Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image coding
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 12:56pm
Asymmetric Encryption
technological advancements especially wireless sensor network
symmetric
image encryption techniques
image destruction
era security
encryption approaches
encryption algorithms
different transfer mediums
cipher text
asymmetric key
Asymmetric
Cryptography
decryption
Image Processing
authenticity
Image coding
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
encryption
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 11:29am
Resiliency
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
information embedding
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
CPU utilization
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
covert channels
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
Encryption of the Images on the Basis of Two Chaotic Systems with the Use of Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:21am
Fuzzy Cryptography
statistical analysis
Scalability
Resiliency
pubcrawl
pseudorandom sequences
Metrics
image encryption system
Image coding
fuzzy logic encryption
Fuzzy logic
security
Entropy
digital cryptography
Cryptography
correlation coefficient
Chaotic systems
Chaotic Mapping
chaotic map
chaotic encryption
chaotic cryptography
chaos
biblio
Singular Value Decomposition (SVD) based Image Tamper Detection Scheme
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
SVD
singular values
S-matrix theory
S matrix
quick response code feature extraction
quick response code
QR codes
QR code
image tamper detection scheme
image authentication techniques
image authentication
digital imaging
Cryptography
coding theory
singular value decomposition
Image coding
source coding
feature extraction
Compositionality
security
Resiliency
resilience
Metrics
pubcrawl
biblio
A Simple Way of Multimodal and Arbitrary Style Transfer
Submitted by grigby1 on Fri, 12/11/2020 - 2:53pm
arbitrary style transfer
convolutional neural network
deep learning
Image coding
Image quality
image style transfer
Metrics
multimodal style transfer
neural style transfer
pubcrawl
resilience
Resiliency
Scalability
style encoding subnetwork
unimodal style transfer methods
biblio
Separating Style and Content for Generalized Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 12:11pm
Gallium nitride
Training
style reference images
style encoder
Silicon
neural nets
multitask learning scenario
Mixers
learning (artificial intelligence)
learned model
image representation
Image coding
Generators
generalized style transfer network
neural style transfer
feature extraction
Decoding
decoder
convolution
content reference images
content encoder
Chinese Typeface transfer problem
bilinear model
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 1:12pm
J-UNIWARD
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
Steganography
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
computer architecture
CNN model
Compositionality
Transform coding
distortion
convolution
discrete cosine transforms
Image coding
data compression
convolutional neural nets
Training
deep learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
Enhancing Security in Medical Image Informatics with Various Attacks
Submitted by aekwall on Mon, 10/19/2020 - 12:00pm
Metrics
medical data
Medical Expert biometric information
Medical Expert Communication
medical image authentication
Medical image compression
Medical image informatics
medical image processing
medical information systems
Kerberos
National Institute of Health
NIH
pubcrawl
Region of Interest and Non-Interest
Resiliency
reversible watermarking
surgery
telemedicine
electronic patient record
authorisation
authorized medical experts
Aycan sample digital images
Cryptography
digital signature
digital signatures
digital watermarking
diseases
Arnold’s Cat Map
EPR
extraction process
Human behavior
image archives
Image coding
image watermarking
internet
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »