Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image watermarking
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
A hardware intellectual property protection scheme based digital compression coding technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
Resiliency
intellectual property
intellectual property security
IP core watermark
IP networks
ip protection
policy-based governance
pubcrawl
resilience
industrial property
resource utilization
Robustness
security
surrounding circuit
Table lookup
watermark information
Watermarking
composability
image watermarking
hardware intellectual property protection
hardware circuit
Hardware
FPGA circuit
FPGA
field programmable gate arrays
encoding
embedding cost
Digital Watermark
digital compression coding technology
decoding function
data compression
Cryptography
Compression coding
biblio
Suitability of Singular Value Decomposition for Image Watermarking
Submitted by grigby1 on Fri, 07/03/2020 - 4:53pm
image security
watermarking techniques
Watermarking
Transforms
singular value decomposition
pubcrawl
Metrics
Matrix decomposition
image watermarking
Compositionality
Image reconstruction
Image coding
False positive problem
digital images
Digital Image Watermarking
decomposition
cyber physical systems
cover image
biblio
Improved CRT Image Steganography based on Edge Areas and Spread Embedding
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
PN Sequence
watermarking method
steganography research
Steganography
steganographic images
spread spectrum embedding
Spread Spectrum
spatial domain methods
security
Scalability
safe image steganography method
Resiliency
pubcrawl
composability
Metrics
image watermarking
Image Steganography
good imperceptibility quality
embedded payload
edge detection
data hiding method watermarking
Cryptography
CRT-based steganography
CRT method
CRT image steganography
CRT
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Secured graphic QR code with infrared watermark
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
implicit QR code information
Watermarking
security of data
secured graphic QR code
Resiliency
QR codes
QR code
pubcrawl
optical characteristics
Mobile handsets
mark scanning equipment
Ink
infrared watermarking
infrared watermark
infrared QR code information
infrared detectors
anticounterfeiting feature
image watermarking
image enhancement
image colour analysis
Image color analysis
Image coding
Graphics
general QR code reader
explicit graphic QR code information
error diffusion
data hiding
data encapsulation
cyber physical systems
Cryptography
CMYK printed ink colors
biblio
Multipurpose Color Image Watermarking in Wavelet Domain Using Multiple Decomposition Techniques
Submitted by grigby1 on Mon, 08/12/2019 - 3:23pm
Metrics
Wavelet domain
watermarking scheme
Watermarking
singular value decomposition
Robustness
robust color image watermarking
pubcrawl
ownership verification
multipurpose color image watermarking method
multiple watermark embedding
multiple decomposition techniques
multimedia information
Color
Matrix decomposition
image watermarking
image colour analysis
discrete wavelet transforms
discrete wavelet transform
decomposition
Cyber Physical System
cover information
Conferences
Compositionality
color watermark
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
Advances in the Quantum Theoretical Approach to Image Processing Applications
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
pubcrawl
Resiliency
composability
quantum computing
Scalability
Metrics
image retrieval
edge detection
image compression
image denoising
Image Processing
image storage
image watermarking
quantum computing security
« first
‹ previous
1
2
3
next ›
last »