999) (44)
- Detecting Malicious Behavior in Cooperative Diversity (2007) (44)
- Phishing, Personality Traits and Facebook (2013) (43)
- Leap Motion Controller for Authentication via Hand Geometry and Gestures (2015) (42)
- An efficient random key pre-distribution scheme (2004) (42)
- Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution (2014) (41)
- Detecting documents forged by printing and copying (2014) (39)
- New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network (2017) (38)
- Digital forensics [From the Guest Editors] (2009) (38)
- A geometric transformation to protect minutiae-based fingerprint templates (2007) (37)
- How to protect biometric templates (2007) (37)
- IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images (2017) (36)
- Automatic reassembly of document fragments via context based statistical models (2003) (36)
- The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic (2020) (35)
- An HMM-based behavior modeling approach for continuous mobile authentication (2014) (35)
- Image processing for halftones (2003) (34)
- Towards automatic detection of child pornography (2014) (34)
- Cultural and psychological factors in cyber-security (2016) (34)
- Lossless interframe image compression via context modeling (1998) (34)
- Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass (2015) (34)
- Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool (2017) (33)
- Adaptive coding of DCT coefficients by Golomb-Rice codes (1998) (33)
- Data masking: a secure-covert channel paradigm (2002) (32)
- 14 FROM LINEAR ADAPTIVE FILTERING TO NONLINEAR INFORMATION PROCESSING (2006) (32)
- JPEG-matched MRC compression of compound documents (2001) (32)
- On sequential watermark detection (2003) (31)
- Detecting Structurally Anomalous Logins Within Enterprise Networks (2017) (30)
- Flatbed scanner identification based on dust and scratches over scanner platen (2009) (29)
- Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach (2017) (28)
- Detecting malicious logins in enterprise networks using visualization (2016) (28)
- NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring (2010) (28)
- Winning Cybersecurity One Challenge at a Time (2012) (28)
- Smartwatches Locking Methods: A Comparative Study (2017) (27)
- A simple and effective method for online signature verification (2013) (27)
- Design of A Virtual Laboratory for Information Assurance Education and Research (27)
- On the security of the SARI image authentication system (2001) (26)
- Efficient techniques for sensor fingerprint matching in large image and video databases (2010) (26)
- Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing (2015) (26)
- On the security of the digest function in the SARI image authentication system (2002) (25)
- Video copy detection based on source device characteristics: a complementary approach to content-based methods (2008) (25)
- Automated reassembly of fragmented images (2003) (25)
- Cooperative diversity in the presence of a misbehaving relay : Performance analysis (2007) (25)
- Automatic Reassembly of Document Fragments via Data Compression (2002) (25)
- PRNU-Based Camera Attribution From Multiple Seam-Carved Images (2017) (24)
- Security of visual hash function (2003) (24)
- Online Sketching of Network Flows for Real-Time Stepping-Stone Detection (2009) (23)
- Distortion-bounded authentication techniques (2000) (23)
- Seam-carving based anonymization against image & video source attribution (2013) (23)
- An HMM-based multi-sensor approach for continuous mobile authentication (2015) (23)
- Interband coding extension of the new lossless JPEG standard (1997) (23)
- Automated reassembly of fragmented images (2003) (23)
- How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight] (2017) (22)
- Lossless Image Compression with a Codebook of Block Scans (1995) (22)
- Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery (2003) (22)
- Tap-based User Authentication for Smartwatches (2018) (21)
- A successively refinable lossless image-coding algorithm (2005) (21)
- DeepMasterPrint: Generating Fingerprints for Presentation Attacks (2017) (21)
- Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices (2018) (21)
- Multiple-description geometry compression for networked interactive 3D graphics (2004) (21)
- Quantitative steganalysis of binary images (2004) (21)
- Recent advances in counter PRNU based source attribution and beyond (2015) (20)
- Audio content authentication based on psycho-acoustic model (2002) (20)
- A hierarchical key pre-distribution scheme (2005) (20)
- Design and analysis of fuzzy extractors for faces (2009) (20)
- Finger-drawn pin authentication on touch devices (2014) (19)
- Analysis of Rolling Shutter Effect on ENF-Based Video Forensics (2019) (19)
- How to Measure Biometric Information? (2010) (19)
- Robust audio hashing for audio identification (2004) (19)
- Adaptive steganography (2002) (19)
- Adversarial Optimization for Dictionary Attacks on Speaker Verification (2019) (19)
- Improved techniques for lossless image compression with reversible integer wavelet transforms (1998) (18)
- Security issues in watermarking applications - a deeper look (2006) (18)
- Evolutionary Methods for Generating Synthetic MasterPrint Templates: Dictionary Attack in Fingerprint Recognition (2018) (18)
- A distributed detection framework for Steganalysis (2000) (17)
- “I Can Actually Be a Super Sleuth” (2017) (17)
- Source class identification for DSLR and compact cameras (2009) (17)
- The Capacity Region of Frequency-Selective Gaussian Interference Channels Under Strong Interference (2007) (17)
- Lossless compression of RGB color images (1995) (16)
- Adaptive public watermarking of DCT-based compressed images (1997) (16)
- Camera Fingerprint Extraction via Spatial Domain Averaged Frames (2019) (16)
- What is biometric information and how to measure it? (2013) (16)
- Watermarking and ownership problem: a revisit (2005) (16)
- On a Scale from 1 to 10, How Private Are You? Scoring Facebook Privacy Settings (2014) (16)
- Steganalysis of halftone images (2005) (15)
- Detection of misbehavior in cooperative diversity (2008) (15)
- Information flow based routing algorithms for wireless sensor networks (2004) (15)
- Design of a Laboratory for Information Security Education (2003) (15)
- Data hiding in document images (2008) (15)
- Nabs: a system for detecting resource abuses via characterization of flow content type (2004) (15)
- Factors Affecting Enf Based Time-of-recording Estimation for Video (2019) (15)
- Properties of Cryptosystem PGM (1989) (14)
- Hard-Attention for Scalable Image Classification (2021) (14)
- Steganalysis of boundary-based steganography using autoregressive model of digital boundaries (2004) (14)
- FiFTy: Large-Scale File Fragment Type Identification Using Convolutional Neural Networks (2021) (14)
- Identifying Digital Cameras Using CFA Interpolation (2006) (13)
- Glass OTP: Secure and Convenient User Authentication on Google Glass (2015) (13)
- PRNU based source attribution with a collection of seam-carved images (2016) (13)
- Optimal alphabet partitioning for semi-adaptive coding of sources of unknown sparse distributions (2003) (13)
- Circuits and systems for real-time security and copyright protection of multimedia (2009) (12)
- Lossless image coding (2006) (12)
- On the security of the visual hash function (2005) (12)
- Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks (2007) (12)
- Fortifying Android Patterns using Persuasive Security Framework (2015) (12)
- Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System (1999) (12)
- EFFICIENT STATIC ANALYSIS OF EXECUTABLES FOR DETECTING MALICIOUS BEHAVIORS (2005) (12)
- Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey (2019) (11)
- Integrating Digital Forensics in Network Infrastructures (2005) (11)
- How many pixels to watermark? (2000) (11)
- Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels (2018) (11)
- Compressing File Collections with a TSP-Based Approach (2004) (11)
- Optimized prediction for geometry compression of triangle meshes (2005) (11)
- Distinctiveness, complexity, and repeatability of online signature templates (2018) (11)
- On the scalability of an image transcoding proxy server (2003) (11)
- Geometry compression of tetrahedral meshes using optimized prediction (2005) (10)
- Simple method for enhancing the performance of lossy plus lossless image compression schemes (1993) (10)
- A Distribution Detection Framework for Watermark Analysis (2000) (10)
- PSTEG: steganographic embedding through patching [image steganography] (2005) (10)
- Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes (2009) (10)
- Security Models of Digital Watermarking (2007) (10)
- Secure collaborations over message boards (2006) (10)
- Special issue on secure knowledge management (2007) (10)
- Context-Based Lossless Interband (2000) (9)
- Random Permutations from Logarithmic Signatures (1989) (9)
- CoCoST: A Computational Cost Efficient Classifier (2009) (9)
- Special issue on : security of data hiding technologies (2002) (9)
- An Ensemble of Classifiers Approach to Steganalysis (2010) (9)
- Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser (2018) (9)
- Investigating users' readiness to trade-off biometric fingerprint data (2015) (9)
- Authentication techniques for multimedia content (1999) (9)
- PassPoints : Design and Evaluation of a Graphical Password System (2005) (9)
- Modeling Misbehavior in Cooperative Diversity: A Dynamic Game Approach (2009) (9)
- Tracking encrypted VoIP calls via robust hashing of network flows (2010) (9)
- On the security of random key pre-distribution schemes (2004) (9)
- HARPS: HAshed Random Preloaded Subset Key Distribution (2003) (8)
- A Stochastic Model for Misbehaving Relays in Cooperative Diversity (2008) (8)
- Lossless and near-lossless image compression with successive refinement (2000) (8)
- Lossless Geometry Compression for Steady-State and Time-Varying Irregular Grids (2006) (8)
- Towards Camera Identification from Cropped Query Images (2018) (8)
- Efficient Detection of Delay-Constrained Relay Nodes (2007) (8)
- Network Monitoring for Security and Forensics (2006) (8)
- Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization (2017) (7)
- Secure Sketches for Protecting Biometric Templates (2013) (7)
- Leveraging Personalization to Facilitate Privacy (2014) (7)
- The JPEG Lossless Image Compression Standards (2005) (7)
- Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes (2016) (7)
- Cooperative diversity as a dynamic game with incomplete information (2008) (7)
- Watermark extimation through local pixel correlation (1999) (7)
- A simple technique for estimating message lengths for additive noise steganography (2004) (7)
- Media Forensics and Security (2009) (7)
- Source Camera Attribution of Multi-Format Devices (2019) (7)
- Quality of online signature templates (2015) (7)
- Cybersecurity Competitions: The Human Angle (2015) (7)
- Signal Processing Magazine E-Newsletter: Inside Out (2007) (7)
- Camera identification of multi-format devices (2020) (6)
- Prediction Trees and Lossless Image Compression An Extended Abstract (1991) (6)
- Touchpad Input for Continuous Biometric Authentication (2014) (6)
- The Evolution of File Carving [ The benefits and problems of forensics recovery ] [ (6)
- Media Watermarking, Security, and Forensics III (2011) (6)
- DeepMasterPrint: Fingerprint Spoofing via Latent Variable Evolution (2017) (6)
- Prediction trees and lossless image compression (1991) (6)
- The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers (2016) (6)
- Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments (2019) (6)
- Front Matter: Volume (2008) (6)
- Fast camera fingerprint matching in very large databases (2017) (6)
- Robust Document Image Authentication (2007) (6)
- A semi-automatic deshredding method based on curve matching (2014) (6)
- Differential lossless encoding of images using non-linear predictive techniques (1994) (6)
- Image compression using efficient scan patterns (1992) (5)
- Method for variable quantization in JPEG for improved perceptual quality (2000) (5)
- (SPECIAL SECTION - SIGNAL PROCESSING FOR SOUND SYNTHESIS ) (2007) (5)
- Alphabet Partitioning Techniques for Semiadaptive Huffman Coding of Large Alphabets (2007) (5)
- Multispectral Image Coding (2005) (5)
- Verification Code Forwarding Attack (Short Paper) (2015) (4)
- Image carving with missing headers and missing fragments (2017) (4)
- 2018 IEEE International Conference on Consumer Electronics (ICCE) (2018) (4)
- An asymmetric lossless image compression technique (1995) (4)
- Practical Security of Non-Invertiblewatermarking Schemes (2007) (4)
- Cooperative diversity with selfish users (2008) (4)
- Security of data hiding technologies (2003) (4)
- KPI : A Security Infrastructure for Trusted Devices (2004) (4)
- Encrypted Domain Skin Tone Detection For Pornographic Image Filtering (2018) (4)
- Delta Encoding of Related Web Pages (2001) (3)
- Who You Are by way of What You Are: Behavioral Biometric Approaches to Authentication (2014) (3)
- Courtroom Considerations in Digital Image Forensics (2015) (3)
- Selective Robust Image Encryption for Social Networks (2013) (3)
- Distinguishability of keystroke dynamic template (2022) (3)
- Mining Groups of Common Interest: Discovering Topical Communities with Network Flows (2013) (3)
- MasterPrint Attack Resistance: A Maximum Cover Based Approach for Automatic Fingerprint Template Selection (2019) (3)
- Taxonomy for lossless image compression (1994) (3)
- Scan predictive vector quantization of multispectral images (1994) (3)
- Media Forensics and Security I, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings (2009) (3)
- A new error criterion for near-lossless image compression (1997) (3)
- A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators (2013) (3)
- A DRM based on renewable broadcast encryption (2005) (3)
- Lossy Image Compression: JPEG and JPEG2000 Standards (2005) (3)
- Crossing the Bridge to STEM (2021) (2)
- Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines (2020) (2)
- The Effect of Light Source on ENF Based Video Forensics (2019) (2)
- New techniques for reversible compression of multispectral data (1993) (2)
- ForNet: A Distributed Forensic Network (2003) (2)
- ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves (2011) (2)
- New Techniques in Multimedia Forensics (2011) (2)
- Protocols for Watermark (2001) (2)
- ROBUST AUDIO HASHING FOR CONTENT IDENTIFICATION (2004) (2)
- Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008 (2008) (2)
- Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance (2004) (2)
- Ordering color maps for lossless compression (1994) (2)
- CoCoST: A Computational Cost Sensitive Classifier (2009) (2)
- Steganalysis of Degraded Document Images (2005) (2)
- Cooperative Amplify and Forward in the Presence of a Selfish Partner (2007) (2)
- A dynamic game model for Amplify-and-Forward cooperative communications (2009) (2)
- IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference (2020) (1)
- FiFTy: Large-scale File Fragment Type Identification using Neural Networks (2019) (1)
- Photo Forensics: There is More to a Picture Than Meets the Eye (2011) (1)
- Efficient Methods to Store and Query Network Flow Data (2011) (1)
- A Framework for Analysis Attackers’ Accounts (2020) (1)
- Media Watermarking, Security, and Forensics 2021 (2014) (1)
- CLASSIFICATION OF DIGITAL CAMERAS BASED ON DEMOSAICING ARTIFACTS (2006) (1)
- Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection (2020) (1)
- Steganalysis and authentication of binary document images (2006) (1)
- Media Forensics and Security II (2009) (1)
- Error-Resilient Block Sorting (2001) (1)
- Neural Imaging Pipelines - the Scourge or Hope of Forensics? (2019) (1)
- A cost-effective decision tree based approach to steganalysis (2013) (1)
- Front Matter: Volume 7541 (2010) (1)
- Multimedia security and rights management (2004) (1)
- X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper (2017) (1)
- ( SPECIAL SECTION - SIGNAL PROCESSING FOR WIRELESS AD HOC COMMUNICATION NETWORKS ) (2006) (1)
- String Matching on the Internet (2004) (1)
- Using Delta Encoding for Compressing Related Web Pages (2001) (1)
- Mining generic patterns and communities from heterogeneous network traffic (2013) (1)
- Finding the truth behind photographs (2006) (1)
- An error-resilient blocksorting compression algorithm (2003) (1)
- Emerging NUI-based methods for user authentication (2018) (1)
- A system for digital rights management using key predistribution (2004) (1)
- High Assurance Virtualization Engine (HAVEN) (2009) (1)
- Component ratio preserving compression for remote sensing applications (2000) (1)
- Optimal Alphabet Partitioning for Semi-Adaptive Coding (2003) (1)
- DIGITALIMAGEFORENSICSFOR IDENTIFYING COMPUTER GENERATED AND DIGITALCAMERA IMAGES (2006) (0)
- Editorial (2003) (0)
- Reordering palettes for archiving color-mapped images (1995) (0)
- Multimedia Systems: Editorial (2003) (0)
- Geometry compression for graphics models and visualization datasets (2007) (0)
- Image Classification Through Top-Down Image Pyramid Traversal (2019) (0)
- TR-CIS-2006-02 03 / 20 / 2006 Department of Computer and Information Science (2006) (0)
- Steganalysis of Digital Watermarking Techniques (2003) (0)
- Vector excitation coding technique for image data (1996) (0)
- Protocols for Watermark Veriication (2001) (0)
- IEEE Transactions on Information Forensics and Security: Editorial (2009) (0)
- Multimedia Analysis for Content Identification (2009) (0)
- A new approach to countering ambiguity attacks (2007) (0)
- A spatially adaptive spectral re-ordering technique for lossless coding of hyper-spectral images (1995) (0)
- Introduction to the special issue on integrating biometrics and forensics (2018) (0)
- How to protect biometrie templates (2007) (0)
- Snake and Ladder based Algorithm for Steganographic Application of Specific Streamline Bits on Prime Gap Method (2019) (0)
- Implementation of Greedy Sequential Unique Path File Carving Algorithm for Fragmented Bitmap Image Files (2020) (0)
- Editorial (2018) (0)
- Detection and mitigation of misbehavior in cooperative wireless communications (2009) (0)
- ( SPECIAL SECTION - MOLECULAR AND CELLULAR BIOIMAGING ) (2006) (0)
- Algorithms for network-based misuse detection (2010) (0)
- A Study of CyberSecurity , Personality Traits and Culture-U . S . , India and UAE (2013) (0)
- Optimizing prediction gain in axial symmetric scans (2000) (0)
- Image Processing and Halftones (2009) (0)
- Lossless Geometry Compression for Steady-State and Time-Varying Tetrahedral Meshes † ‡ (2005) (0)
- Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations (2020) (0)
- Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities (2020) (0)
- Optimizing Prediction Gain in Symmetric Axial Scans. (2000) (0)
- A 2-D vector excitation coding technique (1998) (0)
- PRELOADED KEY DISTRIBUTION SCHEMES FOR AD HOC NETWORKS (2010) (0)
- Reversible compression of a video sequence (1994) (0)
- A Unified Steganalysis Framework (2013) (0)
- Front Matter: 7254 (2009) (0)
- Front Matter: Volume 8303 (2012) (0)
- Source Camera Identification and Blind Tamper Detections for Images (2007) (0)
- Steganalysis Techniques for Documents and Images (2005) (0)
- Detecting documents forged by printing and copying (2014) (0)
- Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec' 05: Foreword (2006) (0)
- ESIMS - An Ecient Key Predistribution Scheme (2003) (0)
- Front Matter: Volume 7880 (2011) (0)
- Compressing File Collections with a TSP-Approach (2004) (0)
- Lossless Geometry Compression for Floating-Point Data in Steady-State and Time-Varying Fields over Irregular Grids (2007) (0)
- Dictionary Attacks on Speaker Verification (2022) (0)
- ( SPECIAL SECTION - DISTRIBUTED SIGNAL PROCESSING IN SENSOR NETWORKS ) (2006) (0)
- Front Matter: Volume 8665 (2013) (0)
- Editorial (2009) (0)
- Efficient methods to store and query network data (2010) (0)
- Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare (2017) (0)
- On scanning techniques for lossless image coding with limited context supports (1998) (0)
- Lossless compression of color images in the RGB domain (1994) (0)
- Computational Sensor Fingerprints (2022) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Nasir D. Memon?
Nasir D. Memon is affiliated with the following schools: