Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transform coding
biblio
Graph Based Transforms based on Graph Neural Networks for Predictive Transform Coding
Submitted by aekwall on Tue, 03/01/2022 - 4:28pm
DCT
Transform coding
Predictive Transform Coding
neural network
mean square error methods
Laplace equations
KLT
GBT NN
GBT L
GBT
GBST
DST
Transforms
Compression
network coding
graph neural networks
Predictive Metrics
Decoding
Artificial Neural Networks
cyber-physical systems
composability
Resiliency
pubcrawl
biblio
An ROI-Based Watermarking Technique for Image Content Recovery Robust Against JPEG
Submitted by grigby1 on Mon, 11/29/2021 - 2:49pm
Resistance
Watermarking
Transform coding
Tamper resistance
tamper localization
Steganography
Splicing
semi-fragile watermarking
Scalability
ROI
Roads
automobiles
pubcrawl
multimedia protection
Metrics
Licenses
jpeg
image recovery
Human Factors
Human behavior
cropping
biblio
Research and Development of QR Code Steganography Based on JSteg Algorithm in DCT Domain
Submitted by grigby1 on Tue, 08/31/2021 - 12:57pm
Data mining
discrete cosine transforms
Image coding
pubcrawl
QR codes
resilience
Resiliency
Resists
standards
Transform coding
Watermarking
biblio
Morphological Filter Detector for Image Forensics Applications
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
image filtering
Morphology
digital image forensics
binary image compression
binary level documents
deterministic approach
feature extractor
gray level documents
grayscale image compression
mathematical morphology
image forensic identification
image manipulations
media authentication
morphological filter detection
morphological filter detector
noise removal
nonlinear image operators
trained SVM classifier
image classification
Human behavior
Metrics
resilience
Resiliency
Scalability
Support vector machines
Kernel
feature extraction
pubcrawl
Detectors
image colour analysis
Image forensics
information forensics
Image coding
data compression
Transform coding
Gray-scale
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 1:12pm
J-UNIWARD
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
Steganography
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
computer architecture
CNN model
Compositionality
Transform coding
distortion
convolution
discrete cosine transforms
Image coding
data compression
convolutional neural nets
Training
deep learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Image Analysis and Processing in the Encrypted Domain
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
image encryption
Transform coding
theoretical cryptography
social networking (online)
signal processing in the encrypted domain
secret image sharing
research project
pubcrawl
privacy
noisy encrypted images
Noise measurement
multimedia security
composability
Image coding
Image analysis
Entropy
encryption phase
encrypted domain
data hiding
data encapsulation
data compression
Cryptography
crypto-compressed image recompression
Compositionality
biblio
Second Level Steganalysis - Embeding Location Detection Using Machine Learning
Submitted by grigby1 on Mon, 02/10/2020 - 11:43am
Cloud Computing
composability
Data mining
digital images
discrete cosine transforms
feature extraction
machine learning
Markov processes
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
Transform coding
biblio
Improvement in Homomorphic Encryption Algorithm with Elliptic Curve Cryptography and OTP Technique
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
Human Factors
OTP technique
OTP
one time password
homomorphic encryption algorithm
encryption keys
Diffie Hellman key exchange algorithm
customary outsider evaluator
fully homomorphic encryption
Homomorphic encryption
distributed computing
Cloud Computing
Transform coding
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Memory management
encryption
Servers
Scalability
« first
‹ previous
1
2
3
next ›
last »