Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
LSB
biblio
Cryptography using Affine Hill Cipher Combining with Hybrid Edge Detection (Canny-LoG) and LSB for Data Hiding
Submitted by grigby1 on Fri, 02/03/2023 - 3:58pm
Image edge detection
steganography detection
Steganography
Receivers
pubcrawl
PSNR
privacy
Metrics
LSB
edge detection
Embbedding
Detectors
Cry[ptography
Conferences
composability
Ciphers
security
biblio
An image steganography approach based on k-least significant bits (k-LSB)
Submitted by grigby1 on Thu, 10/20/2022 - 3:24pm
Steganography
steganography detection
k-LSB
Image Steganography
Entropy filter
Image quality
LSB
digital images
Image resolution
pubcrawl
Image coding
Watermarking
Decoding
composability
Entropy
privacy
Metrics
biblio
Algorithmic method of security of the Internet of Things based on steganographic coding
Submitted by aekwall on Fri, 09/30/2022 - 1:45pm
mechatronics
stego image
RGB
PSNR
LSB
Histogram
grayscale metod
Color
Steganography
Gray-scale
information security
IoT security
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Conferences
IoT
biblio
Analysis of Image Steganography Techniques for Different Image Format
Submitted by grigby1 on Fri, 04/01/2022 - 12:17pm
information management
steg analysis
Image Steganography
bit substitution
Secure File Sharing
LSB
MSB
Bars
distortion
security
Metrics
Payloads
composability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Submitted by grigby1 on Tue, 03/09/2021 - 2:02pm
pubcrawl
IoTs-Cloud
key agreement
local binary pattern
LSB
message authentication
Metrics
one-time bio-key
one-time message-image document code
one-time random pixel sequence
IoT-cloud
Receivers
resilience
Resiliency
robust message anonymity
Scalability
security
Security analysis
smart devices
Watermarking
document image processing
Bio- MAC
bio-authentication scheme
bio-key management
biometrics (access control)
BIOS
Cloud Computing
Cryptography
data integrity
disappearing authentication code
authentication
documents protection
E2E S2S
feature extraction
handwritten character recognition
handwritten feature extraction
Handwritten Signature
HMAC-SHA-256
Human behavior
Internet of Things
biblio
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
LSB algorithm
trees (mathematics)
stego image
steganography techniques
steganography algorithm
Steganography
sharp edges
security
Scalability
Resiliency
pubcrawl
PSNR
MPC algorithm
MPC
Metrics
composability
LSB
internet
Image coding
full tree
edge detection scheme
edge detection
edge blocks
digital images
data embedding process
data concealment
cover image
corner pixels
confidential data
biblio
Probing Image and Video Steganography Based On Discrete Wavelet and Discrete Cosine Transform
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
least significant bit method
visualization
video steganography
steganography detection
Steganography
secured communication
pubcrawl
privacy
object tracking
object detection
multiple object tracking algorithmic programs
Multiple Object Tracking
motion object detection
Metrics
message embedding
LSB
composability
Kalman filters
Image Steganography
image motion analysis
file transformation
error correcting codes
Embedding potency
embedding payload
DWT
discrete wavelet transforms
discrete wavelet transform
discrete cosine transforms
discrete cosine transform
DCT
data encapsulation
Conferences
biblio
Edge Based Image Steganography: Problems and Solution
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Image edge detection
steganography schemes
steganography detection
Steganography
secrete messages bits
secrete message
Receivers
pubcrawl
privacy
Payloads
Metrics
LSB
Indexes
Color
image colour analysis
Image color analysis
Image coding
embedding scheme
edges positions
edge based image steganography
edge
Detectors
data encapsulation
composability
color images
Color image
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 11:36am
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)