Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital images
biblio
Forensic Similarity for Digital Images
Submitted by grigby1 on Thu, 04/08/2021 - 4:13pm
digital images
two-part deep-learning system
three-layer neural network
similarity network
multimedia forensics
manipulation parameter
image patches
forgery detection
forensic trace
forensic similarity decision
forensic similarity approach
editing operation
digital image forensics approach
database consistency verification
convolutional neural network-based feature extractor
camera model
deep learning
Forgery
information forensics
Image forensics
Cameras
Forensics
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
feature extraction
Training
learning (artificial intelligence)
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 4:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
Knight’s Tour Matrix
Signal processing algorithms
signal processing
Resiliency
pubcrawl
Partitioning algorithms
n-neighbourhood addition
n-neighborhood addition
Matrix converters
matrix algebra
KT matrix
Knight’s Tour Problem (KTP)
composability
Knight's Tour Problem
knight tour matrix
Image Processing
image encryption
encryption algorithm
encryption
efficient encryption
digital images
cyber physical systems
Cryptography
cover images
biblio
Variable load image steganography using multiple edge detection and minimum error replacement method
Submitted by grigby1 on Mon, 02/08/2021 - 1:02pm
MER method
visual qualities
variable load image steganography
Variable embedding ratio
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
PSNR
multiple edge detection
minimum error replacement method
Minimum error replacement
Metrics
canny operator
Image edge detection
Image coding
human visual system
human eyes
embedding ratio
edge pixels
edge detection
digital images
Data mining
data hiding capacity
Cryptography
Conferences
composability
biblio
Source Device Attribution of Thermal Images Captured with Handheld IR Cameras
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
low-cost handheld thermal camera
thermal imaging devices
Temperature measurement
source device attribution method
source camera
Radiometry
radiometric data
pubcrawl
pocket-size thermal cameras
noise reduction
Metrics
attribution
infrared imaging
Human behavior
handheld IR cameras
Fingerprint recognition
digital images
digital forensics literature
Correlation
composability
Cameras
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
Image Encryption Algorithm Based on Hyper-chaotic Lorenz Map and Compressed Sensing Theory
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
digital image encryption algorithm
Control Theory
random matrix design
multidimensional chaotic system
motion state
motion process
measurement matrix
image encryption
image compression
hyper-chaotic Lorenz map
Hadamard matrix
Hadamard matrices
encryption sequence
Cryptography
compressed sensing theory
chaotic sequence
Sparse matrices
image motion analysis
digital images
Image coding
chaos
compressed sensing
pubcrawl
security
encryption
biblio
Suitability of Singular Value Decomposition for Image Watermarking
Submitted by grigby1 on Fri, 07/03/2020 - 3:53pm
image security
watermarking techniques
Watermarking
Transforms
singular value decomposition
pubcrawl
Metrics
Matrix decomposition
image watermarking
Compositionality
Image reconstruction
Image coding
False positive problem
digital images
Digital Image Watermarking
decomposition
cyber physical systems
cover image
biblio
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
LSB algorithm
trees (mathematics)
stego image
steganography techniques
steganography algorithm
Steganography
sharp edges
security
Scalability
Resiliency
pubcrawl
PSNR
MPC algorithm
MPC
Metrics
composability
LSB
internet
Image coding
full tree
edge detection scheme
edge detection
edge blocks
digital images
data embedding process
data concealment
cover image
corner pixels
confidential data
« first
‹ previous
1
2
3
4
next ›
last »