Results 71 to 80 of about 22,106 (166)
Forensic detection of medical image manipulation using PACS and DICOM artifacts
Abstract With the digitization of medical information, illegal activities such as medical crimes and insurance fraud through tampering have increased. Medical images are particularly vulnerable due to their nature as soft copies and their transmission over networks.
Sojung Oh +5 more
wiley +1 more source
Artificial intelligence in genitourinary pathology
Artificial intelligence (AI) is now practical in genitourinary pathology. We synthesize evidence and economics into a two‐part playbook: VALIDATED (governance) and ORCHESTRATE (operations), to safely deploy AI tools across prostate, bladder, kidney and testis.
Ankush U Patel +2 more
wiley +1 more source
Aspects of a Watermark Solution [PDF]
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU +2 more
core
Digital Watermarking Techniques [PDF]
More the development of the multimedia, more the digitalization, the more is the access to internet. This fast rate of enhancement gives a sense of protection and authentication. Digital watermarking technology provides a strong solution to insecurity created by digitalization.
Prabhjot Kaur Chahal +2 more
openaire +1 more source
Comic Image Detection Based on MA‐YOLOv8s
In recent years, the plagiarism of comic images has become increasingly prevalent, drawing growing attention to copyright protection within the comic industry. To address the limitations of existing object detection models in capturing the distinctive visual characteristics of comic images, this paper proposes an optimized detection framework, MANGA ...
Hong Xin +4 more
wiley +1 more source
Watermarking-Based Digital Audio Data Authentication
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing.
Dittmann Jana, Steinebach Martin
doaj +1 more source
Review Articles, Generative AI and the Remaking of Scholarly Infrastructure
Learned Publishing, Volume 39, Issue 2, April 2026.
Serhii Nazarovets, Yana Suchikova
wiley +1 more source
Watermarking Techniques for Protecting Intellectual Properties in aDigital Environment
The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast ...
T. K. Aroge, F. O. Isinkaye
doaj
A Review of Text Watermarking: Theory, Methods, and Applications
During the recent years, the issue of preserving the integrity of digital text has become a focus of interest in the transmission of online content on the Internet. Watermarking has a useful tool in the protection of digital text content as it solves the
Nurul Shamimi Kamaruddin +3 more
doaj +1 more source
Text information hiding and recovery via wavelet digital watermarking method. [PDF]
Xiaohui Z.
europepmc +1 more source

