Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
video coding
biblio
Sliding-Window Forward Error Correction Based on Reference Order for Real-Time Video Streaming
Submitted by grigby1 on Mon, 07/31/2023 - 3:49pm
pubcrawl
Metrics
resilience
composability
delays
Streaming media
encoding
Decoding
error correction codes
forward error correction
Resiliency
scalable video coding
Static VAr compensators
video coding
Real-time video streaming
reference order
biblio
Human pose based video compression via forward-referencing using deep learning
Submitted by grigby1 on Fri, 06/23/2023 - 10:07am
Predictive models
visual communication
Video compression
video coding
Semantics
Scalability
Resiliency
resilience
pubcrawl
deep video
Predictive coding
pose estimation
Metrics
Image coding
generative adversarial network
forward referencing
deep learning
Correlation
biblio
Video Coding Method in a Condition of Providing Security and Promptness of Delivery
Submitted by grigby1 on Fri, 07/01/2022 - 7:28am
data handling
quantization
information resources
hiding protection
coding
video coding
Resiliency
PSNR
Availability
coding theory
security
Transform coding
Quantization (signal)
Telecommunications
Reliability
Bandwidth
Metrics
resilience
pubcrawl
biblio
Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks
Submitted by grigby1 on Tue, 03/15/2022 - 1:17pm
pubcrawl
Heuristic algorithms
Scalability
quality of service
Switches
software-defined networking
Scalable Security
Multicast algorithms
Multimedia streaming
scalable video coding
Static VAr compensators
video coding
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 4:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Resiliency
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
information embedding
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
CPU utilization
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
covert channels
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 8:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Chaos-based video steganography
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Metrics
video coding
Tinkerbell 2D chaotic map
Tinkerbell
Steganography
shift registers
Resiliency
randomized data hiding points
pubcrawl
PSNR
NonLinear Feedback Shift Register
nonlinear dynamics physics
NLFSR
Mutual information
chaos
information technology
Image Steganography
Image color analysis
frame embedding position
data hiding limit
data hiding
Cryptography
composability
chaotic map
chaotic cryptography
chaotic communication
chaos-based video steganography mechanism
biblio
Side-channel information leakage of encrypted video stream in video surveillance systems
Submitted by grigby1 on Mon, 11/20/2017 - 11:05am
pubcrawl
video surveillance systems
video surveillance
video streaming
video encoding standards
video coding
user basic activities
traffic size data
Streaming media
side-channel information leakage
Resiliency
residual image
Redundancy
Cameras
off-the-shelf cameras
Metrics
Image coding
Human Factors
Human behavior
home security
HIPAA regulations
encrypted video stream traffic patterns
encoding
data compression
Cryptography
1
2
next ›
last »