Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Biomedical imaging
biblio
A Novel Laplacian of Gaussian (LoG) and Chaotic Encryption Based Image Steganography Technique
Submitted by grigby1 on Thu, 10/20/2022 - 3:22pm
encryption
Logistics
pubcrawl
Metrics
privacy
composability
Payloads
Image edge detection
Biomedical imaging
Steganography
logistic map
Image Steganography
Edge Detection Technique
Laplacian of Gaussian (LoG)
random sequence
steganography detection
biblio
A Review of Recent Trends on DNA Based Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 12:53pm
Predictive Metrics
SHA
Multi Image Encryption
Medical Image
DNA encoding
DNA cryptography
image encryption
Biomedical imaging
AES
chaos
encoding
encryption
RSA
DNA
Entropy
privacy
Logistics
Cryptography
pubcrawl
Human behavior
Resiliency
security
biblio
Medical Image Compression and Encryption using Chaos based DNA Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 12:51pm
encryption
Resiliency
Human behavior
pubcrawl
privacy
DNA
Image coding
Ciphers
Predictive Metrics
Transforms
Biomedical imaging
DNA cryptography
discrete wavelet transforms
Discrete Haar Wavelet Transform
lossless compression
medical image encryption
biblio
An Improved Method for Generating Biometric-Cryptographic System from Face Feature
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
encryption
feature extraction
pubcrawl
Metrics
Resiliency
Scalability
component
resilience
Face
Biomedical imaging
biometric encryption
Facial features
formatting
insert
style
styling
biblio
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
Submitted by aekwall on Mon, 08/24/2020 - 12:51pm
Human Factors
big data privacy
privacy-preserving medical data training
privacy-preserving deep learning computation
medical platforms
local platforms
hidden layers
geo-distributed medical Big-data platforms
distributed deep learning framework
privacy preserving
Medical Big Data
Biomedical imaging
medical information systems
Scalability
deep learning
Training
Metrics
Computational modeling
pubcrawl
Resiliency
learning (artificial intelligence)
Data models
data privacy
Big Data
Servers
biblio
Security of Medical Big Data Images using Decoy Technique
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
MRI reports
honey-pot
honeypot intrusion detection
Human Factors
Intrusion Detection
Medical Big Data
medical Big Data image security
medical image processing
Medical services
honey pots
pubcrawl
radiology
Resiliency
Scalability
security
security of data
teleradiology
X-rays
Databases
automation
Big Data
Biomedical imaging
biomedical MRI
biomedical telemetry
Cloud Computing
computerised tomography
CT scans
big data security
Decoy
decoy technique
diagnostic radiography
EHR security
electronic health records
health care
healthcare cloud
healthcare units
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 11:04am
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
"Compressive adaptive beamforming in 2D and 3D ultrafast active cavitation imaging"
Submitted by grigby1 on Tue, 02/21/2017 - 12:04pm
high-sampling rate
ultrafast active cavitation imaging
Transient analysis
Spatial resolution
spatial filter
signal-to-noise ratio
Signal to noise ratio
Signal resolution
Radio frequency
pubcrawl170104
medical image processing
2D ultrafast active cavitation imaging
high-frame rate
compressive sensing
compressive adaptive beamforming
compressed sensing
cavitation
Biomedical imaging
array signal processing
adaptive beamforming
Acoustics
3D ultrafast active cavitation imaging
biblio
"Performance of coded Joint transmit scheme aided MIMO-IDMA system for secured medical image transmission"
Submitted by grigby1 on Tue, 02/14/2017 - 12:07pm
multistream interference
MIMO
MIMO communication
mobile station
multi Stream interference (MSI) SUI channel model
multi-user detection (MUD)
multiple access interference (MAI)
multiple input multiple output (MIMO)
multiple-input multiple-output aided coded interleave division multiple access system
medical image transmission
nonlinear minimum mean square error detection algorithm
normal cell
pubcrawl170102
Stanford University Interim channel models
Streaming media
transmitting antennas
unwanted multiple users image information
Yttrium
Double space-time transmit diversity (DSTTD)
antennas
Arnold's Cat Map encryption algorithm
Biomedical imaging
carcinogenic cell
code division multiple access
coded joint transmit scheme aided MIMO-IDMA system
discrete wavelet transform
discrete wavelet transforms
antenna arrays
DWT
Europe
Interference
interleaved codes
least mean squares methods
LTE channel model
medical image processing
biblio
"Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"
Submitted by grigby1 on Tue, 02/14/2017 - 11:35am
hybrid cryptosystem
user authentication
transmission
secure image transmission
secret fragment visible mosaic image method
pubcrawl170102
PSNR
mosaic image
key generation
image security
image parameter
image lossless compression technique
image integrity
image data integrity
image compression
Image coding
authentication
human being
Fingerprint recognition
encryption purpose
encryption
data hiding encryption
data compression
data communication
Cryptography
confidential information
Compression
biometrics (access control)
biometric fingerprint
Biomedical imaging
authorisation
authentication purpose
1
2
next ›
last »