Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Histograms
biblio
Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality
Submitted by grigby1 on Fri, 08/11/2023 - 12:55pm
hash algorithms
Rail Fence Cipher
Myszkowski
SHA-256
Rails
Hash Function
digital images
Image resolution
Multimedia systems
Ciphers
Hash functions
Histograms
Compositionality
Cryptography
Resiliency
resilience
pubcrawl
biblio
Secret Message Protection using Fuzzy Logic and Difference Expansion in Digital Images
Submitted by grigby1 on Fri, 07/28/2023 - 2:33pm
Image Processing
Steganography
security
Resiliency
resilience
pubcrawl
network security
Metrics
Measurement
Fuzzy Cryptography
Image edge detection
Histograms
Fuzzy logic
digital images
difference expansion
Data Security
data hiding
biblio
Elliptic Curve Cryptography for Medical Image Security
Submitted by grigby1 on Fri, 07/14/2023 - 2:18pm
Ciphers
pubcrawl
Metrics
resilience
Resiliency
Cipher
Scalability
Cryptography
Runtime
Measurement
probability
Elliptic curve cryptography
Histograms
simulation
elliptic curve
medical images
biblio
Dual Image Watermarking using Hessenberg decomposition and RDWT-DCT-SVD in YCbCr color space
Submitted by grigby1 on Thu, 06/22/2023 - 12:45pm
pubcrawl
Human behavior
Metrics
composability
Histograms
Image color analysis
Watermarking
Transform coding
Gaussian noise
Transforms
decomposition
speckle
Discrete Cosine Transform (DCT)
Hessenberg decomposition (HD)
Redundant discrete wavelet transform (RDWT)
YCbCr
biblio
A Chaotic Encrypted Reliable Image Watermarking Scheme based on Integer Wavelet Transform-Schur Transform and Singular Value Decomposition
Submitted by grigby1 on Thu, 06/22/2023 - 12:42pm
Robustness
decomposition
Schur decomposition
image watermarking
IWT
wavelet transforms
SVD
chaotic encryption
Watermarking
encryption
Matrix decomposition
Histograms
chaotic communication
composability
Metrics
Human behavior
pubcrawl
biblio
Principal Component Analysis and Data Encryption Model for Face Recognition System
Submitted by grigby1 on Fri, 03/31/2023 - 10:25am
KLT
XOR encryption
visualization
viola jones
Resiliency
resilience
real-time systems
PCA
Metrics
biometric encryption
Histograms
face recognition
encryption
Databases
Correlation
biometric
pubcrawl
biblio
Cancelable Retinal Biometric method based on maximum bin computation and histogram bin encryption using modified Hill cipher
Submitted by grigby1 on Fri, 03/31/2023 - 10:25am
biometric encryption
pubcrawl
authentication
biometrics (access control)
Cancelable biometric
Ciphers
codes
Databases
Hill Cipher
Histograms
invertible
Metrics
non-invertible
privacy
resilience
Resiliency
biblio
A language processing-free unified spam detection framework using byte histograms and deep learning
Submitted by grigby1 on Fri, 02/17/2023 - 4:37pm
Filtering
Metrics
Human behavior
pubcrawl
Neural networks
feature extraction
deep learning
byte histograms
spam detection
convolutional neural networks
convolutional neural network
Histograms
Artificial Intelligence
Scalability
biblio
Multiple layered Security using combination of Cryptography with Rotational, Flipping Steganography and Message Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 3:58pm
HMAC
Rotational LSB Steganography
Histogram Comparative Analysis
Flipping LSB Steganography
steganography detection
codes
data science
Steganography
Image coding
encryption
Histograms
encoding
composability
Cryptography
privacy
AES
Metrics
pubcrawl
biblio
Reference-free Detection of LSB Steganography Using Histogram Analysis
Submitted by grigby1 on Thu, 10/20/2022 - 3:23pm
feature extraction
pubcrawl
Metrics
Correlation
privacy
Cryptography
composability
Classification algorithms
Histograms
Image coding
Steganography
Communications technology
LSB steganography
steganalysis
image tampering
steganography detection
1
2
3
4
5
6
next ›
last »