Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
A Novel Technique for Biometric Data Protection in Remote Authentication System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
biometric encryption
transmitted biometric data
Steganography
semantic segmentation
secret image
remote authentication system
Qualified Significant Wavelet Trees
IWT based data hiding increases
Integer Wavelet Transform
extracted fingerprint image
crypto-steganography method
cover image
chaotic encrypted fingerprint image
biometric features
biometric data protection
Cryptography
biometrics
wavelet transforms
image segmentation
fingerprint identification
feature extraction
resilience
Fingerprint recognition
biometrics (access control)
chaotic encryption
Scalability
Resiliency
Metrics
pubcrawl
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
Steganography
adaptive filtering
steganographic methods
steganalysis
spatial steganographic scheme
spatial images
quantized multivariate Gaussian distribution
multivariate Gaussian model
image residuals modeling
high-pass filters
high-pass filtering
content-adaptive image steganographic schemes
approximated Fisher Information
Scalability
image filtering
Payloads
information processing
Media
gaussian distribution
Image coding
Metrics
Computational modeling
pubcrawl
Resiliency
feature extraction
security
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:40am
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
Improved CRT Image Steganography based on Edge Areas and Spread Embedding
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
PN Sequence
watermarking method
steganography research
Steganography
steganographic images
spread spectrum embedding
Spread Spectrum
spatial domain methods
security
Scalability
safe image steganography method
Resiliency
pubcrawl
composability
Metrics
image watermarking
Image Steganography
good imperceptibility quality
embedded payload
edge detection
data hiding method watermarking
Cryptography
CRT-based steganography
CRT method
CRT image steganography
CRT
biblio
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
LSB algorithm
trees (mathematics)
stego image
steganography techniques
steganography algorithm
Steganography
sharp edges
security
Scalability
Resiliency
pubcrawl
PSNR
MPC algorithm
MPC
Metrics
composability
LSB
internet
Image coding
full tree
edge detection scheme
edge detection
edge blocks
digital images
data embedding process
data concealment
cover image
corner pixels
confidential data
biblio
A Coverless Approach to Data Hiding Using DNA Sequences
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image sequences
stegoimaging
steganalysis algorithms
image steganography techniques
high embedding capacity
DNA Steganography
DNA sequences
deoxyribonucleic acid sequences
cracking probability
coverless approach
coverless
DNA cryptography
security
Steganography
data hiding
Predictive Metrics
DNA
privacy
data encapsulation
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Multimodal Data Security Framework Using Steganography Approaches
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
advanced encryption standard
honey pots
Steganography approaches
multimodal data security framework
multimodal
least significant bit
information hiding strategies
heuristic intrusion detection
Augmented Reality Steganography
ARSteg
encryption algorithm
Steganography
augmented reality
framework
Scalability
Human Factors
unauthorized users
pubcrawl
password
authentication
Resiliency
data encryption
security
decryption
Conferences
encryption
Cryptography
Servers
biblio
Image steganography using texture features and GANs
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
complex texture regions
varisized images
truncated layer
texture-based loss
texture features
texture feature
stego images
stego image distortions
natural images
invisible perturbations
Image Steganography
hidden writing
encoder-decoder framework
cover images
convolutional network
feature extraction
Adversarial training
adversarial discriminator
Steganography
secret information
mean squared error
image texture
deep neural networks
QR codes
QR code
cyber physical systems
Cryptography
pubcrawl
Resiliency
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »