Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
content authentication
biblio
Efficient and robust perceptual hashing using log-polar image representation
Submitted by BrandonB on Wed, 05/06/2015 - 12:02pm
key dependent noninvertible transform
Watermarking
Vectors
Transforms
Robustness
robust perceptual hashing
robust image hashing
registration technique
perceptual hashing
multimedia security
log-polar transformation
Log-Polar transform feature
log polar image representation
content authentication
image recognition technique
Image Processing
image indexing
Image coding
image authentication
Hamming distance
Fourier-Mellin transforms
Fourier transforms
feature extraction
database search
Cryptography
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication