Center for Cyber Security

Filter
Conference contribution

Search results

  • 2007

    Fault tolerant approaches to nanoelectronic programmable logic arrays

    Rao, W., Orailoglu, A. & Karri, R., 2007, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007. p. 216-223 8 p. 4272973. (Proceedings of the International Conference on Dependable Systems and Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to protect biometrie templates

    Sutcu, Y., Li, Q. & Memon, N., 2007, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents IX. 650514. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6505).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improvements on sensor noise based source camera identification

    Sutcu, Y., Bayram, S., Sencar, H. T. & Memon, N., 2007, Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007. IEEE Computer Society, p. 24-27 4 p. 4284577. (Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Logic level fault tolerance approaches targeting nanoelectronics PLAs

    Wenjing, R., Orailoglu, A. & Karri, R., 2007, Proceedings - 2007 Design, Automation and Test in Europe Conference and Exhibition, DATE 2007. p. 865-869 5 p. 4211911. (Proceedings -Design, Automation and Test in Europe, DATE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling user choice in the PassPoints graphical password scheme

    Dirik, A. E., Memon, N. & Birget, J. C., 2007, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security. p. 20-28 9 p. (ACM International Conference Proceeding Series; vol. 229).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • New features to identify computer generated images

    Dirik, A. E., Bayram, S., Senear, H. T. & Memon, N., 2007, 2007 IEEE International Conference on Image Processing, ICIP 2007 Proceedings. IEEE Computer Society, p. IV433-IV436 4380047. (Proceedings - International Conference on Image Processing, ICIP; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical security of non-invertible watermarking schemes

    Li, Q. & Memon, N., 2007, 2007 IEEE International Conference on Image Processing, ICIP 2007 Proceedings. IEEE Computer Society, p. IV445-IV448 4380050. (Proceedings - International Conference on Image Processing, ICIP; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Register transfer level concurrent error detection in elliptic curve crypto implementations

    Stern, R., Joshi, N., Wu, K. & Karri, R., 2007, Proceedings Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2007. p. 112-119 8 p. 4318991. (Proceedings Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Robust document image authentication

    Jiang, M., Wong, E. K. & Memon, N., 2007, Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007. IEEE Computer Society, p. 1131-1134 4 p. 4284854. (Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure biometric templates from fingerprint-face features

    Sutcu, Y., Li, Q. & Memon, N., 2007, 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR'07. 4270383. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security models of digital watermarking

    Li, Q. & Memon, N., 2007, Multimedia Content Analysis and Mining - International Workshop, MCAM 2007, Proceedings. Springer Verlag, p. 60-64 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4577 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Source camera identification based on sensor dust characteristics

    Dirik, A. E., Senear, H. T. & Memon, N., 2007, Proceedings - SAFE 2007: Workshop on Signal Processing Applications for Public Security and Forensics. Institute of Electrical and Electronics Engineers Inc., 4218950. (Proceedings - SAFE 2007: Workshop on Signal Processing Applications for Public Security and Forensics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Volleystore: A parasitic storage framework

    Rosenfeld, K., Sencar, H. T. & Memon, N., 2007, Proceedings of the 2007 IEEEWorkshop on Information Assurance, IAW'07. p. 67-75 9 p. 4267544. (Proceedings of the 2007 IEEE Workshop on Information Assurance, IAW).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    An SVD-based audio watermarking technique

    Özer, H., Sankur, B. & Memon, N., 2006, Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05. p. 51-56 6 p. (Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A secure biometric authentication scheme based on robust hashing

    Sutcu, Y., Sencar, H. T. & Memon, N., 2006, Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05. p. 111-116 6 p. (Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec'05; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Confusion/diffusion capabilities of some robust hash functions

    Coskun, B. & Memon, N., 2006, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1188-1193 6 p. 4067986. (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cover selection for steganographic embedding

    Kharrazi, M., Sencar, H. T. & Memon, N., 2006, 2006 IEEE International Conference on Image Processing, ICIP 2006 - Proceedings. p. 117-120 4 p. 4106480. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Digital image forensics for identifying computer generated and digital camera images

    Dehnie, S., Sencar, T. & Memon, N., 2006, 2006 IEEE International Conference on Image Processing, ICIP 2006 - Proceedings. p. 2313-2316 4 p. 4107029. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fault identification in reconfigurable carry lookahead adders targeting nanoelectronic fabrics

    Rao, W., Orailoglu, A. & Karri, R., 2006, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006. p. 63-68 6 p. 1628155. (Proceedings - Eleventh IEEE European Test Symposium, ETS 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving steganalysis by fusion techniques: A case study with image steganography

    Kharrazi, M., Sencar, H. T. & Memon, N., 2006, Security, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging. 607205. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6072).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving steganalysis by fusion techniques: A case study with image steganography

    Kharrazi, M., Senear, H. T. & Memon, N., 2006, Transactions on Data Hiding and Multimedia Security I. Springer Verlag, p. 123-137 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4300 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Nanofabric topologies and reconfiguration algorithms to support dynamically adaptive fault tolerance

    Rao, W., Orailoglu, A. & Karri, R., 2006, Proceedings - 24th IEEE VLSI Test Symposium. p. 214-219 6 p. 1617592. (Proceedings of the IEEE VLSI Test Symposium; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Network monitoring for security and forensics

    Shanmugasundaram, K. & Memon, N., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 56-70 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Protocol masking to evade network surveillance

    Nurilov, S., Shanmugasundaram, K. & Memon, N., 2006, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1467-1472 6 p. 4068037. (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure sketch for biometric templates

    Li, Q., Sutcu, Y. & Memon, N., 2006, Advances in Cryptology - ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Security issues in watermarking applications - A deeper look

    Li, Q., Memon, N. & Sencar, H. T., 2006, Proceedings of the ACM International Workshop on Multimedia Contents Protection and Security, MCPS 2006. p. 23-28 6 p. (Proceedings of the ACM International Multimedia Conference and Exhibition).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tamper detection based on regularity of wavelet transform coefficients

    Sutcu, Y., Coskun, B., Sencar, H. T. & Memon, N., 2006, 2007 IEEE International Conference on Image Processing, ICIP 2007 Proceedings. IEEE Computer Society, p. 397-400 4 p. 4378975. (Proceedings - International Conference on Image Processing, ICIP; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Topology aware mapping of logic functions onto nanowire-based crossbar architectures

    Rao, W., Orailoglu, A. & Karri, R., 2006, 2006 43rd ACM/IEEE Design Automation Conference, DAC'06. Institute of Electrical and Electronics Engineers Inc., p. 723-726 4 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A constant array multiplier core generator with dynamic partial evaluation architecture selection

    Yang, B., Joshi, N. & Karri, R., 2005, ACM/SIGDA Thirteenth ACM International Symposium on Field Programmable Gate Arrays - FPGA 2005. p. 280 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A DRM based on renewable broadcast encryption

    Ramkumar, M. & Memon, N., 2005, Proceedings of SPIE - The International Society for Optical Engineering. Li, S., Pereira, F., Shum, H. Y. & Tescher, A. G. (eds.). 2 ed. Vol. 5960. p. 1101-1111 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A hierarchical key pre-distribution scheme

    Ramkumar, M., Memon, N. & Simha, R., 2005, 2005 IEEE International Conference on Electro Information Technology. 1626994. (2005 IEEE International Conference on Electro Information Technology; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Architectural-level fault tolerant computation in nanoelectronic processors

    Rao, W., Orailoglu, A. & Karri, R., 2005, Proceedings - 2005 IEEE International Conference on Computer Design: VLSI in Computers and Processors, ICCD 2005. p. 533-539 7 p. 1524204. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Authentication using graphical passwords: Effects of tolerance and image choice

    Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, A. & Memon, N., 2005, SOUPS 2005 - Proceedings of the Symposium on Usable Privacy and Security. p. 1-12 12 p. (ACM International Conference Proceeding Series; vol. 93).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Benchmarking steganographic and steganalysis techniques

    Kharrazi, M., Sencar, H. T. & Memon, N., 2005, Proceedings of SPIE - The International Society for Optical Engineering. Delp III, E. J. & Wong, P. W. (eds.). Vol. 5681. p. 252-263 12 p. 26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fault tolerant nanoelectronic processor architectures

    Rao, W., Orailoglu, A. & Karri, R., 2005, Proceedings of the 2005 Asia and South Pacific Design Automation Conference, ASP-DAC 2005. Institute of Electrical and Electronics Engineers Inc., p. 311-316 6 p. 1466180. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fault tolerant Quantum Cellular Array (QCA) design using Triple Modular Redundancy with Shifted Operands

    Wei, T., Wu, K., Karri, R. & Orailoglu, A., 2005, Proceedings of the 2005 Asia and South Pacific Design Automation Conference, ASP-DAC 2005. Institute of Electrical and Electronics Engineers Inc., p. 1192-1195 4 p. 1466555. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Geometry compression of tetrahedral meshes using optimized prediction

    Chen, D., Chiang, Y. J., Memon, N. & Wu, X., 2005, 13th European Signal Processing Conference, EUSIPCO 2005. p. 1906-1909 4 p. (13th European Signal Processing Conference, EUSIPCO 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Image manipulation detection with Binary Similarity Measures

    Bayram, S., Avcibaş, I., Sankur, B. & Memon, N., 2005, 13th European Signal Processing Conference, EUSIPCO 2005. p. 2139-2142 4 p. (13th European Signal Processing Conference, EUSIPCO 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On-line error detection and BIST for the AES encryption algorithm with different S-box implementations

    Ocheretnij, V., Kouznetsov, G., Karri, R. & Gössel, M., 2005, Proceedings - 11th IEEE International On-Line Testing Symposium, IOLTS 2005. p. 141-146 6 p. 1498148. (Proceedings - 11th IEEE International On-Line Testing Symposium, IOLTS 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimized prediction for geometry compression of triangle meshes

    Chen, D., Chiang, Y. J., Memon, N. & Wu, X., 2005, Data Compression Conference Proceedings. Storer, J. A. & Cohn, M. (eds.). p. 83-92 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Power optimization for universal hash function data path using divide-and-concatenate technique

    Yang, B. & Karri, R., 2005, CODES+ISSS 2005 - International Conference on Hardware/Software Codesign and Systems Synthesis. Association for Computing Machinery (ACM), p. 219-224 6 p. (CODES+ISSS 2005 - International Conference on Hardware/Software Codesign and System Synthesis).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PSteg: Steganographic embedding through patching

    Petrowski, K., Kharrazi, M., Sencar, H. T. & Memon, N., 2005, 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP '05 - Proceedings - Image and Multidimensional Signal Processing Multimedia Signal Processing. p. II537-II540 1415460. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure scan: A design-for-test architecture for crypto chips

    Yang, B., Wu, K. & Karri, R., 2005, Proceedings - Design Automation Conference. p. 135-140 6 p. 9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Source camera identification based on CFA interpolation

    Bayram, S., Sencar, H. T., Memon, N. & Avcibas, I., 2005, IEEE International Conference on Image Processing 2005, ICIP 2005. p. 69-72 4 p. 1530330. (Proceedings - International Conference on Image Processing, ICIP; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Steganalysis of degraded document images

    Jiang, M., Wong, E. K., Memon, N. & Wu, X., 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing, MMSP 2005. IEEE Computer Society, 4014081. (2005 IEEE 7th Workshop on Multimedia Signal Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Steganalysis of halftone images

    Jiang, M., Wong, E. K., Memon, N. & Wu, X., 2005, 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP '05 - Proceedings - Image and Multidimensional Signal Processing Multimedia Signal Processing. p. II793-II796 1415524. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • String matching on the Internet

    Brönnimann, H., Memon, N. & Shanmugasundaram, K., 2005, Lecture Notes in Computer Science. Lopez-Ortiz, A. & Hamel, A. (eds.). Vol. 3405. p. 75-89 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards designing robust QCA architectures in the presence of sneak noise paths

    Kim, K., Wu, K. & Karri, R., 2005, Proceedings - Design, Automation and Test in Europe, DATE '05. p. 1214-1219 6 p. 1395759. (Proceedings -Design, Automation and Test in Europe, DATE '05; vol. II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Watermarking and ownership problem: A revisit

    Sencar, H. T. & Memon, N., 2005, DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management. p. 93-101 9 p. (DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    A classifier design for detecting image manipulations

    Avcibas, I., Bayram, S., Memon, N., Ramkumar, M. & Sankur, B., 2004, 2004 International Conference on Image Processing, ICIP 2004. p. 2645-2648 4 p. (Proceedings - International Conference on Image Processing, ICIP; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution