Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Steganography
biblio
Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key
Submitted by grigby1 on Fri, 04/14/2023 - 4:02pm
encryption
Organizations
pubcrawl
Metrics
resilience
Scalability
encoding
Artificial Intelligence
visualization
computational complexity
Steganography
chaotic cryptography
Resiliency
Visual Encryption
XOR operator
biblio
An Approach Towards Data Security Based on DCT and Chaotic Map
Submitted by grigby1 on Fri, 04/14/2023 - 4:01pm
Streaming media
discrete cosine transform
chaos theory
Resiliency
chaotic cryptography
Satellites
Steganography
Technological innovation
Robustness
encryption
chaotic communication
data privacy
Cryptography
Scalability
resilience
Metrics
pubcrawl
biblio
Node Protection using Hiding Identity for IPv6 Based Network
Submitted by grigby1 on Fri, 02/24/2023 - 5:31pm
Policy Based Governance
SHA2
OPNET
IP spoofing
logistic map
RSA
Steganography
Power demand
IPv6
traffic control
Receivers
collaboration
network security
Memory management
composability
Computational modeling
Resiliency
resilience
Metrics
pubcrawl
security
biblio
A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme
Submitted by aekwall on Fri, 02/17/2023 - 10:49am
Resiliency
Safe Coding
video sequences
Linear Block Code
Hamming Code
embedding payload
renewable energy sources
Motion pictures
policy-based governance
security
Metrics
pubcrawl
Wireless communication
video recording
Steganography
Human Factors
Software
biblio
Automation Detection of Malware and Stenographical Content using Machine Learning
Submitted by grigby1 on Fri, 02/03/2023 - 5:04pm
machine learning
machine learning algorithms
pubcrawl
Metrics
privacy
composability
Memory management
malware
social networking (online)
Media
Steganography
steganography detection
Logistic Regression Algorithm
biblio
Hiding Sensitive Information in Surveillance Video without Affecting Nefarious Activity Detection
Submitted by grigby1 on Fri, 02/03/2023 - 5:03pm
surveillance
Tunable Q-factor Wavelet Transform (TQWT)
Temporal convolutional network (TCN)
Surveillance video steganography
privacy preservation
activity detection
steganography detection
discrete wavelet transforms
Steganography
feature extraction
Signal processing algorithms
Q-factor
composability
privacy
Metrics
pubcrawl
convolution
biblio
An Edge Detection Based Reversible Data Hiding Scheme
Submitted by grigby1 on Fri, 02/03/2023 - 5:03pm
Image coding
reversible steganography
steganography detection
LSB method
Image quality
IEEE Sections
SSIM
Steganography
edge detection
pubcrawl
Information hiding
Image edge detection
Detectors
composability
privacy
Conferences
Metrics
biblio
An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression
Submitted by grigby1 on Fri, 02/03/2023 - 4:59pm
signal processing
pubcrawl
Metrics
privacy
composability
Manuals
Perturbation methods
social networking (online)
Image coding
Transform coding
Steganography
steganalysis
steganography detection
feature combination
Repetitive Compression
Robust Steganography
biblio
An enhanced Skin-tone Block-map Image Steganography using Integer Wavelet Transforms
Submitted by grigby1 on Fri, 02/03/2023 - 4:59pm
Skin
YCbCr colorspace
skin detection
skin block maps
imperceptibility
blind extraction
steganography detection
Integer Wavelet Transform
digital images
security
Steganography
Image color analysis
Complexity theory
Data mining
composability
privacy
Metrics
pubcrawl
biblio
Improved Steganography Based on Referential Cover and Non-symmetric Embedding
Submitted by grigby1 on Fri, 02/03/2023 - 4:59pm
pubcrawl
Metrics
Conferences
Filtering
privacy
composability
encoding
Steganography
distortion
Cost function
Costs
steganalysis
steganography detection
optimization model
1
2
3
4
5
6
7
8
9
…
next ›
last »