Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image coding
biblio
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
image steganography scheme
steganography detection
Steganography
standards
smoothing methods
secret message concealing
PVD systems
pubcrawl
privacy
Neural networks
neural nets
Metrics
media file
improved-AMBTC algorithm
improved absolute moment block truncation coding algorithm
adaptive systems
Image Steganography
Image edge detection
image concealing
image compression methods
Image coding
I-AMBTC
hybrid adaptive neural networks
HVS
edge detection operators
data compression
composability
ART
ANNS
biblio
A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
Image coding
telecommunication traffic
steganography detection
Steganography
steganographic images
statistical signature based steganalysis algorithms
pubcrawl
privacy
open source tool
network traffic
Metrics
Media
internet
Algorithm design and analysis
embedded messages
Data mining
data encapsulation
data breach prevention
data breach detection
Cryptography
cover file
corporate networks
concealed data
composability
automatic detection
biblio
Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Ecosystems
travel industry
statu nascendi
security of data
security
Scalability
Resiliency
pubcrawl
Iris recognition
Image coding
Identity management
Human behavior
electronic travel documents
electronic commerce
bitcoin security
e-passports
document handling
Cryptography
content harmonisation
breeder document standardisation
breeder document long-term security enhancement
breeder document
blockchain
Bitcoin blockchain
bitcoin
birth certificates
birth certificate
biometrics
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
biblio
Analysis of wavelet, ridgelet, curvelet and bandelet transforms for QR code based image steganography
Submitted by grigby1 on Tue, 01/23/2018 - 2:59pm
pubcrawl
wavelet transforms
wavelet transform
transform coefficients
transform based image steganography
Steganography
security applications
security
secret message
ridgelet transform
Resiliency
QR codes
QR code based image steganography
bandelet transform
information security
Image Processing
Image coding
frequency-domain analysis
discrete wavelet transforms
discrete cosine transforms
cyber physical systems
curvelet transforms
curvelet transform and bandelet transform
curvelet transform
Cryptography
bit-plane based steganography method
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
A secure steganography algorithm using compressive sensing based on HVS feature
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
secure steganography algorithm
Metrics
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
Robustness
Scalability
Science of Security
secret messages
Image coding
security
Sparse matrices
steganographic technology
Steganography
stego image
stego object
Subsampling
Visual systems
data encapsulation
Bit Correction Rate
carrier object
collaboration
composability
compressed sensing
compressive sensing
compressive sensing technology
Cryptography
BCR
Data mining
digital image
discrete cosine transforms
Human behavior
Human Factors
human visual system features
HVS
HVS feature
biblio
Correlation based highly secure image hiding in audio signals using wavelet decomposition and chaotic maps hopping for 5G multimedia communications
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
Multimedia communication
encoding
hidden data
higher hiding capacity
highly secure image hiding
Image coding
image data
image hiding process
Metrics
efficient secure steganography scheme
possible important applications
pubcrawl
Robustness
secret communications
security
Steganography
successive audio signals
wavelet transforms
correlation based image hiding
5G mobile communication
5G multimedia communications
actual audio samples
audio coding
Audio Steganography
chaotic communication
chaotic maps hopping
Compositionality
5G communication systems
cover audio file
cover audio signal
data encapsulation
data hiding
decomposition
differential pulse coding modulation technique
discrete wavelet transform
discrete wavelet transforms
biblio
Chaos-Based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
DNA
shuffled image
Resiliency
quantum chaotic map
pubcrawl
number theory
Metrics
Matrix converters
Image encryption and compression
image colour analysis
Image coding
encryption
DNA complementary rule
Algorithm design and analysis
data compression
Cryptography
compression algorithm
composability
color image encryption
Color
Chinese remainder theorem
chaotic cryptography
chaos
biological techniques
bioinformatics
biblio
Side-channel information leakage of encrypted video stream in video surveillance systems
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
pubcrawl
video surveillance systems
video surveillance
video streaming
video encoding standards
video coding
user basic activities
traffic size data
Streaming media
side-channel information leakage
Resiliency
residual image
Redundancy
Cameras
off-the-shelf cameras
Metrics
Image coding
Human Factors
Human behavior
home security
HIPAA regulations
encrypted video stream traffic patterns
encoding
data compression
Cryptography
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »