Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
steganography detection
biblio
Research on image steganography information detection based on support vector machine
Submitted by grigby1 on Thu, 10/20/2022 - 2:59pm
signal processing
machine learning algorithms
Support vector machines
pubcrawl
Metrics
Correlation
privacy
composability
Libraries
Signal processing algorithms
Steganography
Writing
Information detection
LSB matching
support vector machine
steganography detection
biblio
Image Steganography System based on Hybrid Edge Detector
Submitted by grigby1 on Thu, 05/05/2022 - 3:32pm
LSB method
stego media
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
Media
steganography detection
Implants
Image quality
Image edge detection
edge detector
edge detection
Detectors
Data Security
cover media
composability
biblio
Detection of the Information Hidden in Image by Convolutional Neural Networks
Submitted by grigby1 on Mon, 02/10/2020 - 10:45am
hidden information
steganography detection
Steganography
steganalysis
pubcrawl
privacy
object detection
Metrics
information protection
Image Processing
high probability
basic data
hidden communication
Data mining
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
computer architecture
composability
Brightness
biblio
Image Steganography Based on Hybrid Edge Detector to Hide Encrypted Image Using Vernam Algorithm
Submitted by grigby1 on Mon, 02/10/2020 - 10:44am
LSB method
word length 64800.0 bit
word length 3.0 bit
word length 2.0 bit
Vernam cipher algorithm
Vernam algorithm
steganography detection
Steganography
shift registers
secret image bits
pubcrawl
pseudorandom key
privacy
NonLinear Feedback Shift Register
multimedia technology
Metrics
and edge detector
least significant bit steganography
internet technology
information security
Image Steganography
Hybrid Sobel edge detector
hybrid Kirch edge detector
hiding image
Geffe generator
encrypted image
edge pixel
edge detection
data encapsulation
Cryptography
composability
baboon cover image
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 10:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
Probing Image and Video Steganography Based On Discrete Wavelet and Discrete Cosine Transform
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
least significant bit method
visualization
video steganography
steganography detection
Steganography
secured communication
pubcrawl
privacy
object tracking
object detection
multiple object tracking algorithmic programs
Multiple Object Tracking
motion object detection
Metrics
message embedding
LSB
composability
Kalman filters
Image Steganography
image motion analysis
file transformation
error correcting codes
Embedding potency
embedding payload
DWT
discrete wavelet transforms
discrete wavelet transform
discrete cosine transforms
discrete cosine transform
DCT
data encapsulation
Conferences
biblio
Second Level Steganalysis - Embeding Location Detection Using Machine Learning
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Cloud Computing
composability
Data mining
digital images
discrete cosine transforms
feature extraction
machine learning
Markov processes
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
Transform coding
biblio
Edge Based Image Steganography: Problems and Solution
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Image edge detection
steganography schemes
steganography detection
Steganography
secrete messages bits
secrete message
Receivers
pubcrawl
privacy
Payloads
Metrics
LSB
Indexes
Color
image colour analysis
Image color analysis
Image coding
embedding scheme
edges positions
edge based image steganography
edge
Detectors
data encapsulation
composability
color images
Color image
biblio
Enhanced TCP Sequence Number Steganography Using Dynamic Identifier
Submitted by grigby1 on Mon, 02/10/2020 - 10:42am
classifiers
composability
ISN
Metrics
network steganography
Packets
privacy
pubcrawl
Steganography
steganography detection
transmission control protocol
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »