Nasir Memon | |
---|---|
Education | Birla Institute of Technology and Science, Bachelor of Engineering in Chemical Engineering and Master of Science in Mathematics University of Nebraska, Doctor of Philosophy in Computer Science |
Known for | Center for Interdisciplinary Studies in Security and Privacy, founder Cyber Security Awareness Week (CSAW) Conference, founder Digital Assembly, founder |
Awards | SPIE Fellow 2014, IEEE Fellow 2010, Best Paper Award: IEEE Signal Processing Society, Jacobs Excellence in Education Award, Polytechnic University, 2002 |
Scientific career | |
Fields | Computer Science |
Institutions | New York University Polytechnic School of Engineering |
Nasir Memon is a computer scientist based in Brooklyn, New York. [1] Memon is a professor and chair of the New York University Tandon School of Engineering computer science and engineering department and affiliate faculty at the computer science department in the Courant Institute of Mathematical Sciences at New York University. [2] He is also the Department Head of NYU Tandon Online, the online learning unit of the school. He introduced cyber security studies to New York University Tandon School of Engineering, making it one of the first schools to implement the program at the undergraduate level. [1] [2] Memon holds twelve patents in image compression and security. [1] [2] He is the founding director of the Center for Interdisciplinary Studies in Security and Privacy (CRISSP) and CRISSP Abu Dhabi. [1] In 2002, Memon founded Cyber Security Awareness Week (CSAW), an annual conference where tens of thousands of students compete in events and learn skills in cyber security [3] Memon is also co-founder of Digital Assembly, a software company that develops digital forensics and data recovery and Vivic, a company that produces malware detection software. [4] [5] Memon has published over 250 articles in journals and conferences and has contributed to articles regarding cyber security in magazines such as Crain’s New York Business , Fortune , and USA Today . [6] [7] [8] [9] His research has been featured in NBC Nightly News , The New York Times , MIT Review , Wired.Com , and New Science Magazine. [6]
In 1982, Memon graduated from Birla Institute of Technology and Science, Pilani, with a Bachelor of Engineering in Chemical Engineering and a Master of Science in Mathematics. He graduated with a Doctor of Philosophy degree in Computer Science from the University of Nebraska in 1992. [1]
In the 1990s, Memon learned from law enforcement that there was a need for technology that could recover fragmented data. He and his colleagues researched the problem with files and digital photos and were able to develop a solution. [10] Memon developed an automated software program that can retrieve and reassemble fragmented digital photographs, even when the directions for locating them have been deleted. [6] His software is an example of file carving, which is the restoring of file contents after identifying information has been removed or lost.
In 2006, Memon and two of his students, Pasha Pal and Kulesh Shanmugasundaram founded Digital Assembly, which sells a consumer version of the software, Adroit Photo Recovery, to restore deleted images. [6] [11] Digital Assembly has competed and won the NSF Phase I and Phase II SBIRs as well as an NYSTAR TTIP grant. [11] Digital Assembly's software was featured in an ABC news article regarding the use of technology in the fight against child pornography in 2010. [12]
In 2011, Memon led a project to develop gesture based alternatives to passwords on touch screen devices. The project demonstrated that the owners of a device can be authenticated by the unique touch of their fingers to either supplement or remove the need for a password [13] He created iSignOn, an app sold in Apple's App Store that uses the motion of a person's actual written signature to authenticate him or her. [14] The app is able to distinguish the user's pattern from forgers after the user signs the screen with their finger five times. [14]
In 2005, Memon was featured in the NBC investigative report on terror alerts raised due to bogus analysis. [15] He discussed the art of secret writing called steganography, which allows two parties to communicate with each other without others knowing they are communicating, and how steganalysis software can be used to locate those hidden messages, but it is not always reliable. [15]
In 2009, Memon developed INFER, a network-based infection detection system to identify compromised host computers on large networks primarily for corporate and government systems. [5] This program focuses on detecting systems inside the network infected by malware rather than detection or prevention at the point of entry. INFER was used to track the behavior of 3,000 PCs on The Polytechnic Institute of NYU network. Memon and his students started a company called Vivic to commercialize INFER, which resulted in the U.S. Army Research Laboratory becoming their first paying customer. INFER also has Westchester County, New York government, and the New York City IT Department as customers. [5]
In 1995, Memon co-developed the novel context based lossless compression scheme named CALIC with Xialoin Wu. CALIC ranked first in the evaluations conducted by the International Standards Organization (ISO) of the techniques submitted in response to its call for a new lossless image compression standard. [16] The final ISO standard, JPEG-LS, was significantly influenced by the concepts utilized in CALIC. [17]
Memon created the Information Systems and Internet Security lab, a hackerspace for students to work both on cyber offense and defense. [2] He is the editor-in-chief of the IEEE Transactions on Information Security and Forensics. [6] Memon has also been an associate editor for IEEE Transactions on Image Processing, the Journal of Electronic Imaging , the ACM Multimedia Systems Journal, the LNCS Transaction on Data Hiding, IEEE Security and Privacy Magazine, IEEE Signal Processing Magazine, and the International Journal on Network Security. [6]
Memon has received several awards for his research and lectureship. [18] In 2002, he received the Jacobs Excellence in Education Award from Polytechnic University. [1] In 2010, he became an IEEE Fellow and received the IEEE Signal Processing Society Distinguished Lecturer award for 2011–2012. [1] Memon became a SPIE Fellow in 2014 and was awarded Best Research in Advanced ID Systems: Online Authentication of Digital Signature through Mobile Phones in 2014. [1] He has won best paper awards from IEEE and the Digital Forensics Research Conference. [18] Memon was recognized for his research with the NSF CAREER Award and the Emirates ID Best Research in Advanced ID Systems. [18]
In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation. Any particular compression is either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by removing unnecessary or less important information. Typically, a device that performs data compression is referred to as an encoder, and one that performs the reversal of the process (decompression) as a decoder.
Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".
Image compression is a type of data compression applied to digital images, to reduce their cost for storage or transmission. Algorithms may take advantage of visual perception and the statistical properties of image data to provide superior results compared with generic data compression methods which are used for other digital data.
A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies. The DCT, first proposed by Nasir Ahmed in 1972, is a widely used transformation technique in signal processing and data compression. It is used in most digital media, including digital images, digital video, digital audio, digital television, digital radio, and speech coding. DCTs are also important to numerous other applications in science and engineering, such as digital signal processing, telecommunication devices, reducing network bandwidth usage, and spectral methods for the numerical solution of partial differential equations.
A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such a signal. "Watermarking" is the process of hiding digital information in a carrier signal; the hidden information should, but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.
Lossless JPEG is a 1993 addition to JPEG standard by the Joint Photographic Experts Group to enable lossless compression. However, the term may also be used to refer to all lossless compression schemes developed by the group, including JPEG 2000, JPEG-LS, and JPEG XL.
JPEG XR is an image compression standard for continuous tone photographic images, based on the HD Photo specifications that Microsoft originally developed and patented. It supports both lossy and lossless compression, and is the preferred image format for Ecma-388 Open XML Paper Specification documents.
Ali Naci Akansu is a Turkish-American professor of electrical & computer engineering and scientist in applied mathematics.
A video coding format is a content representation format of digital video content, such as in a data file or bitstream. It typically uses a standardized video compression algorithm, most commonly based on discrete cosine transform (DCT) coding and motion compensation. A specific software, firmware, or hardware implementation capable of compression or decompression in a specific video coding format is called a video codec.
Nasir Ahmed is an Indian-American electrical engineer and computer scientist. He is Professor Emeritus of Electrical and Computer Engineering at University of New Mexico (UNM). He is best known for inventing the discrete cosine transform (DCT) in the early 1970s. The DCT is the most widely used data compression transformation, the basis for most digital media standards and commonly used in digital signal processing. He also described the discrete sine transform (DST), which is related to the DCT.
NYU Tandon Digital Learning, formerly known as NYU Tandon Online and NYU-ePoly, is the digital learning department at New York University Tandon School of Engineering, a noted school of engineering, technology, management and applied sciences in the United States.
An audio coding format is a content representation format for storage or transmission of digital audio. Examples of audio coding formats include MP3, AAC, Vorbis, FLAC, and Opus. A specific software or hardware implementation capable of audio compression and decompression to/from a specific audio coding format is called an audio codec; an example of an audio codec is LAME, which is one of several different codecs which implements encoding and decoding audio in the MP3 audio coding format in software.
Ramesh Karri is a researcher specializing in trustworthy hardware, high assurance nanoscale integrated circuits, architectures and systems. He is a Professor of Electrical and Computer Engineering at New York University Polytechnic School of Engineering. Additionally, Karri is the co-founder of Trust-Hub, Embedded Security Challenge and NYU CRISSP center, the IEEE/ACM Symposium on Nanoscale Architectures and the IEEE Computer Society Technical Committee on Nanoscale Architectures. He is a member of NYU WIRELESS. He was awarded the Humboldt Fellowship and the National Science Foundation CAREER Award.
Justin Cappos is a computer scientist and cybersecurity expert whose data-security software has been adopted by a number of widely used open-source projects. His research centers on software update systems, security, and virtualization, with a focus on real-world security problems.
Prof. Anthony TS Ho (何东旋教授) FIET, FInstP, FBCS, CEng, CPhys is a British computer scientist and Professor of Multimedia Security at the University of Surrey.
JPEG XT is an image compression standard which specifies backward-compatible extensions of the base JPEG standard.
William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
A copy detection pattern (CDP) or graphical code is a small random or pseudo-random digital image which is printed on documents, labels or products for counterfeit detection. Authentication is made by scanning the printed CDP using an image scanner or mobile phone camera. It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process. A CDP can also be inserted into a 2D barcode to facilitate smartphone authentication and to connect with traceability data.
Nancy Rose Mead is an American computer scientist. She is known for her contributions to security, software engineering education and requirements.
Ibrahim "Abe" Moussa Baggili is a cybersecurity and digital forensics scientist at Louisiana State University with a joint appointment between the college of engineering and the Center for Computation and Technology. Before that, he was the founder and director of the Connecticut Institute of Technology (CIT) at the University of New Haven. Baggili was also a full professor and Elder Family Endowed Chair at UNewHaven. He has a B.S., M.S., and Ph.D. in Computer and Information Technology from Purdue University's Purdue Polytechnic Institute. Baggili is a Jordanian/Arab American first generation college graduate and a well-known scientist in the domain of Cyber Forensics and Cybersecurity with seminal peer-reviewed work in the areas of Virtual Reality Forensics (VR) and security, mobile device forensics and security, application forensics, drone forensics and memory forensics.
{{cite news}}
: CS1 maint: location (link)