Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
least significant bit
biblio
Implementation of Android Based Text to Image Steganography Using 512-Bit Algorithm with LSB Technique
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
Ciphers
encryption
pubcrawl
Metrics
Data models
privacy
Cryptography
information and communication technology
composability
Data mining
Time complexity
Steganography
decryption
Image Steganography
least significant bit
steganography detection
biblio
Forensic Digital Data Tamper Detection Using Image Steganography and S-Des
Submitted by grigby1 on Thu, 10/20/2022 - 3:59pm
Ciphers
encryption
Internet of Things
pubcrawl
Metrics
privacy
composability
Task Analysis
Forensics
Steganography
Stakeholders
cryptographic
least significant bit
S-DES
steganography detection
biblio
Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
encryption
user interfaces
telecommunication security
Steganography
randomized CAPTCHA code
pubcrawl
police department
medical fields
least significant bit
intended receiver
image steganography method
image data
image colour analysis
Image coding
image
Human behavior
achieve confidentiality
detective investigation
decryption mechanism
decryption
decoding tools
data hiding technique
data encapsulation
Cryptography
confidentiality
composability
captchas
CAPTCHA codes
CAPTCHA
authorisation
authentication
authenticated user
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
Multimodal Data Security Framework Using Steganography Approaches
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
advanced encryption standard
honey pots
Steganography approaches
multimodal data security framework
multimodal
least significant bit
information hiding strategies
heuristic intrusion detection
Augmented Reality Steganography
ARSteg
encryption algorithm
Steganography
augmented reality
framework
Scalability
Human Factors
unauthorized users
pubcrawl
password
authentication
Resiliency
data encryption
security
decryption
Conferences
encryption
Cryptography
Servers
biblio
Bit Localization in Least Significant Bit Using Fuzzy C-Means
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
Market research
Watermarking
steganography methods
steganography detection
Steganography
Seminars
pubcrawl
PSNR
privacy
pattern clustering
MSE
Metrics
message decryption
mean square error methods
bit localization
LSB\\_FCM
least significant bit
Image Processing
Image edge detection
Image coding
hidden message
fuzzy C-means clustering method
Fuzzy C Means
embedded message
discrete cosine transforms
Cryptography
composability
clustering
biblio
Variance Analysis of Pixel-Value Differencing Steganography
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
Adaptive steganography
composability
Compositionality
least significant bit
Pixel-value difference
pubcrawl
theoretical cryptography
Variance analysis
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)