Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image watermarking
biblio
Integer Wavelet Transform and Dual Decomposition Based Image Watermarking scheme for Reliability of DICOM Medical Image
Submitted by grigby1 on Thu, 06/22/2023 - 1:43pm
wavelet transforms
speckle
Liver
Dicom medical image
decomposition
Schur decomposition
image watermarking
ultrasonic imaging
IWT
encryption
chaotic encryption
Watermarking
Robustness
composability
Metrics
Human behavior
pubcrawl
biblio
A Chaotic Encrypted Reliable Image Watermarking Scheme based on Integer Wavelet Transform-Schur Transform and Singular Value Decomposition
Submitted by grigby1 on Thu, 06/22/2023 - 1:42pm
Robustness
decomposition
Schur decomposition
image watermarking
IWT
wavelet transforms
SVD
chaotic encryption
Watermarking
encryption
Matrix decomposition
Histograms
chaotic communication
composability
Metrics
Human behavior
pubcrawl
biblio
Visible-Imperceptible Image Watermarking based on Reversible Data Hiding with Contrast Enhancement
Submitted by aekwall on Mon, 06/28/2021 - 12:40pm
information security
intellectual property security
security information
reversible data hiding
image watermarking
Contrast Enhancement
intellectual property
Image Processing
smart devices
Resiliency
visualization
digital images
Watermarking
Robustness
policy-based governance
composability
pubcrawl
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 5:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
Establishing Authenticity for DICOM images using ECC algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 3:05pm
medical image processing
telemedicine
tampered data
signature verification
security
Scalability
Resiliency
resilience
pubcrawl
privacy
patient records
MRI brain images
Metrics
Medical services
medical related image files
medical information systems
authenticity
medical image files
Medical diagnostic imaging
magnetic resonance imaging
image watermarking
Human behavior
Electronic Medical Records (EMR)
ECDSA algorithm
ECDSA
ECC algorithm
digital signatures
DICOM images
DICOM
data privacy
BIOS
biomedical MRI
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
Optimal Image Watermark Technique Using Singular Value Decomposition with PCA
Submitted by aekwall on Mon, 02/15/2021 - 4:43pm
Matrix converters
decomposition
wavelet transformation
tracing copyright infringements
principle component analysis
peak signal-to-noise ratio
optimum digital image watermark technique
intellectual property right
image compression
discrete wavelet transformation-singular value decomposition approach
banknote authentication
singular value decomposition
discrete wavelet transforms
principal component analysis
Matrix decomposition
Compositionality
Color
cyber physical systems
Watermarking
image watermarking
Image coding
data compression
PCA
Metrics
pubcrawl
biblio
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Submitted by aekwall on Mon, 02/01/2021 - 11:43am
DNN-based image translation attack
attacker-chosen disease condition
attacking medical image diagnostics
biomedical image
biomedical imagery
biomedical optical imaging
deep generative models
deep learning tools
defenses
neural style transfer
eye
healthcare domain
Jekyll
medical domain
medical image diagnostics
neural style transfer framework
patient healthcare
retinal fundus image modalities
image segmentation
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
neural nets
image watermarking
attacks
Scalability
Generative Models
Predictive Metrics
deep neural networks
sensitive data
medical image processing
medical images
diseases
medical professionals
biblio
Enhancing Security in Medical Image Informatics with Various Attacks
Submitted by aekwall on Mon, 10/19/2020 - 12:00pm
Metrics
medical data
Medical Expert biometric information
Medical Expert Communication
medical image authentication
Medical image compression
Medical image informatics
medical image processing
medical information systems
Kerberos
National Institute of Health
NIH
pubcrawl
Region of Interest and Non-Interest
Resiliency
reversible watermarking
surgery
telemedicine
electronic patient record
authorisation
authorized medical experts
Aycan sample digital images
Cryptography
digital signature
digital signatures
digital watermarking
diseases
Arnold’s Cat Map
EPR
extraction process
Human behavior
image archives
Image coding
image watermarking
internet
biblio
Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain
Submitted by grigby1 on Fri, 10/16/2020 - 11:10am
Human behavior
Watermarking
Transforms
singular value decomposition
Signal processing algorithms
security of data
Robustness
robust watermarking algorithm
Resiliency
resilience
pubcrawl
policy-based governance
information security measures
information security
image watermarking
Image coding
collaboration
government data processing
frequency domain
Electronic government
e-government platform
e-government document images
E-Government
DWT
document image processing
discrete wavelet transforms
discrete Wavelet transformation
digital watermarking
Cybersecurity
copyright protection
copyright
1
2
3
next ›
last »