Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
steganography detection
biblio
Enhanced Image Steganography with PVD and Edge Detection
Submitted by grigby1 on Thu, 10/20/2022 - 3:22pm
security
pubcrawl
Metrics
privacy
composability
Robustness
Image edge detection
Image coding
Steganography
Canny edge detection
Image quality
Image Steganography
PVD
steganography detection
biblio
Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
feature extraction
pubcrawl
Metrics
Conferences
privacy
composability
malware
network security
Steganography
frequency-domain analysis
codes
steganography detection
biblio
Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Cryptography
information security
pubcrawl
Metrics
privacy
composability
chaotic communication
Three-dimensional displays
Noise measurement
Steganography
PSNR
measurement uncertainty
chaotic function
corner detection
steganography detection
biblio
Coverless Steganography Method based on the Source XML File Organization of OOXML Documents
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Organizations
pubcrawl
Metrics
Heuristic algorithms
privacy
composability
real-time systems
Receivers
Resistance
organization
Steganography
XML
compound tree
OOXML documents
search-based coverless steganography algorithms
steganography detection
biblio
Implementation of Android Based Text to Image Steganography Using 512-Bit Algorithm with LSB Technique
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Ciphers
encryption
pubcrawl
Metrics
Data models
privacy
Cryptography
information and communication technology
composability
Data mining
Time complexity
Steganography
decryption
Image Steganography
least significant bit
steganography detection
biblio
Data Exfiltration: Methods and Detection Countermeasures
Submitted by grigby1 on Thu, 10/20/2022 - 3:00pm
composability
steganography detection
network intrusion detection
Steganography
cyberattack
Data Exfiltration
countermeasures
timing
Measurement
IP networks
Planning
intrusion detection system
telecommunication traffic
privacy
Instruments
security
Metrics
pubcrawl
biblio
LSB Steganography Using Pixel Locator Sequence with AES
Submitted by grigby1 on Thu, 10/20/2022 - 3:00pm
composability
steganography detection
Information hiding
Image Processing
Steganography
Image coding
Robustness
Measurement
encoding
tools
Cryptography
privacy
AES
Heuristic algorithms
Metrics
pubcrawl
encryption
biblio
High capacity coverless image steganography method based on geometrically robust and chaotic encrypted image moment feature
Submitted by grigby1 on Thu, 10/20/2022 - 3:00pm
feature extraction
pubcrawl
Metrics
Conferences
privacy
composability
chaotic communication
Robustness
Watermarking
Steganography
Harmonic analysis
steganography detection
biblio
An Adaptive Edge-Based Steganography Algorithm for Hiding Text into Images
Submitted by grigby1 on Thu, 10/20/2022 - 2:59pm
Media
steganography detection
statistical attacks
Color Channel
edge detection
ubiquitous computing
steganalysis
filtering algorithms
Steganography
cyber security
Image edge detection
visualization
Streaming media
composability
privacy
Metrics
pubcrawl
biblio
Forensic Digital Data Tamper Detection Using Image Steganography and S-Des
Submitted by grigby1 on Thu, 10/20/2022 - 2:59pm
Ciphers
encryption
Internet of Things
pubcrawl
Metrics
privacy
composability
Task Analysis
Forensics
Steganography
Stakeholders
cryptographic
least significant bit
S-DES
steganography detection
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »