Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
Compressive Sensing Based Feature Residual for Image Steganalysis Detection
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
image colour analysis
wavelet transforms
steganography detection
Steganography
steganalytic method
steganalysis
Sparse Representation
Sparse matrices
pubcrawl
privacy
Metrics
matrix algebra
image steganalysis detection
image representation
Image detection
image content feature analysis
BCS measurement matrix
grayscale image processing
GGD model
generalized Gaussian distribution model
gaussian distribution
Feature residual
feature extraction
DLWT coefficients
discrete wavelet transforms
directional lifting wavelet transform
Databases
compressive sensing based feature residual analysis
compressive sensing
compressed sensing
composability
block CS measurement matrix
biblio
Rethinking the High Capacity 3D Steganography: Increasing Its Resistance to Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
Mathematical model
Three-dimensional displays
stereo image processing
steganography detection
Steganography
steganalysis
shape distortion
Resistance
pubcrawl
privacy
Metrics
3D shape
Information hiding
Image edge detection
high capacity 3D steganographic method
Hamiltonian path quantization
Face
distortion
Data mining
composability
3D steganography
biblio
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault Tolerance
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
anti-forensics
composability
detection
fault tolerance
File systems
hashing
Information hiding
Metrics
privacy
pubcrawl
robust
security
Slack Space
Steganography
steganography detection
Threshold secret sharing
biblio
Nonlinear Feature Normalization in Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
composability
machine learning
Metrics
normalization
privacy
pubcrawl
random conditioning
steganalysis
Steganography
steganography detection
uniformization
biblio
Timestamp Hiccups: Detecting Manipulated Filesystem Timestamps on NTFS
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
composability
Digital Forensics
filesystem
Information Leakage
information security
Metrics
NTFS
privacy
pubcrawl
Steganography
steganography detection
biblio
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Submitted by grigby1 on Tue, 05/01/2018 - 10:32am
composability
covert channel
Information hiding
Metrics
privacy
pubcrawl
Steganography
steganography detection
voice activity detection
VoIP
biblio
Insider Misuse Attribution Using Biometrics
Submitted by grigby1 on Mon, 03/05/2018 - 12:17pm
biometrics
data leak
Digital Forensics
guilty identification
Human behavior
Human Factors
information forensics
Metrics
pubcrawl
resilience
Resiliency
Scalability
Steganography
biblio
Cliptography: Post-Snowden Cryptography
Submitted by grigby1 on Mon, 03/05/2018 - 12:05pm
backdoor resistance
black box encryption
cliptography
composability
Cryptography
implementation subversion
kleptography
Metrics
pubcrawl
resilience
Resiliency
Steganography
biblio
Steganography implementation on android smartphone using the LSB (least significant bit) to MP3 and WAV audio
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
Metrics
wav
testing
Steganography
smart phones
Scalability
Resiliency
resilience
pubcrawl
android encryption
Media
LSB method
java eclipse
Human Factors
Human behavior
encryption
Digital audio players
audio mp3
biblio
Analysis of wavelet, ridgelet, curvelet and bandelet transforms for QR code based image steganography
Submitted by grigby1 on Tue, 01/23/2018 - 1:59pm
pubcrawl
wavelet transforms
wavelet transform
transform coefficients
transform based image steganography
Steganography
security applications
security
secret message
ridgelet transform
Resiliency
QR codes
QR code based image steganography
bandelet transform
information security
Image Processing
Image coding
frequency-domain analysis
discrete wavelet transforms
discrete cosine transforms
cyber physical systems
curvelet transforms
curvelet transform and bandelet transform
curvelet transform
Cryptography
bit-plane based steganography method
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »