Search For:

Displaying 1-32 out of 32 total
Protocols for Watermark Verification
Found in: IEEE Multimedia
By K. Gopalakrishnan, Nasir Memon, Poorvi L. Vora
Issue Date:October 2001
pp. 66-70
<p>In current digital watermarking schemes used to deter piracy of multimedia content, the owner typically reveals the watermark in the process of establishing piracy. Once revealed, a watermark can be removed. We eliminate this limitation by using c...
 
Winning Cybersecurity One Challenge at a Time
Found in: IEEE Security & Privacy Magazine
By Efstratios Gavas,Nasir Memon,Douglas Britton
Issue Date:July 2012
pp. 75-79
Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybers...
 
Keynote
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By Nasir Memon
Issue Date:September 2011
pp. 2
No summary available.
   
How to Measure Biometric Information?
Found in: Pattern Recognition, International Conference on
By Yagiz Sutcu, Husrev T. Sencar, Nasir Memon
Issue Date:August 2010
pp. 1469-1472
Being able to measure the actual information content of biometrics is very important but also a challenging problem. Main difficulty here is not only related to the selected feature representation of the biometric data, but also related to the matching alg...
 
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
Found in: Computer Security Applications Conference, Annual
By Baris Coskun, Nasir Memon
Issue Date:December 2009
pp. 473-483
We present an efficient and robust stepping-stone detection scheme based on succinct packet-timing sketches of network flows. The proposed scheme employs an online algorithm to continuously maintain short sketches of flows from a stream of captured packets...
 
CoCoST: A Computational Cost Efficient Classifier
Found in: Data Mining, IEEE International Conference on
By Liyun Li, Umut Topkara, Baris Coskun, Nasir Memon
Issue Date:December 2009
pp. 268-277
Computational cost of classification is as important as accuracy in on-line classification systems. The computational cost is usually dominated by the cost of computing implicit features of the raw input data. Very few efforts have been made to design clas...
 
An efficient and robust method for detecting copy-move forgery
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Sevinc Bayram, Husrev Taha Sencar, Nasir Memon
Issue Date:April 2009
pp. 1053-1056
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approach for detecting copy-move forgery in digital images, which is considerably mor...
 
Flatbed scanner identification based on dust and scratches over scanner platen
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Ahmet Emir Dirik, Husrev Taha Sencar, Nasir Memon
Issue Date:April 2009
pp. 1385-1388
In this paper, a novel individual source scanner identification scheme is proposed. The scheme uses traces of dust, dirt, and scratches over scanner platen on scanned images to characterize a source scanner. The efficacy of the proposed scheme is substanti...
 
A dynamic game model for Amplify-and-Forward cooperative communications
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Sintayehu Dehnie, Nasir Memon
Issue Date:April 2009
pp. 3485-3488
Cooperative wireless communication protocols are designed with the assumption that users always behave in a socially efficient manner. This assumption may not be valid in commercial wireless networks where users may violate rules of cooperation to reap ben...
 
Digital Forensics
Found in: IEEE Security and Privacy
By Michael A. Caloyannides, Nasir Memon, Wietse Venema
Issue Date:March 2009
pp. 16-17
This issue is one of a pair of coordinated special issues on digital forensics by IEEE Security & Privacy and IEEE Signal Processing Magazine. S&P's special issue has articles debating the effectiveness of forensics, on capturing live forensics ana...
 
Out-of-Core Progressive Lossless Compression and Selective Decompression of Large Triangle Meshes
Found in: Data Compression Conference
By Zhiyan Du, Pavel Jaromersky, Yi-Jen Chiang, Nasir Memon
Issue Date:March 2009
pp. 420-429
In this paper we propose a novel {\em out-of-core} technique for{\em progressive} lossless compression and {\em selective}decompression of 3D triangle meshes larger than main memory. Most existing compression methods, in order to optimize compression ratio...
 
Efficient Detection of Delay-Constrained Relay Nodes
Found in: Computer Security Applications Conference, Annual
By Baris Coskun, Nasir Memon
Issue Date:December 2007
pp. 353-362
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer stream- ing etc. Quick and accurate detection of relay nodes in a network can significantly impr...
 
Secure Biometric Templates from Fingerprint-Face Features
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Yagiz Sutcu, Qiming Li, Nasir Memon
Issue Date:June 2007
pp. 1-6
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way, such that attackers would not be able to forge biometric data easily even w...
 
Optimized Prediction for Geometry Compression of Triangle Meshes
Found in: Data Compression Conference
By Dan Chen, Yi-Jen Chiang, Nasir Memon, Xiaolin Wu
Issue Date:March 2005
pp. 83-92
In this paper we propose a novel geometry compression technique for 3D triangle meshes. We focus on a commonly used technique for predicting vertex positions via a flipping operation using the parallelogram rule. We show that the efficiency of the flipping...
 
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type
Found in: Computer Security Applications Conference, Annual
By Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir Memon
Issue Date:December 2004
pp. 316-325
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using unauthorized applications to serving unauthorized content. Proliferation of pe...
 
Multiple-Description Geometry Compression for Networked Interactive 3D Graphics
Found in: Image and Graphics, International Conference on
By Pavel Jaromersky, Xiaolin Wu, Yi-Jen Chiang, Nasir Memon
Issue Date:December 2004
pp. 468-471
In web-based visualization applications, such as internet computer games, tele-medicine and so on, 3D geometric data are typically communicated in a distributed and networked environment. The commonly used TCP/IP network protocols can provide reliable tran...
 
