Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image coding
biblio
Efficient and robust perceptual hashing using log-polar image representation
Submitted by BrandonB on Wed, 05/06/2015 - 12:02pm
key dependent noninvertible transform
Watermarking
Vectors
Transforms
Robustness
robust perceptual hashing
robust image hashing
registration technique
perceptual hashing
multimedia security
log-polar transformation
Log-Polar transform feature
log polar image representation
content authentication
image recognition technique
Image Processing
image indexing
Image coding
image authentication
Hamming distance
Fourier-Mellin transforms
Fourier transforms
feature extraction
database search
Cryptography
biblio
Discrete Cosine Transform Locality-Sensitive Hashes for Face Retrieval
Submitted by BrandonB on Wed, 05/06/2015 - 11:54am
image querying
Vectors
retrieval efficiency
RaFD
Probes
multiPIE
Locality-Sensitive Hashing (LSH)
locality-sensitive hashes
Local Binary Patterns (LBP)
local binary patterns
linear search
LFW
Kernel
indexing
index structures
image retrieval
BioID
Image coding
hash suppression
FERET
FEI
face retrieval
face recognition
face indexing
face descriptors
face databases
Face
discrete cosine transforms
discrete cosine transform hashing
Discrete Cosine Transform (DCT) hashing
DCT hashing
Cryptography
biblio
Multi-signature robust video watermarking
Submitted by BrandonB on Wed, 05/06/2015 - 11:06am
Robustness
watermarking solution
watermarking algorithm capacity
Watermarking
video watermarking
video frame
SVD
Streaming media
singular value decomposition
robustness-invisibility-capacity
digital processing
PSNR
multisignature robust video watermarking
mosaic
invisibility
image segmentation
Image coding
frequency watermarking
double signature
digitized trade
biblio
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
Submitted by BrandonB on Wed, 05/06/2015 - 9:14am
photon-counting imaging
Optical polarization
Optical security and encryption
optical security method
optically phase encoded QR code
phase coding
photon counting
photon counting imaging
photon-counting encryption
optical masks
photon-counting security tagging
Photonics
robust read out
smart phones
speckle
speckle signature
statistical analysis
image encryption
coherent imaging
commercial Smartphone
Cryptography
decryption
full phase double-random-phase encryption
Huffman codes
Image coding
image compressing
Adaptive optics
iterative Huffman coding
Iterative methods
masks
Nonlinear optics
object authentication
Optical filters
Optical imaging
biblio
A hybrid lossless and lossy compression scheme for streaming RGB-D data in real time
Submitted by BrandonB on Tue, 05/05/2015 - 12:39pm
streaming
red-green-blue-depth data
rescue robots
response robot
RGB images
RGB-D cameras
RGB-D data streaming
robot vision
robots
Servers
point cloud
tethers
Three-dimensional displays
urban search and rescue
USAR
USAR operations
video
video streaming
Wireless communication
wireless radio
disaster environment
3D depth data capture
aerial robots
aerospace robotics
Cameras
Compression
Computers
computing power requirements
data compression
data throughput
3D
Hardware
Image coding
image colour analysis
live streaming
lossless compression scheme
lossy compression scheme
low-power embedded computing equipment
Microsoft Kinect
mobile robots
biblio
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:33am
JPEG2000 coding
TSH transform
tree-structured Harr transform
Transforms
social networking (online)
Social network services
social network analysis
secure multimedia big data sharing
multimedia computing
Multimedia communication
media distribution protection
JPEG2000 compressed domain
Big Data
Image coding
hybrid multicast-unicast
Homomorphic encryption
hierarchical community structure
Fingerprinting
fingerprint code
encryption
Data protection
data compression
Cryptography
Communities
biblio
Tagged visual cryptography with access control
Submitted by BrandonB on Tue, 05/05/2015 - 8:46am
meaningless share images
visualization
visual cryptography
tagged visual cryptography
Stacking
self-authentication mechanism
secret sharing
secret image
printed pattern
Pattern recognition
message authentication
Access Control
lossless construction ability
image secret sharing scheme
Image coding
Equations
encryption
Cryptography
authorization
authorisation
authentication
biblio
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution
Submitted by BrandonB on Mon, 05/04/2015 - 2:19pm
Image quality
Videos
source attribution techniques
source attribution
seam-carving-based anonymization
seam-carving method
seam-carving
PRNU noise pattern-based source attribution
PRNU noise pattern
photoresponse nonuniformity
Noise
anonymization
image denoising
Image coding
image anonymization
deanonymization attacks
de-anonymization attacks
counter-forensics
Correlation
content-aware resizing method
Cameras
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
TTP-free asymmetric fingerprinting protocol based on client side embedding
Submitted by BrandonB on Mon, 05/04/2015 - 12:05pm
image watermarking
Watermarking
TTP-free asymmetric fingerprinting protocol
trusted third party
Trusted Computing
Table lookup
Servers
secure watermark embedding
scalability issues
Protocols
personalized decryption key distribution
nonblind decoding
Multimedia systems
multimedia content distribution
asymmetric protocols
Image coding
Fingerprinting
encryption
Decoding
customer rights
Cryptographic Protocols
client-side embedding technique
client-side embedding distribution framework
Client-side embedding
client-server systems
Buyer-Seller watermarking protocol
Buyer's fingerprint
binary fingerprint
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »