Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cover image
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
Triple-Layer Image Security Using a Zigzag Embedding Pattern
Submitted by aekwall on Mon, 09/21/2020 - 2:36pm
normal cross correlation
cover image
cryptographic nature
high capacity
histogram analysis
image fidelity
least significant bit-embedding
LSB steganography
mean square error
message security scheme
chaotic logistic map encryption
peak signal to noise ratio
secure layer
steganographic nature
structural similarity index metric
triple-layer image security
zigzag
zigzag embedding pattern
zigzag pattern
Cross Layer Security
AES
encryption
security
Resiliency
pubcrawl
Logistics
Image color analysis
Measurement
image colour analysis
chaotic communication
Cryptography
mean square error methods
secret data
Steganography
secret message
composability
2D image steganography technique
AES-128 encryption
chaotic logistic map
biblio
A Novel Technique for Biometric Data Protection in Remote Authentication System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
biometric encryption
transmitted biometric data
Steganography
semantic segmentation
secret image
remote authentication system
Qualified Significant Wavelet Trees
IWT based data hiding increases
Integer Wavelet Transform
extracted fingerprint image
crypto-steganography method
cover image
chaotic encrypted fingerprint image
biometric features
biometric data protection
Cryptography
biometrics
wavelet transforms
image segmentation
fingerprint identification
feature extraction
resilience
Fingerprint recognition
biometrics (access control)
chaotic encryption
Scalability
Resiliency
Metrics
pubcrawl
biblio
Suitability of Singular Value Decomposition for Image Watermarking
Submitted by grigby1 on Fri, 07/03/2020 - 3:53pm
image security
watermarking techniques
Watermarking
Transforms
singular value decomposition
pubcrawl
Metrics
Matrix decomposition
image watermarking
Compositionality
Image reconstruction
Image coding
False positive problem
digital images
Digital Image Watermarking
decomposition
cyber physical systems
cover image
biblio
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
LSB algorithm
trees (mathematics)
stego image
steganography techniques
steganography algorithm
Steganography
sharp edges
security
Scalability
Resiliency
pubcrawl
PSNR
MPC algorithm
MPC
Metrics
composability
LSB
internet
Image coding
full tree
edge detection scheme
edge detection
edge blocks
digital images
data embedding process
data concealment
cover image
corner pixels
confidential data
biblio
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement
Submitted by K_Hooper on Wed, 10/25/2017 - 10:53am
authentication
cover image
Damage Assessment
error detection
pubcrawl
repairing
resilience
secret image
secret sharing
Steganography
biblio
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement
Submitted by grigby1 on Fri, 08/18/2017 - 1:11pm
authentication
composability
cover image
error detection
Metrics
privacy
pubcrawl
repairing
secret image
secret sharing
Steganography
steganography detection