Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DWT
biblio
Achieving Privacy and Security Using QR-Code through Homomorphic Encryption and Steganography
Submitted by aekwall on Thu, 07/14/2022 - 3:17pm
Homomorphic encryption
NTRU
DWT
QR codes
QR code
education
Focusing
Market research
cyber-physical systems
Cryptography
privacy
Resiliency
pubcrawl
Steganography
Online banking
data privacy
information security
security
biblio
Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain
Submitted by grigby1 on Fri, 10/16/2020 - 10:10am
Human behavior
Watermarking
Transforms
singular value decomposition
Signal processing algorithms
security of data
Robustness
robust watermarking algorithm
Resiliency
resilience
pubcrawl
policy-based governance
information security measures
information security
image watermarking
Image coding
collaboration
government data processing
frequency domain
Electronic government
e-government platform
e-government document images
E-Government
DWT
document image processing
discrete wavelet transforms
discrete Wavelet transformation
digital watermarking
Cybersecurity
copyright protection
copyright
biblio
Removal of Powerline Interference from ECG Signal using FIR, IIR, DWT and NLMS Adaptive Filter
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
ECG signal denoising
adaptive filtering
powerline interference removal
Power line Interference (PLI)
Normalized Least Mean Square filter
Normalized Least Mean Square Adaptive Filter(NLMS)
NLMS adaptive filter
Infinite Impulse Response(IIR)
infinite impulse response filter
IIR filters
IIR filter
FIR filters
FIR filter
Finite Impulse Response(FIR)
finite impulse response filter
Electrocardiogram (ECG)
Scalability
DWT
discrete wavelet transforms
Discrete Wavelet Transform (DWT)
discrete wavelet transform
adaptive filters
Electrocardiography
medical signal processing
interference (signal)
least mean squares methods
Finite impulse response filters
signal denoising
filtering algorithms
Metrics
pubcrawl
Resiliency
biblio
Probing Image and Video Steganography Based On Discrete Wavelet and Discrete Cosine Transform
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
least significant bit method
visualization
video steganography
steganography detection
Steganography
secured communication
pubcrawl
privacy
object tracking
object detection
multiple object tracking algorithmic programs
Multiple Object Tracking
motion object detection
Metrics
message embedding
LSB
composability
Kalman filters
Image Steganography
image motion analysis
file transformation
error correcting codes
Embedding potency
embedding payload
DWT
discrete wavelet transforms
discrete wavelet transform
discrete cosine transforms
discrete cosine transform
DCT
data encapsulation
Conferences
biblio
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
pubcrawl
Learning systems
local-outlier factor
LOF
machine learning algorithms
Metrics
OddBall
pagerank
Peer-to-peer computing
policy-based governance
Insider Threats
relationship graphs
Resiliency
security of data
Time series analysis
two-stage machine learning system
Unsupervised Learning
wavelet analysis
wavelet coefficients
graph theory
cloud file-sharing
cloud file-sharing services
collaboration
Company Data
company IP
discrete wavelet transform
discrete wavelet transforms
DWT
Cloud Computing
graph-based unsupervised learning
graph-based unsupervised machine learning methods
Haar transforms
Haar wavelet
Haar wavelet function
Human behavior
Human Factors
Insider Threat Detection
biblio
Performance analysis of various wavelet thresholding techniques for despeckiling of sonar images
Submitted by grigby1 on Wed, 03/08/2017 - 1:03pm
image statistic
wavelet thresholding technique
Vishnu shrink
speckle noise
speckle
sonar image despeckling
Sonar image
Quality metrics
pubcrawl170111
Performance analysis
noise reduction
Noise
Neigh shrink
Bayes shrink
image segmentation
Image quality
Image Processing
Image edge detection
image denoising
Entropy
DWT Thresholding techniques
DWT
discrete wavelet transforms
discrete wavelet transform
denoising
biblio
"Performance of coded Joint transmit scheme aided MIMO-IDMA system for secured medical image transmission"
Submitted by grigby1 on Tue, 02/14/2017 - 12:07pm
multistream interference
MIMO
MIMO communication
mobile station
multi Stream interference (MSI) SUI channel model
multi-user detection (MUD)
multiple access interference (MAI)
multiple input multiple output (MIMO)
multiple-input multiple-output aided coded interleave division multiple access system
medical image transmission
nonlinear minimum mean square error detection algorithm
normal cell
pubcrawl170102
Stanford University Interim channel models
Streaming media
transmitting antennas
unwanted multiple users image information
Yttrium
Double space-time transmit diversity (DSTTD)
antennas
Arnold's Cat Map encryption algorithm
Biomedical imaging
carcinogenic cell
code division multiple access
coded joint transmit scheme aided MIMO-IDMA system
discrete wavelet transform
discrete wavelet transforms
antenna arrays
DWT
Europe
Interference
interleaved codes
least mean squares methods
LTE channel model
medical image processing
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 1:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
biblio
"Improved serial 2D-DWT processor for advanced encryption standard"
Submitted by grigby1 on Mon, 02/13/2017 - 12:08pm
Hardware
size 65 nm
serialized DT processor
serial 2D-DWT processor
secured image processing
RTL-GDSII
Quantization (signal)
pubcrawl170102
low power ASIC
lifting scheme algorithm
image data security
Image coding
high speed encryption
advanced encryption standard
frequency 333 MHz
encryption
DWT
discrete wavelet transforms
discrete wavelet transform
data compression
Cryptography
compression ratio
CMOS technology
ASIC circuit design
application specific integrated circuits
AES
biblio
"Secure communication using TPC and chaotic encryption"
Submitted by grigby1 on Fri, 02/10/2017 - 2:03pm
encryption
wireless communication system
turbo product code
turbo codes
TPC
secure communication
radio networks
pubcrawl170102
Product codes
logistic map
BER
encoding
DWT
Decoding
Cryptography
chaotic encryption
chaos
channel encoding techniques
channel encoding
Bit error rate