Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data hiding
biblio
Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error
Submitted by grigby1 on Mon, 07/31/2023 - 12:27pm
secret sharing
Fuzzy Cryptography
Image quality
PSNR
data hiding
Satellites
Data protection
Steganography
Fuzzy logic
pubcrawl
network infrastructure
Image edge detection
information security
Communication networks
Scalability
Resiliency
resilience
Metrics
biblio
Secret Message Protection using Fuzzy Logic and Difference Expansion in Digital Images
Submitted by grigby1 on Fri, 07/28/2023 - 2:33pm
Image Processing
Steganography
security
Resiliency
resilience
pubcrawl
network security
Metrics
Measurement
Fuzzy Cryptography
Image edge detection
Histograms
Fuzzy logic
digital images
difference expansion
Data Security
data hiding
biblio
Eliminating Broadband Covert Channels in DSA-Like Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 2:13pm
data hiding
subliminal channel
Steganography
Scalability
Resiliency
resilience
Redundancy
Public key
pubcrawl
DSA
digital signatures
data communication
covert channels
covert channel
control systems
Compositionality
composability
channel capacity
Broadband communication
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
File Encryption and Decryption Using DNA Technology
Submitted by aekwall on Mon, 02/08/2021 - 12:50pm
deoxyribo nucleic acid sequence
arbitrary keys generation
authorized persons
binary-coded form
common key
cryptographic process
data forwarding
data hijacking
data transmutation
appropriate form
DNA technology
file decryption
file encryption
intermediate steps
original texted message
unknown form
users data security
Cryptography
DNA sequence
DNA cryptography
decryption
encoding
data hiding
Predictive Metrics
public key cryptography
DNA
privacy
pubcrawl
Human behavior
Resiliency
Receivers
Conferences
encryption
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 3:09pm
Media
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Data Security
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
Acoustic Fingerprints
Data protection
data hiding
data encapsulation
copyright
computer security
composability
colluded audio
audio signal
audio quality
audio fingerprint
audio copyright protection
audio coding
anticollusion audio fingerprinting
Anti-collusion
Acoustic signal processing
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Perceptually Transparent Robust Audio Watermarking Algorithm Using Multi Resolution Decomposition Cordic QR Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 3:54pm
information security
Watermarking
Signal to noise ratio
Signal resolution
Signal processing algorithms
Robustness
robust audio watermarking algorithm
pubcrawl
perceptual transparency
Payloads
multiresolution decomposition
Multi Resolution Decomposition
Metrics
audio coding
embedded watermark
digital watermarking
decomposition
data hiding
cyber physical systems
cordic QR decomposition
Compositionality
binary data embedding capacity
AWGN
audio watermarking
audio signal processing attacks
biblio
A Coverless Approach to Data Hiding Using DNA Sequences
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image sequences
stegoimaging
steganalysis algorithms
image steganography techniques
high embedding capacity
DNA Steganography
DNA sequences
deoxyribonucleic acid sequences
cracking probability
coverless approach
coverless
DNA cryptography
security
Steganography
data hiding
Predictive Metrics
DNA
privacy
data encapsulation
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Image Analysis and Processing in the Encrypted Domain
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
image encryption
Transform coding
theoretical cryptography
social networking (online)
signal processing in the encrypted domain
secret image sharing
research project
pubcrawl
privacy
noisy encrypted images
Noise measurement
multimedia security
composability
Image coding
Image analysis
Entropy
encryption phase
encrypted domain
data hiding
data encapsulation
data compression
Cryptography
crypto-compressed image recompression
Compositionality
1
2
next ›
last »