Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image authentication
biblio
Visual Authentication Scheme Based on Reversible Degradation and QR Code
Submitted by grigby1 on Tue, 08/31/2021 - 12:57pm
2D Barcode
authentication
Cryptography
Decoding
Degradation
image authentication
Meaningless Reversible Degradation
pubcrawl
QR codes
Redundancy
Reed-Solomon codes
resilience
Resiliency
Visual Authentication
visualization
biblio
Singular Value Decomposition (SVD) based Image Tamper Detection Scheme
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
SVD
singular values
S-matrix theory
S matrix
quick response code feature extraction
quick response code
QR codes
QR code
image tamper detection scheme
image authentication techniques
image authentication
digital imaging
Cryptography
coding theory
singular value decomposition
Image coding
source coding
feature extraction
Compositionality
security
Resiliency
resilience
Metrics
pubcrawl
biblio
A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
image authentication
Watermarking
Scalability
Resiliency
resilience
pubcrawl
privacy
positioning data privacy
mobile computing
message authentication
location-based games
Image Processing
augmented reality
Human behavior
Games
data privacy
Cryptography
Computer hacking
computer games
Cloud Computing
cheating scenario problem
authentication
augmented reality cloud gaming
biblio
A Robust Associative Watermarking Technique Based on Frequent Pattern Mining and Texture Analysis
Submitted by grigby1 on Mon, 05/22/2017 - 1:43pm
composability
confinement
digital watermarking
frequent pattern mining
Human behavior
image authentication
image mining
pubcrawl
Resiliency
Robustness
biblio
Efficient and robust perceptual hashing using log-polar image representation
Submitted by BrandonB on Wed, 05/06/2015 - 12:02pm
key dependent noninvertible transform
Watermarking
Vectors
Transforms
Robustness
robust perceptual hashing
robust image hashing
registration technique
perceptual hashing
multimedia security
log-polar transformation
Log-Polar transform feature
log polar image representation
content authentication
image recognition technique
Image Processing
image indexing
Image coding
image authentication
Hamming distance
Fourier-Mellin transforms
Fourier transforms
feature extraction
database search
Cryptography