Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
visual cryptography
biblio
Design and Implementation of a Secure QR Payment System Based on Visual Cryptography
Submitted by aekwall on Thu, 07/14/2022 - 4:16pm
Logic gates
Cryptography
visualization
Servers
pubcrawl
Resiliency
Receivers
Mobile Applications
cyber-physical systems
information management
visual cryptography
online payment systems
QR codes
biblio
V-CRYPT: A Secure Visual Cryptography System
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Predictive Metrics
Scientific Computing Security
voting
visual cryptography
phishing attack
Hacker
election
cryptographic techniques
scientific computing
information management
Image Processing
Compositionality
Complexity theory
Resiliency
pubcrawl
encryption
data privacy
visualization
security
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
Optimization Based Adaptive Tagged Visual Cryptography
Submitted by aekwall on Mon, 08/26/2019 - 9:56am
visual cryptography
tagged visual cryptography
Scalability
Resiliency
pubcrawl
policy-based governance
optimization
Metrics
Human behavior
genetic algorithm
cryptology
adaptive tagged visual cryptography
biblio
"Privacy preserving of two sixteen-segmented image using visual cryptography"
Submitted by grigby1 on Thu, 02/23/2017 - 11:42am
privacy preservation
visualization
visual cryptography
unauthorized access
text analysis
statistical test
statistical analysis
sixteen-segmented text image
secret sharing
pubcrawl
16-segment display
information security
image segmentation
document image processing
Data Security
pubcrawl170105
data privacy
Cryptography
authorisation
Algorithm design and analysis
biblio
Secure Mail using Visual Cryptography (SMVC)
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
OpenPGP
wavelet transforms
wavelet transform
wavelet decomposition
visualization
visual cryptography
transmission medium
SMVC
secure mail using visual cryptography
Receivers
receiver side
receipent mail box
public key cryptography
public key based image authentication method
pretty good privacy
personal security
CFB mode encryption
message authentication
low frequency wavelet coefficient
Internet standards
Image Processing
Heuristic algorithms
gray scale image
encryption
Electronic mail
e-mail messaging
dynamic s-box algorithm
data privacy
chaos-based image encryption algorithm
chaos based image encryption algorithm
chaos
biblio
Tagged visual cryptography with access control
Submitted by BrandonB on Tue, 05/05/2015 - 8:46am
meaningless share images
visualization
visual cryptography
tagged visual cryptography
Stacking
self-authentication mechanism
secret sharing
secret image
printed pattern
Pattern recognition
message authentication
Access Control
lossless construction ability
image secret sharing scheme
Image coding
Equations
encryption
Cryptography
authorization
authorisation
authentication
biblio
Preserving privacy for video surveillance via visual cryptography
Submitted by BrandonB on Fri, 05/01/2015 - 9:29am
privacy protection
visualization
visual cryptography
video surveillance
video frame
sensitive privacy information preservation method
Random-Grid
random selection
PSNR
Cameras
privacy
performance evaluation
GRG-based VCS
generalized random-grid based visual cryptography scheme
foreground pixels
Data protection
Cryptography