Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image coding
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
Hyper-chaos
Two dimensional displays
Sparse matrices
sparse coefficients
security
Resiliency
resilience
pubcrawl
privacy
matrix algebra
Logistics
linear measurements
Image reconstruction
Image coding
hyper-chaos based image compression-encryption algorithm
hyper-chaos based diffusion
2D-Compressive Sensing
encryption
data compression
cyber physical systems
Cyber Physical System
Cryptography
compressive sensing
compressive sampling
compression-encryption algorithm
Compression
compressed sensing
composability
cipher image
chaotic communication
chaos based measurement matrix construction
chaos
biblio
Visual Secret Sharing Scheme for Color QR Code
Submitted by aekwall on Mon, 09/23/2019 - 10:47am
Image reconstruction
VSS scheme
visual secret sharing scheme
visual secret sharing
visual effects
Stacking
secret image splitting
secret image reconstruction
secret image encoding
secret image bits
Resiliency
QR codes
pubcrawl
novel visual secret sharing scheme
color QR code
image colour analysis
Image color analysis
Image coding
human visual system
Fuses
error correction codes
error correction ability
error correction
encoding
Decoding
cyber physical systems
Cryptography
color QR code share
biblio
Secured graphic QR code with infrared watermark
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
implicit QR code information
Watermarking
security of data
secured graphic QR code
Resiliency
QR codes
QR code
pubcrawl
optical characteristics
Mobile handsets
mark scanning equipment
Ink
infrared watermarking
infrared watermark
infrared QR code information
infrared detectors
anticounterfeiting feature
image watermarking
image enhancement
image colour analysis
Image color analysis
Image coding
Graphics
general QR code reader
explicit graphic QR code information
error diffusion
data hiding
data encapsulation
cyber physical systems
Cryptography
CMYK printed ink colors
biblio
Image Steganography Using Combine of Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal Noise Ratio
Submitted by grigby1 on Mon, 08/12/2019 - 3:23pm
image technique discrete wavelet transform
wavelet transforms
Watermarking
Steganography
singular value decomposition performance
singular value decomposition method
Singular Value Decomposition (SVD)
singular value decomposition
Robustness
pubcrawl
Peak Signal Noise Ratio (PSNR)
Metrics
Mean Squared Error (MSE)
mean squared error
Compositionality
Image Steganography
Image coding
higher peak signal noise ratio
frequency-domain analysis
encryption method
discrete wavelet transforms
Discrete Wavelet Transform (DWT)
discrete cosine transforms
discrete cosine transform
decomposition
Cyber Physical System
Cryptography
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
Bit Localization in Least Significant Bit Using Fuzzy C-Means
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
Market research
Watermarking
steganography methods
steganography detection
Steganography
Seminars
pubcrawl
PSNR
privacy
pattern clustering
MSE
Metrics
message decryption
mean square error methods
bit localization
LSB\\_FCM
least significant bit
Image Processing
Image edge detection
Image coding
hidden message
fuzzy C-means clustering method
Fuzzy C Means
embedded message
discrete cosine transforms
Cryptography
composability
clustering
biblio
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
long-term confrontation
without embedding
Transform coding
Training
trained generator neural network model
traditional embedding-based steganography
steganography detection
Steganography
state-of-the-art image steganalysis algorithms
secret information
Resists
pubcrawl
privacy
noise vector
Metrics
machine-learning-based steganalysis algorithms
Brain modeling
learning (artificial intelligence)
image SWE method
image steganography method
image generation
Image coding
generative adversarial networks
Gallium nitride
feedforward neural nets
distortion
digital images
deep convolutional generative adversarial networks
data encapsulation
coverless
composability
carrier image
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
biblio
An energy-efficient wireless image transmission method based on adaptive block compressive sensing and softcast
Submitted by grigby1 on Thu, 08/23/2018 - 11:41am
SoftCast
power allocation
power allocation factors
privacy
pubcrawl
radical evolution
radiocommunication
receiving image qualities
resilience
Resiliency
sampling rate
optimization
SR
staggering rate
telecommunication power management
transmission distortion
visual communication
Wireless communication
wireless image transmission
wireless multimedia communication
wireless sensor networks
energy consumption
adaptive block compressive sensing
Communication system security
composability
compressed sensing
compression distortion
compressive sampling
cyber-physical systems
data compression
distortion
energy conservation
ABCS-SoftCast
energy-distortion model
energy-efficient wireless image transmission method
energy-efficient wireless image transmission scheme
image block
Image coding
Image communication
information and communication technology
Multimedia communication
optimisation
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »