Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain
Submitted by aekwall on Fri, 02/25/2022 - 10:42am
blockchain
blockchains
Compositionality
Elliptic curves
Generators
Online banking
Predictive Metrics
Protocols
provable security
pubcrawl
Public key
Resiliency
Steganography
biblio
Lightweight Proactive Moving-target Defense for Secure Data Exchange in IoT Networks
Submitted by grigby1 on Tue, 02/22/2022 - 5:46pm
Metrics
pubcrawl
security
Internet of Things
Steganography
Mobile communication
simulation
moving target defense
uncertainty
sensors
Cybersecurity
Scalability
Resiliency
resilience
biblio
Secure Storage of Data on Devices-Android Based
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
OTP key
tools
Steganography
scientific computing
Scalability
Resiliency
resilience
pubcrawl
Prediction algorithms
performance evaluation
android encryption
Metrics
information management
Human behavior
encryption
DNA coding
DNA
decryption
Android security
biblio
An ROI-Based Watermarking Technique for Image Content Recovery Robust Against JPEG
Submitted by grigby1 on Mon, 11/29/2021 - 2:49pm
Resistance
Watermarking
Transform coding
Tamper resistance
tamper localization
Steganography
Splicing
semi-fragile watermarking
Scalability
ROI
Roads
automobiles
pubcrawl
multimedia protection
Metrics
Licenses
jpeg
image recovery
Human Factors
Human behavior
cropping
biblio
Secure Communication Using Steganography in IoT Environment
Submitted by grigby1 on Tue, 08/31/2021 - 12:58pm
Complexity theory
Cryptography
Heuristic algorithms
image segmentation
IoT
microcontroller
microcontrollers
performance evaluation
PSNR
pubcrawl
QR code
QR codes
resilience
Resiliency
Steganography
biblio
Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing
Submitted by aekwall on Wed, 07/07/2021 - 4:56pm
Task Analysis
Reliability
surveillance
hashing
information sharing
Law
social networking (online)
Steganography
TV
video recording
Video Security
video surveillance
pubcrawl
Metrics
Resiliency
Human behavior
biblio
Technology of Image Steganography and Steganalysis Based on Adversarial Training
Submitted by aekwall on Tue, 06/01/2021 - 1:25pm
adversarial networks
Adversarial training
Communication networks
composability
Compositionality
computational intelligence
convolutional neural networks
Cryptography
generative adversarial networks
pubcrawl
security
steganalysis
Steganography
Training
biblio
Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
encryption
user interfaces
telecommunication security
Steganography
randomized CAPTCHA code
pubcrawl
police department
medical fields
least significant bit
intended receiver
image steganography method
image data
image colour analysis
Image coding
image
Human behavior
achieve confidentiality
detective investigation
decryption mechanism
decryption
decoding tools
data hiding technique
data encapsulation
Cryptography
confidentiality
composability
captchas
CAPTCHA codes
CAPTCHA
authorisation
authentication
authenticated user
biblio
Video Steganography using Curvelet Transform and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
Metrics
video steganography
Transforms
stego video
stego key encryption
Stego Key
Steganography
security
secure video steganography
secret data transmission
Scalability
Resiliency
public key cryptography
pubcrawl
carrier video file
Mathematical model
Image Steganography
Image coding
fast discrete curvelet transform
encryption
elliptic curve integrated encryption scheme
Elliptic curve cryptography
discrete wavelet transforms
curvelet transforms
Cryptography
cover video
color video
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »