Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital images
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 11:43am
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
encoding
unauthorized data access
polymers
polymerase chain reaction amplification
image protection
dual layer image encryption
DNA encryption
digital image security
biological sequences
binary encoding
biocomputing
DNA cryptography
cryptographic algorithms
image encryption
authorisation
Predictive Metrics
digital images
DNA
privacy
Image coding
Data protection
pubcrawl
Human behavior
Resiliency
encryption
Data Security
Cryptography
biblio
Comparative Evaluations of Privacy on Digital Images
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
differential privacy
privacy models and measurement
societal issue
personal privacy analysis
digital images
comparative evaluations
privacy measurement
Face
Sensitivity
data privacy
social networks
Metrics
social networking (online)
Licenses
privacy
privacy preservation
pubcrawl
feature extraction
biblio
Comparative Evaluations of Privacy on Digital Images
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
differential privacy
privacy models and measurement
societal issue
personal privacy analysis
digital images
comparative evaluations
privacy measurement
Face
Sensitivity
data privacy
social networks
Metrics
social networking (online)
Licenses
privacy
privacy preservation
pubcrawl
feature extraction
biblio
Second Level Steganalysis - Embeding Location Detection Using Machine Learning
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Cloud Computing
composability
Data mining
digital images
discrete cosine transforms
feature extraction
machine learning
Markov processes
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
Transform coding
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Submitted by grigby1 on Fri, 02/22/2019 - 3:08pm
long-term confrontation
without embedding
Transform coding
Training
trained generator neural network model
traditional embedding-based steganography
steganography detection
Steganography
state-of-the-art image steganalysis algorithms
secret information
Resists
pubcrawl
privacy
noise vector
Metrics
machine-learning-based steganalysis algorithms
Brain modeling
learning (artificial intelligence)
image SWE method
image steganography method
image generation
Image coding
generative adversarial networks
Gallium nitride
feedforward neural nets
distortion
digital images
deep convolutional generative adversarial networks
data encapsulation
coverless
composability
carrier image
biblio
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Entropy
Resiliency
pubcrawl
Mutual information
Metrics
Logistics
information security
Image color analysis
frequency-domain analysis
chaotic cryptography
encryption
Discrete Fourier transforms
digital images
Deterministic Encryption
Correlation
composability
chaotic encryption
biblio
"Multiple embedding secret key image steganography using LSB substitution and Arnold Transform"
Submitted by grigby1 on Tue, 02/14/2017 - 12:13pm
pubcrawl170102
visualization
Transforms
Steganography
Spatial domain
security of data
secret key image steganography
secret image encryption
Public key
Arnold transform
LSB substitution
Image coding
Histograms
digital images
Digital Image Steganography
Data Security
Cryptography
covert channel
« first
‹ previous
1
2
3
4
next ›
last »