Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
"An edge based image steganography with compression and encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 1:01pm
Image coding
stego image distortion
Steganography
secret message
Secret key
pubcrawl170102
private key cryptography
Optical distortion
Media
MATLAB
LZW algorithm
Image edge detection
ART
Hash Function
encryption
embedded secret data
edge detection
edge based image steganography
data hiding capacity
data encryption
data compression
Cryptography
canny edge detector
biblio
Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
Submitted by BrandonB on Wed, 05/06/2015 - 1:08pm
information technology
Steganography
steganographic technique
security enhancement
Receivers
Public key
Pragmatics
physical elements
multi-agent systems
authorisation
hierarchical access
encryption
Data Security
data confidentiality
cyber-physical systems
Cryptography
cryptographic technique
computational elements
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 9:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
Inspecting the Ways of Source Anonymity in Wireless Sensor Network
Submitted by BrandonB on Mon, 05/04/2015 - 12:45pm
adversarial assumptions
anonymity
coding theory
Communication Systems
event source anonymity
LSB steganography technique
network traffic
persistent dummy traffic
source location privacy
statistical test
Steganography
telecommunication traffic
Wireless Sensor Network
wireless sensor networks
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Submitted by BrandonB on Mon, 05/04/2015 - 12:10pm
Humanoid robots
storage encryption
Steganography
steganographic techniques
plausibly deniable encryption
PDE
Mobile Platform Security
Mobile handsets
mobile environment
mobile devices
mobile computing
Mobile communication
Mobiflage
MF-SD
MF-MTP variant
Law
Android (operating system)
File system security
FAT32 removable SD cards
Ext4 file system mechanisms
encryption
desktop OS
desktop environment
deniable storage encryption
deniable encryption
decryption keys
data-block allocator
data confidentiality
Cryptography
Androids
Android OS
file
Anonymous, Secure and Robust Multi-Recipient Communication
Submitted by Katie Dey on Thu, 11/01/2012 - 9:37pm. Contributor:
Nelly Fazio
ABSTRACT
SaTC Posters
Collaborative Cloud Storage
Graduate Center & City College of CUNY
Recipient Anonymity
roadcast Encryption
Robustness
Steganography
1253927
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
…
7
8
9
10
11
12
13
14
15