Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image coding
biblio
Variable load image steganography using multiple edge detection and minimum error replacement method
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
MER method
visual qualities
variable load image steganography
Variable embedding ratio
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
PSNR
multiple edge detection
minimum error replacement method
Minimum error replacement
Metrics
canny operator
Image edge detection
Image coding
human visual system
human eyes
embedding ratio
edge pixels
edge detection
digital images
Data mining
data hiding capacity
Cryptography
Conferences
composability
biblio
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images
Submitted by grigby1 on Mon, 02/08/2021 - 2:01pm
security
Metrics
MSE
peak signal-to-noise ratio
PSNR
pubcrawl
resilience
Resiliency
Scalability
message security
SSIM
Steganography
stereo image processing
structural similarity index measure
Three-dimensional displays
Two dimensional displays
visualization
Image coding
AES-256
AES–256
composability
Cryptography
Data Security
edge detected pixels
edge detection
Entropy
3D cover images
Image edge detection
LSB embedding
LSB steganography
MAE
mean absolute error
mean square error
mean square error methods
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 1:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
mean square error
World Wide Web
transposition cipher method
text file
text encryption
text encoding
SNR
single to noise ratio
Resiliency
pubcrawl
PSNR
privacy
Predictive Metrics
performance evaluation
peak single to noise
MSE
Cryptography
Information hiding
image visual quality
image retrieval
Image Processing
Image coding
Human behavior
hidden data mechanism
genetic algorithms
genetic algorithm
encryption
DNA encoding
DNA cryptography
DNA coding
DNA
digital media
biblio
DNA based Computing Encryption Scheme Blending Color and Gray Images
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
Human behavior
encryption
Encryption Biometric image
encryption key
encryption scheme blending color
face recognition
fingerprint identification
fingerprint image
Fingerprint recognition
gray fingerprint images
DNA sequence
Image coding
Image color analysis
image colour analysis
image sequences
matrix algebra
Predictive Metrics
privacy
pubcrawl
Resiliency
Cipher
resilience
Scalability
Metrics
attacks
authentication
authorisation
biometric image
Blending
blending images
biometric encryption
color images
computing method
Conversions
Cryptography
DNA
DNA computing
DNA computing algorithm
DNA cryptography
biblio
Medical Image Compression and Encryption using Chaos based DNA Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
encryption
Resiliency
Human behavior
pubcrawl
privacy
DNA
Image coding
Ciphers
Predictive Metrics
Transforms
Biomedical imaging
DNA cryptography
discrete wavelet transforms
Discrete Haar Wavelet Transform
lossless compression
medical image encryption
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
Collaborative Distillation for Ultra-Resolution Universal Style Transfer
Submitted by aekwall on Mon, 02/01/2021 - 11:44am
linear embedding loss
compressed models
convolutional filters
deep convolutional neural network models
encoder-decoder based neural style transfer
encoder-decoder pairs
exclusive collaborative relationship
feature size mismatch
knowledge distillation method
leverage rich representations
collaborative distillation
student network
style transfer models
trained models
ultra-resolution images
ultra-resolution universal style transfer
universal style transfer
universal style transfer methods
VGG-19
Image coding
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
Decoding
convolutional neural nets
optimisation
data compression
Scalability
collaboration
Image resolution
Predictive Metrics
Knowledge engineering
encoding
graphics processing units
Image reconstruction
neural style transfer
biblio
PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification
Submitted by grigby1 on Thu, 01/28/2021 - 1:34pm
natural language processing
Traffic identification
telecommunication traffic
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
Payloads
android encryption
Metrics
Image coding
Human behavior
feature extraction
Encrypted traffic classification
dynamic word embedding
deep learning
Cryptography
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »