Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

tampering counterfeiting

biblio

Visible to the public Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images

Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
  • least significant bit
  • weak security
  • unsecured operating systems
  • uncompensatory loss
  • tampering counterfeiting
  • suboptimal multimedia applications
  • Steganography
  • Smart Systems
  • Signal processing algorithms
  • Scalability
  • Resiliency
  • Receivers
  • public key cryptography
  • pubcrawl
  • Metrics
  • LSB watermarking
  • banking applications
  • information security
  • information cloning
  • image watermarking
  • image enhancement
  • Hill cipher algorithm
  • Hill Cipher
  • Elliptic curve cryptography
  • ECC algorithm
  • discrete cosine transforms
  • discrete cosine transform
  • DCT coefficients
  • Data Security
  • Cryptography
  • Ciphertext
  • Ciphers

Terms of Use  |  ©2023. CPS-VO