Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
QR codes
biblio
Design of an efficient image protection method based on QR code
Submitted by grigby1 on Tue, 08/31/2021 - 12:56pm
encryption
generator
Generators
image protection
image recognition
object detection
privacy
Prototypes
pubcrawl
QR code
QR codes
recognizer
resilience
Resiliency
secure image
security
biblio
Design of Intelligent Access Control System Based on DES Encrypted QR Code
Submitted by grigby1 on Tue, 08/31/2021 - 12:51pm
Access Control
authentication
DES
encryption
intelligent access control system
intelligent mobile phone
pubcrawl
QR code
QR codes
resilience
Resiliency
Servers
smart phones
biblio
Malicious Qr-Code Threats and Vulnerability of Blockchain
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
information security
XML
security
Scalability
Resiliency
resilience
QR-code attack
QR-Code
pubcrawl
Payloads
QR codes
Human behavior
Generators
fuzzing
Cyber-security
cross-site scripting
Cross Site Scripting
command injection attacks
blockchain
bitcoin
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
Singular Value Decomposition (SVD) based Image Tamper Detection Scheme
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
SVD
singular values
S-matrix theory
S matrix
quick response code feature extraction
quick response code
QR codes
QR code
image tamper detection scheme
image authentication techniques
image authentication
digital imaging
Cryptography
coding theory
singular value decomposition
Image coding
source coding
feature extraction
Compositionality
security
Resiliency
resilience
Metrics
pubcrawl
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Image steganography using texture features and GANs
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
complex texture regions
varisized images
truncated layer
texture-based loss
texture features
texture feature
stego images
stego image distortions
natural images
invisible perturbations
Image Steganography
hidden writing
encoder-decoder framework
cover images
convolutional network
feature extraction
Adversarial training
adversarial discriminator
Steganography
secret information
mean squared error
image texture
deep neural networks
QR codes
QR code
cyber physical systems
Cryptography
pubcrawl
Resiliency
biblio
A Multiple Layer Security Scheme Utilizing Information Matrices
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
secret data
word length 256 bit
secret message
multiple layer security scheme
least significant bit embedding
information matrix
information matrices
double-layer message security scheme
Steganography
Cryptography
AES algorithm
QR codes
cyber physical systems
matrix algebra
pubcrawl
Resiliency
telecommunication security
biblio
Implementation QR Code Biometric Authentication for Online Payment
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
debit card
transaction sample
transaction process
transaction permits
simple transaction payment
QR code scan
online payment
online merchant
low-cost infrastructure
implementation biometric cloud authentication platform
face verification transaction
face biometric encryption
decryption transaction permission
Cryptography
Code Scan QR
biometric
bank implementation QR code biometric authentication payment online
transaction processing
QR codes
QR code
electronic money
cloud server
cyber physical systems
pubcrawl
Resiliency
mobile computing
« first
‹ previous
1
2
3
4
5
6
next ›
last »