Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image encryption
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
robust scheme
Hyper-chaos
hyper-chaos systems
image encryption
image encryption scheme
image sequences
Metrics
pubcrawl
Resiliency
Histograms
secure Hash algorithm SHA-1
Security analysis
Sensitivity
SHA-1
sub-vectors confusion
two-diffusion process
XOR operation
4D hyperchaotic system
highest security level
Entropy
encryption schemes
encryption process
encryption
digital image encryption
diffusion layers
Diffusion
Cryptography
Correlation
Confusion
composability
chaotic index sequence
chaotic cryptography
chaos
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
biblio
A new hybrid encryption technique permuting text and image based on hyperchaotic system
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
HyprChaos
text encryption
Text
Software algorithms
Resiliency
pubcrawl
Niobium
Metrics
Image Processing
image encryption
image
chaos
hyperchaotic system
hybrid encryption technique
hybrid
Generators
encryption algorithms
encryption
Cryptography
composability
Ciphers
chaotic cryptography
biblio
Secured aerial photography using Homomorphic Encryption
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
image encryption
Servers
server
Scientific Computing Security
Resiliency
public key cryptosystem
public key cryptography
pubcrawl
photography
NTRU
multiagent system
Metrics
Image quality
aerial photography
image capture
Homomorphic encryption
encryption
drones
Drone
concatenation
Compositionality
Cloud Computing
cloud
Amazon EC2 cloud server
aerial photography security
biblio
"Application specific processor design for DCT based applications"
Submitted by grigby1 on Tue, 02/14/2017 - 1:10pm
FPGA
Watermarking
Transform coding
pubcrawl170102
parallel architectures
parallel architecture
one dimensional DCT
MicroBlaze softcore processer
JPEG compression
image watermarking
image encryption
IDCT hardware
Hardware
Application Specific Processor
field programmable gate arrays
field programmable gate array
Europe
discrete cosine transforms
discrete cosine transform
DCT based image watermarking
DCT based applications
Channel estimation
ASP
Application specific processors
application specific processor design
biblio
"Separation of encrypted and compressed image with auxillary information"
Submitted by grigby1 on Tue, 02/14/2017 - 12:25pm
image compression
uncompressed picture scrambling
quantized information
quantization technique
quantisation (signal)
pubcrawl170102
pressure proportion mutilation criteria
picture recreation
packed reproduced scrambled information
Magneto electrical resistivity imaging technique
information pressure
image encryption
auxiliary information
Image coding
helper data
grid computing
encrypted image separation
encoded picture compacting
encoded information
data compression
Cryptography
Compression ratio-distortion performance
compressed image separation
biblio
"A Novel Secure Arithmetic Image Coding Algorithm Based on Two-Dimensional Generalized Logistic Mapping"
Submitted by grigby1 on Tue, 02/14/2017 - 12:21pm
Image coding
two-dimensional generalized logistic mapping
security of data
secure arithmetic image coding algorithm
pubcrawl170102
multimedia data
Logistics
logistic chaotic mapping
image encryption
2D chaotic sequences
encryption
digital image
channel coding
arithmetic coding
arithmetic codes
Algorithm design and analysis
2D generalized logistic mapping
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 2:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
biblio
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
Submitted by BrandonB on Wed, 05/06/2015 - 9:14am
photon-counting imaging
Optical polarization
Optical security and encryption
optical security method
optically phase encoded QR code
phase coding
photon counting
photon counting imaging
photon-counting encryption
optical masks
photon-counting security tagging
Photonics
robust read out
smart phones
speckle
speckle signature
statistical analysis
image encryption
coherent imaging
commercial Smartphone
Cryptography
decryption
full phase double-random-phase encryption
Huffman codes
Image coding
image compressing
Adaptive optics
iterative Huffman coding
Iterative methods
masks
Nonlinear optics
object authentication
Optical filters
Optical imaging
« first
‹ previous
1
2
3
4