Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
copyright
biblio
Copyright Protection for Online Text Information : Using Watermarking and Cryptography
Submitted by grigby1 on Fri, 04/09/2021 - 10:24am
Syntactics
pubcrawl
resilience
Resiliency
Scalability
security risks
Semantic
Semantics
Syntactic
policy-based governance
text analysis
text documents
visible watermarking techniques
Watermarking
web page watermarking
Web pages
Web text
web-based text
information security
composability
copyright
Cryptography
digital watermarking
HTML
Human behavior
hypertext markup language
Information Assurance
collaboration
intellectual copyright protection
internet
Internet technologies
Metrics
online content copyright protection
online information sharing
online text information
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 3:09pm
Media
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Data Security
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
Acoustic Fingerprints
Data protection
data hiding
data encapsulation
copyright
computer security
composability
colluded audio
audio signal
audio quality
audio fingerprint
audio copyright protection
audio coding
anticollusion audio fingerprinting
Anti-collusion
Acoustic signal processing
biblio
Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain
Submitted by grigby1 on Fri, 10/16/2020 - 10:10am
Human behavior
Watermarking
Transforms
singular value decomposition
Signal processing algorithms
security of data
Robustness
robust watermarking algorithm
Resiliency
resilience
pubcrawl
policy-based governance
information security measures
information security
image watermarking
Image coding
collaboration
government data processing
frequency domain
Electronic government
e-government platform
e-government document images
E-Government
DWT
document image processing
discrete wavelet transforms
discrete Wavelet transformation
digital watermarking
Cybersecurity
copyright protection
copyright
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
Intellectual Property Protection
three-dimensional printing
supply chains
supply chain management
spatially distributed
software area
safety-critical products
RFID
printing industry
licensing models
License Management
digital media
additive manufacturing
3D print supply chain
ip protection
copyright
risk management
Labeling
Three-dimensional displays
Plagiarism
Metrics
Law
composability
production engineering computing
Biological system modeling
blockchain technology
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
The Survey on Intellectual Property Based on Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 12:50pm
bitcoin
ip protection
transaction throughput
transaction anonymity
Time delay
Tamper-Resistance
resource consumption
Proof of Stake
optimization mechanisms
encryption algorith
cross-chain
copyrights
copyright
consensus mechanism
blockchain system
cryptocurrencies
optimisation
composability
Industries
internet
blockchain technology
intellectual property
optimization
Resiliency
resilience
policy-based governance
pubcrawl
Distributed databases
blockchain
biblio
Unphotogenic Light: High-Speed Projection Method to Prevent Secret Photography by Small Cameras
Submitted by grigby1 on Mon, 11/19/2018 - 11:34am
copyright
Metrics
privacy
protection
pubcrawl
resilience
Resiliency
Scalability
secret photography
security
Visible Light Communications Security
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 2:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
"An imperceptible watermarking technique for copyright content using discrete cosine transformation"
Submitted by grigby1 on Tue, 02/14/2017 - 11:55am
Government
Watermarking
pubcrawl170102
image watermarking
image retrieval
image protection scheme
image compression
Image coding
IDCT
government sector
government data processing
Computers
frequency-domain analysis
frequency domain
encryption
discrete cosine transforms
discrete cosine transformation
digital watermarking scheme
DCT
Data protection
copyright content
copyright
1
2
next ›
last »