Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image Processing
biblio
Machine Learning and Images for Malware Detection and Classification
Submitted by grigby1 on Wed, 06/20/2018 - 11:56am
classification
clustering
computer vision
Human behavior
Image Processing
machine learning
Malware Analysis
malware classification
malware detection
Metrics
privacy
pubcrawl
resilience
Resiliency
biblio
Block RLS algorithm for surveillance video processing based on image sparse representation
Submitted by K_Hooper on Wed, 04/04/2018 - 8:56am
image representation
video surveillance
Transforms
Training
surveillance video processing
Surveillance video
surveillance
Scalability
Resiliency
pubcrawl
Least squares approximations
image sparse representation
background subtraction
Image reconstruction
Image Processing
Human behavior
dictionary learning
Dictionaries
computational complexity
compressed sensing system
compressed sensing
BRLS algorithm
block recursive least square algorithm
block recursive least square
biblio
Self-Adaptive FPGA-Based Image Processing Filters Using Approximate Arithmetics
Submitted by grigby1 on Mon, 03/19/2018 - 12:53pm
adaptive filtering
approximate computing
dynamic partial reconfiguration
FPGA
Image Processing
Metrics
pubcrawl
resilience
Resiliency
Scalability
SoC
biblio
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
resilience
novel efficient encryption scheme
privacy
privacy-preserving framework
privacy-preserving methods
privacy-preserving visual learning
private data
private information
pubcrawl
multiple classifiers
Resiliency
Scalability
sparse data
Videos
visual classifiers
visual recognition methods
visualization
homomorphic cryptosystem
Artificial Intelligence
computer vision
Cryptography
data privacy
Distributed databases
doubly permuted homomorphic encryption
encryption
high-dimensional data
AI
Human behavior
human factor
Human Factors
Image Processing
learning (artificial intelligence)
learning procedure
leveraging distributed private image data
biblio
Advances in the Quantum Theoretical Approach to Image Processing Applications
Submitted by grigby1 on Fri, 02/02/2018 - 12:25pm
pubcrawl
Resiliency
composability
quantum computing
Scalability
Metrics
image retrieval
edge detection
image compression
image denoising
Image Processing
image storage
image watermarking
quantum computing security
biblio
Analysis of wavelet, ridgelet, curvelet and bandelet transforms for QR code based image steganography
Submitted by grigby1 on Tue, 01/23/2018 - 1:59pm
pubcrawl
wavelet transforms
wavelet transform
transform coefficients
transform based image steganography
Steganography
security applications
security
secret message
ridgelet transform
Resiliency
QR codes
QR code based image steganography
bandelet transform
information security
Image Processing
Image coding
frequency-domain analysis
discrete wavelet transforms
discrete cosine transforms
cyber physical systems
curvelet transforms
curvelet transform and bandelet transform
curvelet transform
Cryptography
bit-plane based steganography method
biblio
Biometric Image Encryption Using DNA Sequences and Chaotic Systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
distributed network systems
Resiliency
pubcrawl
performance computation
nonlinear deterministic system
network security
Metrics
Logistics
Image Processing
hyper chaotic system
encryption
dynamic system
DNA sequence
DNA cryptography
DNA computing
DNA
biocomputing
Cryptography
Correlation
composability
complex problems
communication technologies
chaotic theory
Chaotic systems
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometrics
biometric image encryption
biometric digital image encryption
biblio
Mixed chaotic maps based encryption for high crypto secrecy
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Logistics
Transposition
Substitution
statistical analysis
standards
simple chaotic maps
secure image encryption techniques
secure image encryption
Resiliency
pubcrawl
mixed chaotic maps
Metrics
chaos
initial conditions
Image Processing
high crypto secrecy
encryption
Elliptic curve cryptography
Cryptography
cryptographic algorithms
composability
chaotic cryptography
chaotic communication
chaos based image encryption technique
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
biblio
A new hybrid encryption technique permuting text and image based on hyperchaotic system
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
HyprChaos
text encryption
Text
Software algorithms
Resiliency
pubcrawl
Niobium
Metrics
Image Processing
image encryption
image
chaos
hyperchaotic system
hybrid encryption technique
hybrid
Generators
encryption algorithms
encryption
Cryptography
composability
Ciphers
chaotic cryptography
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »