Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image encryption scheme
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
A Novel Approach of Image Encryption Using Chaos and Dynamic DNA Sequence
Submitted by aekwall on Mon, 06/22/2020 - 11:28am
Human behavior
two dimension Sine-Henon alteration map
two dimension logistic map
reversible DNA operations
Resiliency
random processes
pubcrawl
pseudorandom sequences
privacy
Predictive Metrics
plain image pixel
Logistics
logistic map
image encryption scheme
Image coding
Cryptography
Histograms
Heuristic algorithms
encryption of image
encryption
encoding
dynamic DNA sequence
DNA sequence
DNA operations cipher image
DNA cryptography
DNA converted pixel
DNA
distorted image
Different types of attacks and Statistical Analysis
biblio
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
robust scheme
Hyper-chaos
hyper-chaos systems
image encryption
image encryption scheme
image sequences
Metrics
pubcrawl
Resiliency
Histograms
secure Hash algorithm SHA-1
Security analysis
Sensitivity
SHA-1
sub-vectors confusion
two-diffusion process
XOR operation
4D hyperchaotic system
highest security level
Entropy
encryption schemes
encryption process
encryption
digital image encryption
diffusion layers
Diffusion
Cryptography
Correlation
Confusion
composability
chaotic index sequence
chaotic cryptography
chaos