Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
Exploring Non-Additive Distortion in Steganography
Submitted by grigby1 on Fri, 02/22/2019 - 4:07pm
composability
distortion minimization
Metrics
privacy
pubcrawl
Steganography
steganography detection
syndrome-trellis codes
biblio
Double Embedding Steganalysis: Steganalysis with Low False Positive Rate
Submitted by grigby1 on Fri, 02/22/2019 - 4:07pm
composability
f5
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
biblio
Channel Steganalysis
Submitted by grigby1 on Fri, 02/22/2019 - 4:07pm
channel
composability
Forensics
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
biblio
Adversarial Examples Against Deep Neural Network Based Steganalysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:17pm
policy-based governance
steganography detection
Steganography
steganalysis
security
Science of Security
Scalability
Resiliency
pubcrawl
adversarial examples
Metrics
Human behavior
Deep Neural Network
cyber physical systems
comparability
collaboration
Artificial Neural Networks
biblio
Video Steganography Using Karhunen-LoÈVe Transform
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
anonymous messaging
Eigen vector
Karhunen-Loeve Transform
pubcrawl
resilience
Resiliency
Scalability
Steganography
biblio
FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Retina
invisible data encoding
Metrics
Mobile handsets
mobile phone screens
novel modulation method
optical modulation
optical transmitters
pubcrawl
Receivers
resilience
Resiliency
Image color analysis
Scalability
Steganography
telecommunication security
time 2.0 d
uniform data
unlicensed bandwidth resources
unobtrusive steganography methods
user distraction
visible light communications
visual MIMO
display screencamera communication
BER
Bit error rate
camera based receiver architectures
Cameras
color shift based methods
data encapsulation
data hiding capability
Data Transmission
Demodulation
demodulation mechanisms
Device-to-device communication
Visible Light Communications Security
display transmitters
error correction codes
error statistics
foveation
foveation based data hiding
FoVLC
free-space optical communication
HAN systems
home area networking system
human visual system
biblio
Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
Metrics
Training
testing
steganography detection
Steganography
statistical model
statistical analysis
single-image detector
pubcrawl
privacy
pooled steganalysis
Payloads
payload spreading strategy
optimal detection
omniscient Warden
Adaptation models
matched filters
matched filter
likelihood ratio test
image matching
image filtering
distortion
Detectors
content-adaptive batch steganography
content-adaptive additive embedding schemes
composability
Batch steganography
Additives
adaptive embedding
biblio
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
image steganography scheme
steganography detection
Steganography
standards
smoothing methods
secret message concealing
PVD systems
pubcrawl
privacy
Neural networks
neural nets
Metrics
media file
improved-AMBTC algorithm
improved absolute moment block truncation coding algorithm
adaptive systems
Image Steganography
Image edge detection
image concealing
image compression methods
Image coding
I-AMBTC
hybrid adaptive neural networks
HVS
edge detection operators
data compression
composability
ART
ANNS
biblio
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
network steganography
Traffic Coloring
steganography detection approach
steganography detection
Steganography
RTP
RTCP
real-time systems
real-time services
pubcrawl
Protocols
privacy
overt protocols
network traffic coloring
network threats
Bandwidth
Metrics
malicious control server
inter-protocol steganography
inter-protocol hiding techniques
Information hiding
Google
Electronic mail
delays
defensive systems
Data visualization
data encapsulation
Cryptographic Protocols
computer network security
composability
biblio
A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
Image coding
telecommunication traffic
steganography detection
Steganography
steganographic images
statistical signature based steganalysis algorithms
pubcrawl
privacy
open source tool
network traffic
Metrics
Media
internet
Algorithm design and analysis
embedded messages
Data mining
data encapsulation
data breach prevention
data breach detection
Cryptography
cover file
corporate networks
concealed data
composability
automatic detection
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »