Results 61 to 70 of about 22,106 (166)
Robust Watermarking using Hidden Markov Models [PDF]
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars.
Mungale, Mausami
core +1 more source
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley +1 more source
Analysis of Digital Image Watermarking Techniques through Hybrid Methods
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,
Mahbuba Begum, Mohammad Shorif Uddin
doaj +1 more source
Prelacrimal Recess‐Pterygoid Window Approach to the Sphenoidal Lateral Recess Skull Base Defects
ABSTRACT Objective The objectives of this study are: (1) to evaluate the prelacrimal recess‐pterygoid window approach (PLR‐PWA) for treating cerebrospinal fluid leaks and meningoencephaloceles (CSFLME) in the sphenoidal lateral recess (SLR). (2) To investigate the pneumatization of the SLR and its relationship with surrounding structures, including the
Zhen‐Xiao Huang +7 more
wiley +1 more source
Removable Watermarking Sebagai Pengendalian Terhadap Cyber Crime Pada Audio Digital
Perkembangan teknologi informasi yang pesat menuntut penggunanya untuk lebih berhati-hati seiring semakin meningkatnya cyber crime.Banyak pihak telah mengembangkan berbagai teknik perlindungan data digital, salah satunya adalah watermarking.
Reyhani Lian Putri +2 more
doaj +1 more source
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra +4 more
wiley +1 more source
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley +1 more source
Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and ...
Mayssa Tayachi +5 more
doaj +1 more source
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal +2 more
wiley +1 more source
An Efficient Watermarking Scheme for Medical Data Security With the Aid of Neural Network
Digital watermarking has emerged as major technique for ensuring security for various types of data like medical data, digital copyright protection, transaction tracing and so on.
K. Kalaivani
doaj +1 more source

