Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Watermarking
biblio
Multilevel security feature for online transaction using QR code digital watermarking
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Aerospace electronics
authentication
Cryptography
cyber physical systems
Digital Watermark
Internet banking
Online banking
pubcrawl
QR Code(Quick Response Code)
QR codes
Resiliency
Watermarking
biblio
Fingerprinting non-numeric datasets using row association and pattern generation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Pattern generation and row association schemes
internet
Metrics
Non-numeric datasets
nonnumeric digital data
original pattern
Outsourced Database Integrity
Ownership protection
ownership rights
pattern generation
Fingers
primary key
pubcrawl
relational data
relational databases
Resiliency
row association schemes
RSA encryption
Secret key
Watermarking
fake rows
business purposes
composability
Cryptography
data analysis
Decoding
digital rights protection
encryption
fake attributes
fake pattern
application environment
fast internet
Fibonacci series
fingerprint detection algorithm
fingerprint identification
Fingerprint recognition
fingerprint sequence
Fingerprinting
fingerprinting nonnumeric datasets
biblio
Accountability in cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human Factors
Watermarking
security of data
Science of Security
Scalability
Robustness
responsibility-assignment
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Kullback-Liebler divergence
Attack detection
Human behavior
cyber-physical systems
cyber-physical system
CPS accountability
corrective measures
control systems
Conferences
composability
collaboration
causal information flow analysis
Casting
biblio
A novel approximate computing based security primitive for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT devices
Watermarking
ultra-low power design requirement
Three-dimensional displays
telecommunication security
telecommunication power management
security primitive
Resiliency
pubcrawl
Metrics
Lightweight Encryption
IoT security
approximate computing
Internet of Things
Internet infrastructure
information hiding approach
Human Factors
Human behavior
hardware security vulnerabilities
Fingerprinting
digital watermarking
device authentication
Cryptography
composability
biblio
Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique
Submitted by grigby1 on Fri, 09/15/2017 - 10:58am
BER
BFO
compression ratio
Entropy
execution time
GA
HBO
honey pots
Human behavior
MSE
PSNR
pubcrawl
Resiliency
Scalability
Watermarking
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
"Application specific processor design for DCT based applications"
Submitted by grigby1 on Tue, 02/14/2017 - 1:10pm
FPGA
Watermarking
Transform coding
pubcrawl170102
parallel architectures
parallel architecture
one dimensional DCT
MicroBlaze softcore processer
JPEG compression
image watermarking
image encryption
IDCT hardware
Hardware
Application Specific Processor
field programmable gate arrays
field programmable gate array
Europe
discrete cosine transforms
discrete cosine transform
DCT based image watermarking
DCT based applications
Channel estimation
ASP
Application specific processors
application specific processor design
biblio
"An imperceptible watermarking technique for copyright content using discrete cosine transformation"
Submitted by grigby1 on Tue, 02/14/2017 - 12:55pm
Government
Watermarking
pubcrawl170102
image watermarking
image retrieval
image protection scheme
image compression
Image coding
IDCT
government sector
government data processing
Computers
frequency-domain analysis
frequency domain
encryption
discrete cosine transforms
discrete cosine transformation
digital watermarking scheme
DCT
Data protection
copyright content
copyright
biblio
Efficient and robust perceptual hashing using log-polar image representation
Submitted by BrandonB on Wed, 05/06/2015 - 12:02pm
key dependent noninvertible transform
Watermarking
Vectors
Transforms
Robustness
robust perceptual hashing
robust image hashing
registration technique
perceptual hashing
multimedia security
log-polar transformation
Log-Polar transform feature
log polar image representation
content authentication
image recognition technique
Image Processing
image indexing
Image coding
image authentication
Hamming distance
Fourier-Mellin transforms
Fourier transforms
feature extraction
database search
Cryptography
biblio
Genetic Hash Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 11:47am
genetic hash algorithm
Watermarking
visualization
trees (mathematics)
security
search optimization technique
image watermarking
hash visualization
Hash functions
Genetics
authentication
genetic algorithms
Fitness value
Data visualization
data hiding
data encapsulation
Cryptography
complex random generated images
Chromosome
Biological cells
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »