Results 91 to 100 of about 42,975 (207)

DeepMark Benchmark: Redefining Audio Watermarking Robustness

open access: yesIEEE Access
This paper introduces DeepMark Benchmark, a comprehensive and extensible framework for evaluating the robustness of audio watermarking algorithms. The benchmark enables systematic evaluation of watermarking methods against a diverse range of attacks ...
Slavko Kovacevic   +4 more
doaj   +1 more source

Beyond CUDOS and DECAY: Mapping Research Norms With an Institutional Logics Wheel

open access: yesEuropean Journal of Education, Volume 61, Issue 2, June 2026.
ABSTRACT The normative landscape of academic research is increasingly fragmented. Classical CUDOS norms and counternorms coexist across profession, market, corporation, state and community logics, yet existing scholarship rarely explains how these norms are patterned, how they interact, or how tensions between them are mediated. This conceptual article
Yuzhuo Cai, Bruce Macfarlane
wiley   +1 more source

Terahertz Encryption With a Polarization‐Sensitive Metasurface

open access: yesNanophotonics, Volume 15, Issue 9, 13 May 2026.
We propose a dual‐functional terahertz encryption metasurface that enables independent information retrieval in both the near field and the far field within a single device. In the near field, polarization‐selective amplitude modulation reveals textual patterns, whereas in the far field, phase engineering encodes multiple digital data in focal‐spot ...
Yixuan He   +4 more
wiley   +1 more source

Watermarking Algorithms for 3D NURBS Graphic Data

open access: yesEURASIP Journal on Advances in Signal Processing, 2004
Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS) graphic data are proposed: one is appropriate for the steganography, and the other for watermarking.
Jae Jun Lee, Nam Ik Cho, Sang Uk Lee
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Plasticity in plant hydraulic traits: An evaluation of a common‐taxa experiment across a climatic gradient in the Western U.S.

open access: yesPLANTS, PEOPLE, PLANET, Volume 8, Issue 3, Page 892-906, May 2026.
Due to climate change, plants are experiencing both prolonged drought events and increasingly variable water availability, prompting the need for better understanding of potential impacts on plant performance, as well as the identification of low‐water‐use plants.
Amelia Keyser‐Gibson   +8 more
wiley   +1 more source

Modified kernels-alternated error diffusion multipurpose watermarking algorithm for halftone images

open access: yesTongxin xuebao, 2008
A modified kernels-alternated error diffusion(KAEDF) multipurpose watermarking algorithm for halftone images was presented for copyright protection.Firstly,a modified KAEDF(MKAEDF) algorithm for invisible watermarking was developed,which achieved ...
NI Jiang-qun1   +3 more
doaj   +2 more sources

A game-theoretic architecture for visible watermarking system of ACOCOA (adaptive content and contrast aware) technique

open access: yesEURASIP Journal on Advances in Signal Processing, 2011
Digital watermarking techniques have been developed to protect the intellectual property. A digital watermarking system is basically judged based on two characteristics: security robustness and image quality.
Tsai Min-Jen, Liu Jung
doaj  

Medical Image Watermarking in Sub-block Three-dimensional Discrete Cosine Transform Domain [PDF]

open access: yesInternational Journal Bioautomation, 2016
Digital watermarking can be applied to protection of medical images privacy, hiding of patient's diagnosis information and so on. In order to improve the ability of resisting geometric attacks, a new watermarking algorithm for medical volume data in sub ...
Baoru Han, Jingbing Li
doaj  

A Novel Secure and Robust Image Watermarking Method Based on Decorrelation of Channels, Singular Vectors, and Values

open access: yesAdvances in Electrical and Computer Engineering, 2017
A novel secure and robust image watermarking technique for color images is presented in this paper. Besides robustness and imperceptibility (which are the most important requisites of any watermarking scheme), there are two other challenges a good ...
IMRAN, M., HARVEY, B. A.
doaj   +1 more source

Home - About - Disclaimer - Privacy