Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Watermarking
biblio
Multipurpose Color Image Watermarking in Wavelet Domain Using Multiple Decomposition Techniques
Submitted by grigby1 on Mon, 08/12/2019 - 2:23pm
Metrics
Wavelet domain
watermarking scheme
Watermarking
singular value decomposition
Robustness
robust color image watermarking
pubcrawl
ownership verification
multipurpose color image watermarking method
multiple watermark embedding
multiple decomposition techniques
multimedia information
Color
Matrix decomposition
image watermarking
image colour analysis
discrete wavelet transforms
discrete wavelet transform
decomposition
Cyber Physical System
cover information
Conferences
Compositionality
color watermark
biblio
Image Steganography Using Combine of Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal Noise Ratio
Submitted by grigby1 on Mon, 08/12/2019 - 2:23pm
image technique discrete wavelet transform
wavelet transforms
Watermarking
Steganography
singular value decomposition performance
singular value decomposition method
Singular Value Decomposition (SVD)
singular value decomposition
Robustness
pubcrawl
Peak Signal Noise Ratio (PSNR)
Metrics
Mean Squared Error (MSE)
mean squared error
Compositionality
Image Steganography
Image coding
higher peak signal noise ratio
frequency-domain analysis
encryption method
discrete wavelet transforms
Discrete Wavelet Transform (DWT)
discrete cosine transforms
discrete cosine transform
decomposition
Cyber Physical System
Cryptography
biblio
Additive Spread Spectrum Image Hiding Algorithm Based on Host Signal
Submitted by grigby1 on Mon, 05/20/2019 - 3:30pm
additive spread spectrum (ASS)
bit-error ratio (BER)
collaboration
composability
data hiding
decoding performance
Human behavior
Human Factors
information theoretic security
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
Watermarking
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
Bit Localization in Least Significant Bit Using Fuzzy C-Means
Submitted by grigby1 on Fri, 02/22/2019 - 3:08pm
Market research
Watermarking
steganography methods
steganography detection
Steganography
Seminars
pubcrawl
PSNR
privacy
pattern clustering
MSE
Metrics
message decryption
mean square error methods
bit localization
LSB\\_FCM
least significant bit
Image Processing
Image edge detection
Image coding
hidden message
fuzzy C-means clustering method
Fuzzy C Means
embedded message
discrete cosine transforms
Cryptography
composability
clustering
biblio
Protecting Intellectual Property of Deep Neural Networks with Watermarking
Submitted by grigby1 on Fri, 02/08/2019 - 3:17pm
Artificial Neural Networks
collaboration
cyber physical systems
Deep Neural Network
Metrics
ownership verification
policy-based governance
pubcrawl
Resiliency
Watermarking
biblio
A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication
Submitted by grigby1 on Mon, 11/19/2018 - 11:14am
image authentication
Watermarking
Scalability
Resiliency
resilience
pubcrawl
privacy
positioning data privacy
mobile computing
message authentication
location-based games
Image Processing
augmented reality
Human behavior
Games
data privacy
Cryptography
Computer hacking
computer games
Cloud Computing
cheating scenario problem
authentication
augmented reality cloud gaming
biblio
Scalable Role-Based Data Disclosure Control for the Internet of Things
Submitted by grigby1 on Wed, 05/16/2018 - 12:41pm
medical computing
Watermarking
smart health care
security
scalable role-based data disclosure control
Scalability
RFIDs
RFID
Resiliency
resilience
radio frequency identification
pubcrawl
privacy
Access Control
IoT data filtering
IoT data aggregation
Internet of Things
human factor
Human behavior
health care
Disclosure control
digital watermarking technique
data privacy
Correlation
Contextualization
Big Data
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 2:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »