Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multimedia security
biblio
An Adaptive Robust Semi-blind Watermarking in Transform Domain Using Canny Edge Detection Technique
Submitted by grigby1 on Thu, 05/05/2022 - 4:31pm
Telecommunications
edge detection
peak signal to noise ratio
multimedia security
canny edge detector
PSNR
digital watermarking
Transforms
singular value decomposition
Watermarking
tools
Image edge detection
Metrics
composability
Scalability
Resiliency
resilience
pubcrawl
security
signal processing
biblio
Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
Image Processing
pixel blocks
noisy encrypted image
multimedia security
local Shannon entropy measurement
local entropy
Image reconstruction
image content confidentiality
block-size
blind error localization
forward error correction
Europe
Cryptography
image encryption
Noise measurement
image denoising
statistical analysis
Entropy
Metrics
composability
pubcrawl
Resiliency
encryption
biblio
Image Analysis and Processing in the Encrypted Domain
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
image encryption
Transform coding
theoretical cryptography
social networking (online)
signal processing in the encrypted domain
secret image sharing
research project
pubcrawl
privacy
noisy encrypted images
Noise measurement
multimedia security
composability
Image coding
Image analysis
Entropy
encryption phase
encrypted domain
data hiding
data encapsulation
data compression
Cryptography
crypto-compressed image recompression
Compositionality
biblio
Efficient and robust perceptual hashing using log-polar image representation
Submitted by BrandonB on Wed, 05/06/2015 - 12:02pm
key dependent noninvertible transform
Watermarking
Vectors
Transforms
Robustness
robust perceptual hashing
robust image hashing
registration technique
perceptual hashing
multimedia security
log-polar transformation
Log-Polar transform feature
log polar image representation
content authentication
image recognition technique
Image Processing
image indexing
Image coding
image authentication
Hamming distance
Fourier-Mellin transforms
Fourier transforms
feature extraction
database search
Cryptography