Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image Steganography
biblio
An image steganography approach based on k-least significant bits (k-LSB)
Submitted by grigby1 on Thu, 10/20/2022 - 4:24pm
Steganography
steganography detection
k-LSB
Image Steganography
Entropy filter
Image quality
LSB
digital images
Image resolution
pubcrawl
Image coding
Watermarking
Decoding
composability
Entropy
privacy
Metrics
biblio
A Novel Laplacian of Gaussian (LoG) and Chaotic Encryption Based Image Steganography Technique
Submitted by grigby1 on Thu, 10/20/2022 - 4:22pm
encryption
Logistics
pubcrawl
Metrics
privacy
composability
Payloads
Image edge detection
Biomedical imaging
Steganography
logistic map
Image Steganography
Edge Detection Technique
Laplacian of Gaussian (LoG)
random sequence
steganography detection
biblio
Enhanced Image Steganography with PVD and Edge Detection
Submitted by grigby1 on Thu, 10/20/2022 - 4:22pm
security
pubcrawl
Metrics
privacy
composability
Robustness
Image edge detection
Image coding
Steganography
Canny edge detection
Image quality
Image Steganography
PVD
steganography detection
biblio
Implementation of Android Based Text to Image Steganography Using 512-Bit Algorithm with LSB Technique
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
Ciphers
encryption
pubcrawl
Metrics
Data models
privacy
Cryptography
information and communication technology
composability
Data mining
Time complexity
Steganography
decryption
Image Steganography
least significant bit
steganography detection
biblio
Analysis of Image Steganography Techniques for Different Image Format
Submitted by grigby1 on Fri, 04/01/2022 - 1:17pm
information management
steg analysis
Image Steganography
bit substitution
Secure File Sharing
LSB
MSB
Bars
distortion
security
Metrics
Payloads
composability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Video Steganography using Curvelet Transform and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
Metrics
video steganography
Transforms
stego video
stego key encryption
Stego Key
Steganography
security
secure video steganography
secret data transmission
Scalability
Resiliency
public key cryptography
pubcrawl
carrier video file
Mathematical model
Image Steganography
Image coding
fast discrete curvelet transform
encryption
elliptic curve integrated encryption scheme
Elliptic curve cryptography
discrete wavelet transforms
curvelet transforms
Cryptography
cover video
color video
biblio
Improved CRT Image Steganography based on Edge Areas and Spread Embedding
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
PN Sequence
watermarking method
steganography research
Steganography
steganographic images
spread spectrum embedding
Spread Spectrum
spatial domain methods
security
Scalability
safe image steganography method
Resiliency
pubcrawl
composability
Metrics
image watermarking
Image Steganography
good imperceptibility quality
embedded payload
edge detection
data hiding method watermarking
Cryptography
CRT-based steganography
CRT method
CRT image steganography
CRT
biblio
Image steganography using texture features and GANs
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
complex texture regions
varisized images
truncated layer
texture-based loss
texture features
texture feature
stego images
stego image distortions
natural images
invisible perturbations
Image Steganography
hidden writing
encoder-decoder framework
cover images
convolutional network
feature extraction
Adversarial training
adversarial discriminator
Steganography
secret information
mean squared error
image texture
deep neural networks
QR codes
QR code
cyber physical systems
Cryptography
pubcrawl
Resiliency
biblio
Image Steganography Based on Hybrid Edge Detector to Hide Encrypted Image Using Vernam Algorithm
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
LSB method
word length 64800.0 bit
word length 3.0 bit
word length 2.0 bit
Vernam cipher algorithm
Vernam algorithm
steganography detection
Steganography
shift registers
secret image bits
pubcrawl
pseudorandom key
privacy
NonLinear Feedback Shift Register
multimedia technology
Metrics
and edge detector
least significant bit steganography
internet technology
information security
Image Steganography
Hybrid Sobel edge detector
hybrid Kirch edge detector
hiding image
Geffe generator
encrypted image
edge pixel
edge detection
data encapsulation
Cryptography
composability
baboon cover image
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
1
2
next ›
last »