Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
Variable load image steganography using multiple edge detection and minimum error replacement method
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
MER method
visual qualities
variable load image steganography
Variable embedding ratio
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
PSNR
multiple edge detection
minimum error replacement method
Minimum error replacement
Metrics
canny operator
Image edge detection
Image coding
human visual system
human eyes
embedding ratio
edge pixels
edge detection
digital images
Data mining
data hiding capacity
Cryptography
Conferences
composability
biblio
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images
Submitted by grigby1 on Mon, 02/08/2021 - 2:01pm
security
Metrics
MSE
peak signal-to-noise ratio
PSNR
pubcrawl
resilience
Resiliency
Scalability
message security
SSIM
Steganography
stereo image processing
structural similarity index measure
Three-dimensional displays
Two dimensional displays
visualization
Image coding
AES-256
AES–256
composability
Cryptography
Data Security
edge detected pixels
edge detection
Entropy
3D cover images
Image edge detection
LSB embedding
LSB steganography
MAE
mean absolute error
mean square error
mean square error methods
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 1:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
Hardware Steganography for IP Core Protection of Fault Secured DSP Cores
Submitted by aekwall on Mon, 11/09/2020 - 1:40pm
DSP based IP cores
vendor defined signature
transient fault secured IP cores
signature size
signature free approach
multimedia cores
IP core protection
IP core
high level synthesis
hardware steganography
fault secured DSP cores
Fault secure
entropy value
entropy thresholding
encoding rule
Resiliency
colored interval graph
IP piracy
Steganography
DSP
logic design
digital signal processing chips
Watermarking
industrial property
digital signatures
Entropy
graph theory
policy-based governance
composability
pubcrawl
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 1:12pm
J-UNIWARD
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
Steganography
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
computer architecture
CNN model
Compositionality
Transform coding
distortion
convolution
discrete cosine transforms
Image coding
data compression
convolutional neural nets
Training
deep learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
Triple-Layer Image Security Using a Zigzag Embedding Pattern
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
normal cross correlation
cover image
cryptographic nature
high capacity
histogram analysis
image fidelity
least significant bit-embedding
LSB steganography
mean square error
message security scheme
chaotic logistic map encryption
peak signal to noise ratio
secure layer
steganographic nature
structural similarity index metric
triple-layer image security
zigzag
zigzag embedding pattern
zigzag pattern
Cross Layer Security
AES
encryption
security
Resiliency
pubcrawl
Logistics
Image color analysis
Measurement
image colour analysis
chaotic communication
Cryptography
mean square error methods
secret data
Steganography
secret message
composability
2D image steganography technique
AES-128 encryption
chaotic logistic map
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »