Takip et
Nasir Memon
Nasir Memon
Professor of Comp Sc. and Eng, New York University, Tandon School of Engineering
nyu.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Alıntı yapanlar
Alıntı yapanlar
Context-based, adaptive, lossless image coding
X Wu, N Memon
IEEE transactions on Communications 4 (45), 437-444, 1997
PassPoints: Design and longitudinal evaluation of a graphical password system
S Wiedenbeck, J Waters, JC Birget, A Brodskiy, N Memon
International journal of human-computer studies 63 (1-2), 102-127, 2005
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
S Craver, N Memon, BL Yeo, MM Yeung
IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998
Using host symptoms, host roles, and/or host reputation for detection of host infection
N Memon, K Shanmugasundaram
US Patent App. 12/723,272, 2010
Secret and public key image watermarking schemes for image authentication and ownership verification
PW Wong, N Memon
IEEE transactions on image processing 10 (10), 1593-1601, 2001
Steganalysis using image quality metrics
I Avcibas, N Memon, B Sankur
IEEE transactions on Image Processing 12 (2), 221-229, 2003
An efficient and robust method for detecting copy-move forgery
S Bayram, HT Sencar, N Memon
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
Analysis of LSB based image steganography techniques
R Chandramouli, N Memon
Proceedings 2001 international conference on image processing (Cat. No …, 2001
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
M Holliman, N Memon
IEEE Transactions on image processing 9 (3), 432-441, 2000
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004
Authentication using graphical passwords: Effects of tolerance and image choice
S Wiedenbeck, J Waters, JC Birget, A Brodskiy, N Memon
Proceedings of the 2005 symposium on Usable privacy and security, 1-12, 2005
A buyer-seller watermarking protocol
N Memon, PW Wong
IEEE Transactions on image processing 10 (4), 643-649, 2001
Blind source camera identification
M Kharrazi, HT Sencar, N Memon
2004 International Conference on Image Processing, 2004. ICIP'04. 1, 709-712, 2004
Source camera identification based on CFA interpolation
S Bayram, H Sencar, N Memon, I Avcibas
IEEE International Conference on Image Processing 2005 3, III-69, 2005
Protecting digital media content
N Memon, PW Wong
Communications of the ACM 41 (7), 35-43, 1998
Can invisible watermarks resolve rightful ownerships?
SA Craver, ND Memon, BL Yeo, MM Yeung
Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
N Sae-Bae, K Ahmed, K Isbister, N Memon
proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
Image steganalysis with binary similarity measures
İ Avcıbaş, M Kharrazi, N Memon, B Sankur
EURASIP Journal on Advances in Signal Processing 2005, 1-9, 2005
Modeling user choice in the PassPoints graphical password scheme
AE Dirik, N Memon, JC Birget
Proceedings of the 3rd symposium on Usable privacy and security, 20-28, 2007
Protecting biometric templates with sketch: Theory and practice
Y Sutcu, Q Li, N Memon
IEEE Transactions on Information Forensics and Security 2 (3), 503-512, 2007
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20