Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret messages
biblio
A secure steganography algorithm using compressive sensing based on HVS feature
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
secure steganography algorithm
Metrics
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
Robustness
Scalability
Science of Security
secret messages
Image coding
security
Sparse matrices
steganographic technology
Steganography
stego image
stego object
Subsampling
Visual systems
data encapsulation
Bit Correction Rate
carrier object
collaboration
composability
compressed sensing
compressive sensing
compressive sensing technology
Cryptography
BCR
Data mining
digital image
discrete cosine transforms
Human behavior
Human Factors
human visual system features
HVS
HVS feature
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Asymmetrical quantum encryption protocol based on quantum search algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
quantum cryptography
unitary operations
trapdoor one-way functions
symmetrical quantum key distribution
single photon measurement
secret messages
search quantum algorithm
search problems
quantum search algorithms
quantum search algorithm
Quantum mechanics
quantum information science
asymmetrical encryption
private-information
no-cloning theorem
key-generation randomized logarithm
information-theoretical security
Elliptic curve cryptography
Cryptography
Cryptographic Protocols
Ciphertext
Ciphers
asymmetrical quantum encryption protocol