Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic communication
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
Hyper-chaos
Two dimensional displays
Sparse matrices
sparse coefficients
security
Resiliency
resilience
pubcrawl
privacy
matrix algebra
Logistics
linear measurements
Image reconstruction
Image coding
hyper-chaos based image compression-encryption algorithm
hyper-chaos based diffusion
2D-Compressive Sensing
encryption
data compression
cyber physical systems
Cyber Physical System
Cryptography
compressive sensing
compressive sampling
compression-encryption algorithm
Compression
compressed sensing
composability
cipher image
chaotic communication
chaos based measurement matrix construction
chaos
biblio
A Delayed Feedback Chaotic Encryption Algorithm Based on Polar Codes
Submitted by aekwall on Mon, 11/25/2019 - 2:10pm
channel coding
polar codes
physical layer security
encoding information protection
delayed feedback chaotic encryption algorithm
delayed feedback
data transmission security
chaotic sequences
binary keys extraction
chaotic cryptography
cryptanalysis
chaotic system
wireless channels
security of data
chaotic communication
chaos
Predictive Metrics
Reliability
feedback
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
encryption
Cryptography
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
biblio
Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
2D mapping function
Two dimensional displays
speech cryptography
speech coding
modified Euler system
Lorenz 3D mapping
Henon mapping
euler numerical resolution
Chaotic Mapping
audio signal processing
audio file
audio cryptography system
3D mapping function
Cryptography
chaotic cryptography
Three-dimensional displays
chaotic communication
chaos
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
Conferences
encryption
biblio
A Secure Voice Channel using Chaotic Cryptography Algorithm
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
secure voice channel
communicaiton channel prototype
decryption process
encrypted channel
encryption process
encryption-decription cycle
FPGA Spartan-3
high processing speed
nonecrypted channel
Cipher feedback mode
secure voice communications channel
secured channel
secured communication channel
Spartan-3 FPGA board
time 202.0 mus
unwanted eavesdropping
voice communication
voice messages
Ciphers
Cryptography
encryption
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
field programmable gate arrays
Predictive Metrics
chaotic communication
asynchronous communication
chaotic cryptographic algorithm
chaotic cryptography
chaotic cryptography algorithm
chiper feedback
biblio
Hardware Implementation of A Chaotic Pseudo Random Number Generator Based on 3D Chaotic System without Equilibrium
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
lightweight systems
chaotic pseudorandom number generator
cryptography systems
deterministic chaotic systems
digital communication
digital communication systems
dynamical behavior
Dynamical Systems
Hardware Implementation
chaotic dynamics
low computational overhead
low-cost chaotic hardware
low-cost hardware platforms
simple nonlinear systems
three-dimensional chaotic flows
Three-dimensional displays
chaotic cryptography
field programmable gate arrays
chaotic behaviors
chaotic based digital systems
3D chaotic system
3D chaotic flows
chaotic communication
Predictive Metrics
random number generation
Generators
Mathematical model
composability
pubcrawl
Resiliency
embedded systems
Hardware
Cryptography
biblio
A Provable Secure Image Encryption Schema Based on Fractional Order Chaotic Systems
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
Fractional order chaos
Compositionality
provable security
provable secure image encryption schema
Nonlinear signal processing
information security applications
Image Processing
image encryption
Histograms
fractional order chaotic systems
Cryptography
discrete time chaotic systems
continuous time chaotic systems
chaotic communication
chaos
Predictive Metrics
Signal processing algorithms
pubcrawl
Resiliency
encryption
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Correlation based highly secure image hiding in audio signals using wavelet decomposition and chaotic maps hopping for 5G multimedia communications
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
Multimedia communication
encoding
hidden data
higher hiding capacity
highly secure image hiding
Image coding
image data
image hiding process
Metrics
efficient secure steganography scheme
possible important applications
pubcrawl
Robustness
secret communications
security
Steganography
successive audio signals
wavelet transforms
correlation based image hiding
5G mobile communication
5G multimedia communications
actual audio samples
audio coding
Audio Steganography
chaotic communication
chaotic maps hopping
Compositionality
5G communication systems
cover audio file
cover audio signal
data encapsulation
data hiding
decomposition
differential pulse coding modulation technique
discrete wavelet transform
discrete wavelet transforms
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »