Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data encapsulation
biblio
Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication
Submitted by grigby1 on Thu, 03/18/2021 - 1:36pm
encryption
user interfaces
telecommunication security
Steganography
randomized CAPTCHA code
pubcrawl
police department
medical fields
least significant bit
intended receiver
image steganography method
image data
image colour analysis
Image coding
image
Human behavior
achieve confidentiality
detective investigation
decryption mechanism
decryption
decoding tools
data hiding technique
data encapsulation
Cryptography
confidentiality
composability
captchas
CAPTCHA codes
CAPTCHA
authorisation
authentication
authenticated user
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 3:09pm
Media
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Data Security
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
Acoustic Fingerprints
Data protection
data hiding
data encapsulation
copyright
computer security
composability
colluded audio
audio signal
audio quality
audio fingerprint
audio copyright protection
audio coding
anticollusion audio fingerprinting
Anti-collusion
Acoustic signal processing
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
A Coverless Approach to Data Hiding Using DNA Sequences
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image sequences
stegoimaging
steganalysis algorithms
image steganography techniques
high embedding capacity
DNA Steganography
DNA sequences
deoxyribonucleic acid sequences
cracking probability
coverless approach
coverless
DNA cryptography
security
Steganography
data hiding
Predictive Metrics
DNA
privacy
data encapsulation
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
Dynamic searchable encryption
resilience
Resiliency
composability
pubcrawl
Trusted Computing
text analysis
search problems
search pattern hiding
link-list structures
keyword searching
encrypted critical data
dynamic searchable symmetric encryption
Cryptography
DSSE systems
data encapsulation
blind storage
searchable encryption
untrusted cloud server
privacy
storage management
Servers
Indexes
Cloud Computing
encryption
biblio
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors
Submitted by aekwall on Mon, 03/09/2020 - 10:17am
MV domain
distortion-minimization framework
embedding capacity
embedding domains
image motion analysis
MDE strategies
motion estimation
motion vectors
multidomain embedding strategies
discrete cosine transforms
partition modes
potential security risks
sequential embedding
Steganography
video steganography
Video-steganography
Security Risk Estimation
minimisation
security
Resiliency
pubcrawl
Metrics
data encapsulation
video signal processing
distortion
Human Factors
Scalability
encoding
Quantization (signal)
Binary codes
-motion-vector
-multi-domain-embedding
-partition-mode
digital video
1
2
3
next ›
last »