Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
digital images
biblio
Design and Development of Digital Image Security Using AES Algorithm with Discrete Wavelet Transformation Method
Submitted by grigby1 on Fri, 04/22/2022 - 1:16pm
information security
security
pubcrawl
AES
composability
Computer languages
Metrics
Task Analysis
Compositionality
Transforms
interoperability
digital images
discrete wavelet transforms
decomposition
discrete Wavelet transformation
biblio
An Implicit Approach for Visual Data: Compression Encryption via Singular Value Decomposition, Multiple Chaos and Beta Function
Submitted by grigby1 on Mon, 03/14/2022 - 12:23pm
Metrics
singular value decomposition
logistic map
Compression
Beta Function
Arnold cat map
digital images
Image coding
visualization
Reliability
encryption
Policy Based Governance
Safe Coding
Cats
chaotic communication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Visible-Imperceptible Image Watermarking based on Reversible Data Hiding with Contrast Enhancement
Submitted by aekwall on Mon, 06/28/2021 - 12:40pm
information security
intellectual property security
security information
reversible data hiding
image watermarking
Contrast Enhancement
intellectual property
Image Processing
smart devices
Resiliency
visualization
digital images
Watermarking
Robustness
policy-based governance
composability
pubcrawl
biblio
Forensic Similarity for Digital Images
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
digital images
two-part deep-learning system
three-layer neural network
similarity network
multimedia forensics
manipulation parameter
image patches
forgery detection
forensic trace
forensic similarity decision
forensic similarity approach
editing operation
digital image forensics approach
database consistency verification
convolutional neural network-based feature extractor
camera model
deep learning
Forgery
information forensics
Image forensics
Cameras
Forensics
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
feature extraction
Training
learning (artificial intelligence)
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 5:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 4:50pm
Knight’s Tour Matrix
Signal processing algorithms
signal processing
Resiliency
pubcrawl
Partitioning algorithms
n-neighbourhood addition
n-neighborhood addition
Matrix converters
matrix algebra
KT matrix
Knight’s Tour Problem (KTP)
composability
Knight's Tour Problem
knight tour matrix
Image Processing
image encryption
encryption algorithm
encryption
efficient encryption
digital images
cyber physical systems
Cryptography
cover images
biblio
Variable load image steganography using multiple edge detection and minimum error replacement method
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
MER method
visual qualities
variable load image steganography
Variable embedding ratio
Steganography
security
Scalability
Resiliency
resilience
pubcrawl
PSNR
multiple edge detection
minimum error replacement method
Minimum error replacement
Metrics
canny operator
Image edge detection
Image coding
human visual system
human eyes
embedding ratio
edge pixels
edge detection
digital images
Data mining
data hiding capacity
Cryptography
Conferences
composability
biblio
Source Device Attribution of Thermal Images Captured with Handheld IR Cameras
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
low-cost handheld thermal camera
thermal imaging devices
Temperature measurement
source device attribution method
source camera
Radiometry
radiometric data
pubcrawl
pocket-size thermal cameras
noise reduction
Metrics
attribution
infrared imaging
Human behavior
handheld IR cameras
Fingerprint recognition
digital images
digital forensics literature
Correlation
composability
Cameras
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
1
2
3
next ›
last »