Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Watermarking
biblio
FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples
Submitted by grigby1 on Fri, 03/17/2023 - 12:13pm
finance
reversible watermarking
Position tuples
Ownership protection
Fields
data recovery
Solids
Limiting
relational database security
database
relational databases
Watermarking
Transportation
Robustness
composability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Cybersecurity Providing for Maritime Automatic Identification System
Submitted by aekwall on Fri, 01/20/2023 - 4:13pm
pubcrawl
Watermarking
Transponders
traffic control
security situational awareness
security
Secret key
Resiliency
Reliability
Artificial Intelligence
Protocols
Predictive Metrics
navigation
message authentication code
Gaussian Minimum Shift Keying
fast Fourier transform
composability
biblio
Fostering The Robustness Of White-Box Deep Neural Network Watermarks By Neuron Alignment
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Neural networks
Watermarking
deep learning
Conferences
pubcrawl
Metrics
Resiliency
composability
signal processing
Neurons
Regulation
White Box Security
deep neural network watermark
machine learning security
neuron alignment
biblio
An image steganography approach based on k-least significant bits (k-LSB)
Submitted by grigby1 on Thu, 10/20/2022 - 4:24pm
Steganography
steganography detection
k-LSB
Image Steganography
Entropy filter
Image quality
LSB
digital images
Image resolution
pubcrawl
Image coding
Watermarking
Decoding
composability
Entropy
privacy
Metrics
biblio
High capacity coverless image steganography method based on geometrically robust and chaotic encrypted image moment feature
Submitted by grigby1 on Thu, 10/20/2022 - 4:00pm
feature extraction
pubcrawl
Metrics
Conferences
privacy
composability
chaotic communication
Robustness
Watermarking
Steganography
Harmonic analysis
steganography detection
biblio
Multi Feedback LFSR Based Watermarking of FSM
Submitted by grigby1 on Mon, 10/03/2022 - 12:20pm
Hardware design languages
signal processing
pubcrawl
policy-based governance
resilience
Hardware
composability
intellectual property
Watermarking
ip protection
Resiliency
LFSR
Digital circuits
hardware utilization
Multi-feedback
biblio
Delving in the loss landscape to embed robust watermarks into neural networks
Submitted by grigby1 on Fri, 07/29/2022 - 9:45am
Adaptation models
Training
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Redundancy
Artificial Neural Networks
Shape
Watermarking
Sensitivity
pattern locks
biblio
A Robust and Efficient Numeric Approach for Relational Database Watermarking
Submitted by grigby1 on Fri, 07/15/2022 - 12:45pm
Receivers
Open Access Database
Data owner protection
Copywrite Protection
open access
relational database security
distortion
Watermarking
Robustness
relational databases
Metrics
Decision Making
composability
Resiliency
resilience
Human behavior
pubcrawl
biblio
PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases
Submitted by grigby1 on Fri, 07/15/2022 - 12:43pm
Metrics
zero-distortion
robust
reversible
blind
relational database security
Relational Database
distortion
Watermarking
Resistance
Ciphers
Redundancy
composability
Conferences
Resiliency
resilience
Human behavior
pubcrawl
relational databases
biblio
An Image Watermarking based on Multi-level Authentication for Quick Response Code
Submitted by aekwall on Thu, 07/14/2022 - 4:15pm
codes
QR codes
watermark recovery
tempered image
QR code image
multi-level authentication
digital watermarking
location awareness
scientific computing
Watermarking
cyber-physical systems
Hash functions
Resiliency
pubcrawl
authentication
Software
security
Cryptography
1
2
3
4
5
6
7
8
next ›
last »