Results 51 to 60 of about 23,063 (201)

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Quantum Image Watermarking Algorithm Based on Haar Wavelet Transform

open access: yesIEEE Access, 2019
In this paper, a novel frequency domain quantum watermarking scheme is proposed based on the Flexible Representation of Quantum Images, which can embed a 2n1 × 2n1 binary watermark image into a 2n × 2n grayscale carrier image.
Wen-Wen Hu   +3 more
doaj   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform

open access: yesAlgorithms, 2017
Currently, most digital image watermarking schemes are affected by geometric attacks like rotation, scaling, and translation (RST). In the watermark embedding process, a robust watermarking scheme is proposed against RST attacks.
Yunpeng Zhang, Chengyou Wang, Xiao Zhou
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Hidden digital watermarks in images [PDF]

open access: yesIEEE Transactions on Image Processing, 1999
In this paper, an image authentication technique by embedding digital "watermarks" into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark embedding is a potential method to discourage unauthorized copying or attest the origin of the images. In our approach,
Hsu, Chion-Ting, Wu, Ja-Ling
openaire   +3 more sources

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

An imperceptible spatial domain color image watermarking scheme

open access: yesJournal of King Saud University: Computer and Information Sciences, 2019
The paper proposes a novel scheme for color image watermarking. Spatial domain techniques are used here for embedding the watermark information to generate high quality watermarked image.
Jobin Abraham, Varghese Paul
doaj   +1 more source

Legal and ethical considerations around the use of existing illustrations to generate new illustrations in the anatomical sciences

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 289-300, March 2025.
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall   +7 more
wiley   +1 more source

HDR Image Watermarking [PDF]

open access: yes, 2016
In this Chapter we survey available solutions for HDR image watermarking. First, we briefly discuss watermarking in general terms, with particular emphasis on its requirements that primarily include security, robustness, imperceptibility, capacity and the availability of the original image during recovery.
GUERRINI, Fabrizio   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy