Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data compression
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
"Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"
Submitted by grigby1 on Tue, 02/14/2017 - 12:35pm
hybrid cryptosystem
user authentication
transmission
secure image transmission
secret fragment visible mosaic image method
pubcrawl170102
PSNR
mosaic image
key generation
image security
image parameter
image lossless compression technique
image integrity
image data integrity
image compression
Image coding
authentication
human being
Fingerprint recognition
encryption purpose
encryption
data hiding encryption
data compression
data communication
Cryptography
confidential information
Compression
biometrics (access control)
biometric fingerprint
Biomedical imaging
authorisation
authentication purpose
biblio
"Separation of encrypted and compressed image with auxillary information"
Submitted by grigby1 on Tue, 02/14/2017 - 12:25pm
image compression
uncompressed picture scrambling
quantized information
quantization technique
quantisation (signal)
pubcrawl170102
pressure proportion mutilation criteria
picture recreation
packed reproduced scrambled information
Magneto electrical resistivity imaging technique
information pressure
image encryption
auxiliary information
Image coding
helper data
grid computing
encrypted image separation
encoded picture compacting
encoded information
data compression
Cryptography
Compression ratio-distortion performance
compressed image separation
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 2:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
biblio
"An edge based image steganography with compression and encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:01pm
Image coding
stego image distortion
Steganography
secret message
Secret key
pubcrawl170102
private key cryptography
Optical distortion
Media
MATLAB
LZW algorithm
Image edge detection
ART
Hash Function
encryption
embedded secret data
edge detection
edge based image steganography
data hiding capacity
data encryption
data compression
Cryptography
canny edge detector
biblio
"Improved serial 2D-DWT processor for advanced encryption standard"
Submitted by grigby1 on Mon, 02/13/2017 - 1:08pm
Hardware
size 65 nm
serialized DT processor
serial 2D-DWT processor
secured image processing
RTL-GDSII
Quantization (signal)
pubcrawl170102
low power ASIC
lifting scheme algorithm
image data security
Image coding
high speed encryption
advanced encryption standard
frequency 333 MHz
encryption
DWT
discrete wavelet transforms
discrete wavelet transform
data compression
Cryptography
compression ratio
CMOS technology
ASIC circuit design
application specific integrated circuits
AES
biblio
A hybrid lossless and lossy compression scheme for streaming RGB-D data in real time
Submitted by BrandonB on Tue, 05/05/2015 - 12:39pm
streaming
red-green-blue-depth data
rescue robots
response robot
RGB images
RGB-D cameras
RGB-D data streaming
robot vision
robots
Servers
point cloud
tethers
Three-dimensional displays
urban search and rescue
USAR
USAR operations
video
video streaming
Wireless communication
wireless radio
disaster environment
3D depth data capture
aerial robots
aerospace robotics
Cameras
Compression
Computers
computing power requirements
data compression
data throughput
3D
Hardware
Image coding
image colour analysis
live streaming
lossless compression scheme
lossy compression scheme
low-power embedded computing equipment
Microsoft Kinect
mobile robots
biblio
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:33am
JPEG2000 coding
TSH transform
tree-structured Harr transform
Transforms
social networking (online)
Social network services
social network analysis
secure multimedia big data sharing
multimedia computing
Multimedia communication
media distribution protection
JPEG2000 compressed domain
Big Data
Image coding
hybrid multicast-unicast
Homomorphic encryption
hierarchical community structure
Fingerprinting
fingerprint code
encryption
Data protection
data compression
Cryptography
Communities
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
« first
‹ previous
1
2
3
4
5
next ›
last »