Automatic Reassembly of Document Fragments via Context Based Statistical Models
Found in: Computer Security Applications Conference, Annual
By Kulesh Shanmugasundaram, Nasir Memon
Issue Date:December 2003
pp. 152
Reassembly of fragmented objects from a collection of randomly mixed fragments is a common problem in classical forensics. In this paper we address the digital forensic equivalent, i.e., reassembly of document fragments, using statistical modelling tools a...
 
Preventing Piracy, Reverse Engineering, and Tampering
Found in: Computer
By Gleb Naumovich, Nasir Memon
Issue Date:July 2003
pp. 64-71
<p>As computing becomes pervasive, concerns about data protection have taken on new urgency. What makes securing digital data so difficult is that it is rarely static?rather, data is manipulated by software, often in a net-worked environment.</p&g...
 
An Error-Resilient Blocksorting Compression Algorithm
Found in: Data Compression Conference
By Lee Butterman, Nasir Memon
Issue Date:March 2003
pp. 417
No summary available.
   
Cluster-Based Delta Compression of a Collection of Files
Found in: Web Information Systems Engineering, International Conference on
By Zan Ouyang, Nasir Memon, Torsten Suel, Dimitre Trendafilov
Issue Date:December 2002
pp. 257
Delta compression techniques are commonly used to succinctly represent an updated version of a file with respect to an earlier one. In this paper, we study the use of delta compression in a somewhat different scenario, where we wish to compress a large col...
 
How Many Pixels to Watermark?
Found in: Information Technology: Coding and Computing, International Conference on
By R. Chandramouli, Nasir Memon
Issue Date:March 2000
pp. 11
Watermark design and detection have been studied as two separate problems so far. However, we show that, if the watermarking algorithm is based on the watermark detection method, then significant gains can be achieved. With a watermark detector based on a ...
 
An Ensemble of Classifiers Approach to Steganalysis
Found in: Pattern Recognition, International Conference on
By Sevinc Bayram, Ahmet Emir Dirik, Husrev Taha Sencar, Nasir Memon
Issue Date:August 2010
pp. 4376-4379
Most work on steganalysis, except a few exceptions, have primarily focused on providing features with high discrimination power without giving due consideration to issues concerning practical deployment of steganalysis methods. In this work, we focus on ma...
 
Optimal Alphabet Partitioning for Semi-Adaptive Coding of Sources of Unknown Sparse Distributions
Found in: Data Compression Conference
By Dan Chen, Yi-Jen Chiang, Nasir Memon, Xiaolin Wu
Issue Date:March 2003
pp. 372
Practical applications that employ entropy coding for large alphabets often partition the alphabet set into two or more layers and encode each symbol by using some suitable prefix coding for each layer. In this paper we formulate the problem of optimal alp...
 
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
Found in: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10)
By Baris Coskun, Nasir Memon, Sven Dietrich
Issue Date:December 2010
pp. 131-140
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same network even before they exhibit any overtly malicious behavior. Detection is b...
     
Video copy detection based on source device characteristics: a complementary approach to content-based methods
Found in: Proceeding of the 1st ACM international conference on Multimedia information retrieval (MIR '08)
By Husrev Taha Sencar, Nasir Memon, Sevinc Bayram
Issue Date:October 2008
pp. 1-1
We introduce a new video copy detection scheme to complement existing content-based techniques. The idea of our scheme is based on the fact that visual media possess unique characteristics that can be used to link a media to its source. Proposed scheme att...
     
Modeling user choice in the PassPoints graphical password scheme
Found in: Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07)
By Ahmet Emir Dirik, Jean-Camille Birget, Nasir Memon
Issue Date:July 2007
pp. 20-28
We develop a model to identify the most likely regions for users to click in order to create graphical passwords in the PassPoints system. A PassPoints password is a sequence of points, chosen by a user in an image that is displayed on the screen. Our mode...
     
Security issues in watermarking applications - a deeper look
Found in: Proceedings of the 4th ACM international workshop on Contents protection and security (MCPS '06)
By Husrev T. Sencar, Nasir Memon, Qiming Li
Issue Date:October 2006
pp. 23-28
Although it is clear that security is an important issue in digital watermarking applications,the main concerns addressed by the current literature are robustness, capacity and imperceptibility. The inadequacy of the prevailing design paradigm in tackling ...
     
Watermarking and ownership problem: a revisit
Found in: Proceedings of the 5th ACM workshop on Digital rights management (DRM '05)
By Husrev T. Sencar, Nasir Memon
Issue Date:November 2005
pp. 93-101
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicabilit...
     
Authentication using graphical passwords: effects of tolerance and image choice
Found in: Proceedings of the 2005 symoosium on Usable privacy and security (SOUPS '05)
By Alex Brodskiy, Jean-Camille Birget, Jim Waters, Nasir Memon, Susan Wiedenbeck
Issue Date:July 2005
pp. 1-12
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called PassPoints, and evaluated it with human users. The r...
     
SAFE-OPS: An approach to embedded software security
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Alok Choudhary, Bhagi Narahari, Joseph Zambreno, Nasir Memon, Rahul Simha
Issue Date:February 2005
pp. 189-210
The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software...
     
Payload attribution via hierarchical bloom filters
Found in: Proceedings of the 11th ACM conference on Computer and communications security (CCS '04)
By Herve Brunnimann, Kulesh Shanmugasundaram, Nasir Memon
Issue Date:October 2004
pp. 31-41
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security applications such as identifying sources and victims of a worm or virus. Altho...
     
Protecting digital media content
Found in: Communications of the ACM
By Nasir Memon, Ping Wah Wong
Issue Date:January 1988
pp. 35-43
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
     
 1