Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multimedia computing
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 4:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
noise-like signals
linear combinations
malicious multiple access channels
Mathematical model
multi-access systems
Multimedia communication
multimedia computing
multimedia fingerprinting code
multiple access channel
network coding
Information systems
privacy
pubcrawl
Receivers
resilience
security
security of data
Watermarking
zero-error probability
broadcast channels
Metrics
Resiliency
composability
A-channel
adders
adversarial multiple access channels
arbitrary coefficients
binary adder channel
Binary codes
channel coding
collusion attack
compressed sensing
Conferences
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
encoding
error statistics
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 3:09pm
Media
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Data Security
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
Acoustic Fingerprints
Data protection
data hiding
data encapsulation
copyright
computer security
composability
colluded audio
audio signal
audio quality
audio fingerprint
audio copyright protection
audio coding
anticollusion audio fingerprinting
Anti-collusion
Acoustic signal processing
biblio
Info-Retrieval with Relevance Feedback using Hybrid Learning Scheme for RS Image
Submitted by grigby1 on Fri, 12/11/2020 - 2:01pm
Resiliency
multimedia computing
multimedia information retrieval
multitarget retrieval
pubcrawl
relevance feedback
remote sensing
remote sensing image
resilience
Metadata Discovery Problem
RS image
Scalability
Support vector machines
supported vector machine
symbolic image database
Training
visual databases
image metadata
Compositionality
content-based image retrieval
content-based retrieval
exception maximization algorithm
geophysical image processing
Hybrid Learning
hybrid learning scheme parameter
image library
CBIR
image retrieval
image segmentation
info-retrieval
interactive query
learning (artificial intelligence)
Learning systems
Libraries
biblio
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
MPEG-DASH standard
Videos
video streaming
vehicular ad hoc networks
vehicle monitoring system
Streaming media
Servers
Resiliency
resilience
real-time vehicle monitoring system
real-time systems
real-time processing
pubcrawl
multimedia data storage
multimedia computing
Big Data
MPD files
Monitoring
Metrics
Media
Logistics
Internet of Vehicles
Internet of Vehicle
Internet of Things
Human Factors
hidden trouble
DASH
content delivery network
CDN
Big Data curation
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:40am
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
Beyond Pixels: Image Provenance Analysis Leveraging Metadata
Submitted by aekwall on Mon, 03/30/2020 - 10:34am
meta data
provenance graph construction
Phylogeny
Painting
online multimedia
noncontent-based information
metadata-based inferences
image provenance analysis
cultural analytics
automated provenance analysis
Provenance
inference mechanisms
Semantics
visualization
Task Analysis
digital image forensics
Image forensics
multimedia computing
video signal processing
metadata
internet
Metrics
Image edge detection
graph theory
composability
pubcrawl
Human behavior
Resiliency
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 8:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
A Text-Based CAPTCHA Cracking System with Generative Adversarial Networks
Submitted by aekwall on Mon, 04/01/2019 - 9:07am
cDCGAN
text-based CAPTCHA cracking system
text-based CAPTCHA
small sample problem
Pearson correlation coefficients
Multimedia systems
multimedia security mechanism
multimedia computing
generative adversarial networks
Fans
conditional deep convolutional generative adversarial networks
Completely Automated Public Turing Test to Tell Computers and Humans Apart
security of data
CAPTCHA
captchas
convolutional neural networks
computer security
convolutional neural nets
CNN
text analysis
Training
composability
pubcrawl
Human behavior
1
2
next ›
last »