Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steganography
biblio
A Multiple Layer Security Scheme Utilizing Information Matrices
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
secret data
word length 256 bit
secret message
multiple layer security scheme
least significant bit embedding
information matrix
information matrices
double-layer message security scheme
Steganography
Cryptography
AES algorithm
QR codes
cyber physical systems
matrix algebra
pubcrawl
Resiliency
telecommunication security
biblio
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors
Submitted by aekwall on Mon, 03/09/2020 - 10:17am
MV domain
distortion-minimization framework
embedding capacity
embedding domains
image motion analysis
MDE strategies
motion estimation
motion vectors
multidomain embedding strategies
discrete cosine transforms
partition modes
potential security risks
sequential embedding
Steganography
video steganography
Video-steganography
Security Risk Estimation
minimisation
security
Resiliency
pubcrawl
Metrics
data encapsulation
video signal processing
distortion
Human Factors
Scalability
encoding
Quantization (signal)
Binary codes
-motion-vector
-multi-domain-embedding
-partition-mode
digital video
biblio
Detection of the Information Hidden in Image by Convolutional Neural Networks
Submitted by grigby1 on Mon, 02/10/2020 - 10:45am
hidden information
steganography detection
Steganography
steganalysis
pubcrawl
privacy
object detection
Metrics
information protection
Image Processing
high probability
basic data
hidden communication
Data mining
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
computer architecture
composability
Brightness
biblio
Image Steganography Based on Hybrid Edge Detector to Hide Encrypted Image Using Vernam Algorithm
Submitted by grigby1 on Mon, 02/10/2020 - 10:44am
LSB method
word length 64800.0 bit
word length 3.0 bit
word length 2.0 bit
Vernam cipher algorithm
Vernam algorithm
steganography detection
Steganography
shift registers
secret image bits
pubcrawl
pseudorandom key
privacy
NonLinear Feedback Shift Register
multimedia technology
Metrics
and edge detector
least significant bit steganography
internet technology
information security
Image Steganography
Hybrid Sobel edge detector
hybrid Kirch edge detector
hiding image
Geffe generator
encrypted image
edge pixel
edge detection
data encapsulation
Cryptography
composability
baboon cover image
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 10:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
Probing Image and Video Steganography Based On Discrete Wavelet and Discrete Cosine Transform
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
least significant bit method
visualization
video steganography
steganography detection
Steganography
secured communication
pubcrawl
privacy
object tracking
object detection
multiple object tracking algorithmic programs
Multiple Object Tracking
motion object detection
Metrics
message embedding
LSB
composability
Kalman filters
Image Steganography
image motion analysis
file transformation
error correcting codes
Embedding potency
embedding payload
DWT
discrete wavelet transforms
discrete wavelet transform
discrete cosine transforms
discrete cosine transform
DCT
data encapsulation
Conferences
biblio
Second Level Steganalysis - Embeding Location Detection Using Machine Learning
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Cloud Computing
composability
Data mining
digital images
discrete cosine transforms
feature extraction
machine learning
Markov processes
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
Transform coding
biblio
Edge Based Image Steganography: Problems and Solution
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Image edge detection
steganography schemes
steganography detection
Steganography
secrete messages bits
secrete message
Receivers
pubcrawl
privacy
Payloads
Metrics
LSB
Indexes
Color
image colour analysis
Image color analysis
Image coding
embedding scheme
edges positions
edge based image steganography
edge
Detectors
data encapsulation
composability
color images
Color image
biblio
Enhanced TCP Sequence Number Steganography Using Dynamic Identifier
Submitted by grigby1 on Mon, 02/10/2020 - 10:42am
classifiers
composability
ISN
Metrics
network steganography
Packets
privacy
pubcrawl
Steganography
steganography detection
transmission control protocol
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »