Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
Forensic Digital Data Tamper Detection Using Image Steganography and S-Des
Submitted by grigby1 on Thu, 10/20/2022 - 3:59pm
Ciphers
encryption
Internet of Things
pubcrawl
Metrics
privacy
composability
Task Analysis
Forensics
Steganography
Stakeholders
cryptographic
least significant bit
S-DES
steganography detection
biblio
Research on image steganography information detection based on support vector machine
Submitted by grigby1 on Thu, 10/20/2022 - 3:59pm
signal processing
machine learning algorithms
Support vector machines
pubcrawl
Metrics
Correlation
privacy
composability
Libraries
Signal processing algorithms
Steganography
Writing
Information detection
LSB matching
support vector machine
steganography detection
biblio
Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation
Submitted by grigby1 on Thu, 10/06/2022 - 3:21pm
information science
Packet header manipulation
network steganography
covert channels
Resiliency
network protocols
Communications technology
Communication channels
Steganography
pubcrawl
Named Data Network Security
resilience
Receivers
Protocols
internet
Scalability
Human Factors
Human behavior
biblio
Algorithmic method of security of the Internet of Things based on steganographic coding
Submitted by aekwall on Fri, 09/30/2022 - 2:45pm
mechatronics
stego image
RGB
PSNR
LSB
Histogram
grayscale metod
Color
Steganography
Gray-scale
information security
IoT security
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Conferences
IoT
biblio
Achieving Privacy and Security Using QR-Code through Homomorphic Encryption and Steganography
Submitted by aekwall on Thu, 07/14/2022 - 4:17pm
Homomorphic encryption
NTRU
DWT
QR codes
QR code
education
Focusing
Market research
cyber-physical systems
Cryptography
privacy
Resiliency
pubcrawl
Steganography
Online banking
data privacy
information security
security
biblio
Biometric Steganography Using MPV Technique
Submitted by grigby1 on Tue, 06/14/2022 - 3:14pm
Decoding
stego image
MPV
Inverse Arnold Transform
Arnold transform
biometrics (access control)
Transforms
Steganography
biometric encryption
biometrics
Interference
encryption
Receivers
Metrics
Data Security
Cryptography
privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
Image Steganography System based on Hybrid Edge Detector
Submitted by grigby1 on Thu, 05/05/2022 - 4:32pm
LSB method
stego media
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
Media
steganography detection
Implants
Image quality
Image edge detection
edge detector
edge detection
Detectors
Data Security
cover media
composability
biblio
Eliminating Broadband Covert Channels in DSA-Like Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 3:13pm
data hiding
subliminal channel
Steganography
Scalability
Resiliency
resilience
Redundancy
Public key
pubcrawl
DSA
digital signatures
data communication
covert channels
covert channel
control systems
Compositionality
composability
channel capacity
Broadband communication
biblio
Encryption, File Splitting and File compression Techniques for Data Security in virtualized environment
Submitted by grigby1 on Fri, 04/01/2022 - 1:16pm
Software algorithms
steganography algorithm
Pressure
Decryption Technique
data storage
cloud data
Compression
Secure File Sharing
integrity
Data protection
Steganography
Distributed databases
Encryption technique
Cloud Computing
Decoding
Metrics
encoding
composability
Safety
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Method of Hierarchical Protection of Biometric Information
Submitted by grigby1 on Wed, 03/09/2022 - 1:40pm
Fingerprint recognition
concealment
bit.
biometrics
biometric data
biometrics (access control)
information
Steganography
Telecommunications
multifactor authentication
Metrics
tools
Data protection
information and communication technology
authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
information security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »