Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
digital images
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by
aekwall
on Mon, 03/25/2019 - 8:55am
pubcrawl
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
resilience
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
discrete cosine transforms
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
Media
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
biblio
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Submitted by
grigby1
on Fri, 02/22/2019 - 3:08pm
privacy
pubcrawl
Metrics
composability
Training
feedforward neural nets
learning (artificial intelligence)
Brain modeling
distortion
data encapsulation
Steganography
Resists
carrier image
coverless
deep convolutional generative adversarial networks
digital images
Gallium nitride
generative adversarial networks
Image coding
image generation
image steganography method
image SWE method
long-term confrontation
machine-learning-based steganalysis algorithms
noise vector
secret information
state-of-the-art image steganalysis algorithms
traditional embedding-based steganography
trained generator neural network model
Transform coding
without embedding
steganography detection
biblio
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Submitted by
grigby1
on Wed, 12/27/2017 - 12:08pm
chaotic cryptography
chaotic encryption
composability
Correlation
Deterministic Encryption
digital images
Discrete Fourier transforms
encryption
Entropy
frequency-domain analysis
Image color analysis
information security
Logistics
Metrics
Mutual information
pubcrawl
Resiliency
biblio
"Multiple embedding secret key image steganography using LSB substitution and Arnold Transform"
Submitted by
grigby1
on Tue, 02/14/2017 - 12:13pm
Arnold transform
covert channel
Cryptography
Data Security
Digital Image Steganography
digital images
Histograms
Image coding
LSB substitution
pubcrawl170102
Public key
secret image encryption
secret key image steganography
security of data
Spatial domain
Steganography
Transforms
visualization
biblio
Countering anti-forensics of median filtering
Submitted by
BrandonB
on Mon, 05/04/2015 - 10:30am
anti-forensic
antiforensic method
antiforensics countering
Detectors
digital images
Discrete Fourier transforms
Filtering
Forensics
Image coding
Image forensics
image pixel difference distribution restoration
image restoration
median filtering
median filtering traces
median filters
Noise
pixel difference
Radiation detectors
statistical analysis
statistical fingerprints
biblio
Detection of duplicated regions in images using 1D-Fourier transform
Submitted by
BrandonB
on Fri, 05/01/2015 - 6:57am
1D-Fourier transform
authentication
copy move forged region detection
Copy move forgery
digital images
digital mediums
duplicated region detection
feature extraction
feature extraction algorithm
feature vector similarity
Fourier transform
Fourier transforms
frequency domain
frequency-domain analysis
Gaussian blurring
high quality imaging hardware
Image coding
image modification techniques
image recognition
JPEG compression attacks
overlapping blocks
Resistance
tampering technique
user friendly image editing software