Results 61 to 70 of about 22,106 (166)

Robust Watermarking using Hidden Markov Models [PDF]

open access: yes, 2011
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars.
Mungale, Mausami
core   +1 more source

Artificial Intelligence in Multimedia Content Generation: A Review of Audio and Video Synthesis Techniques

open access: yesJournal of the Society for Information Display, Volume 34, Issue 2, Page 49-67, February 2026.
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley   +1 more source

Analysis of Digital Image Watermarking Techniques through Hybrid Methods

open access: yesAdvances in Multimedia, 2020
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Prelacrimal Recess‐Pterygoid Window Approach to the Sphenoidal Lateral Recess Skull Base Defects

open access: yesWorld Journal of Otorhinolaryngology - Head and Neck Surgery, Volume 12, Issue 1, Page 66-76, February 2026.
ABSTRACT Objective The objectives of this study are: (1) to evaluate the prelacrimal recess‐pterygoid window approach (PLR‐PWA) for treating cerebrospinal fluid leaks and meningoencephaloceles (CSFLME) in the sphenoidal lateral recess (SLR). (2) To investigate the pneumatization of the SLR and its relationship with surrounding structures, including the
Zhen‐Xiao Huang   +7 more
wiley   +1 more source

Removable Watermarking Sebagai Pengendalian Terhadap Cyber Crime Pada Audio Digital

open access: yesJurnal Elektronika dan Telekomunikasi, 2017
Perkembangan teknologi informasi yang pesat menuntut penggunanya untuk lebih berhati-hati seiring semakin meningkatnya cyber crime.Banyak pihak telah mengembangkan berbagai teknik perlindungan data digital, salah satunya adalah watermarking.
Reyhani Lian Putri   +2 more
doaj   +1 more source

The issues caused by misinformation—How workers and organizations deal with it: A systematic literature review. An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, Volume 77, Issue 1, Page 133-162, January 2026.
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra   +4 more
wiley   +1 more source

A Robust Reversible Watermarking Algorithm Resistant to Geometric Attacks Based on Tchebichef Moments

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley   +1 more source

Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems

open access: yesCryptography, 2020
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and ...
Mayssa Tayachi   +5 more
doaj   +1 more source

A Novel Image Steganographic Method Based on Enhanced PIWT and Modified Optimal Pixel Adjustment Process

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal   +2 more
wiley   +1 more source

An Efficient Watermarking Scheme for Medical Data Security With the Aid of Neural Network

open access: yesBrazilian Archives of Biology and Technology
Digital watermarking has emerged as major technique for ensuring security for various types of data like medical data, digital copyright protection, transaction tracing and so on.
K. Kalaivani
doaj   +1 more source

Home - About - Disclaimer - Privacy