Results 41 to 50 of about 42,016 (177)

Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic

open access: yes, 2010
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying.
Hsieh, Ming-Shing
core   +3 more sources

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Practical Challenges for Digital Watermarking Applications

open access: yesEURASIP Journal on Advances in Signal Processing, 2002
The field of digital watermarking has recently seen numerous articles covering novel techniques, theoretical studies, attacks, and analysis. In this paper, we focus on an emerging application to highlight practical challenges for digital watermarking ...
Sharma Ravi K, Decker Steve
doaj   +1 more source

Image Watermarking pada Citra Medis menggunakan Compressive Sensing berbasis Stationary Wavelet Transform

open access: yesJurnal Elkomika, 2020
ABSTRAK Watermarking pada citra medis dilakukan untuk melindungi hak kepemilikan dan keaslian sebuah citra medis. Proses embedding dan extraction dirancang menggunakan metode Stationary Wavelet Transform (SWT) dan Statistical Mean Manipulation (SMM ...
YASQI HAFIZHANA   +3 more
doaj   +1 more source

Statistical Image Watermark Algorithm for FAPHFMs Domain Based on BKF–Rayleigh Distribution

open access: yesMathematics, 2023
In the field of image watermarking, imperceptibility, robustness, and watermarking capacity are key indicators for evaluating the performance of watermarking techniques.
Siyu Yang, Ansheng Deng, Hui Cui
doaj   +1 more source

Robust Object-Based Watermarking Using SURF Feature Matching and DFT Domain [PDF]

open access: yes, 2013
In this paper we propose a robust object-based watermarking method, in which the watermark is embedded into the middle frequencies band of the Discrete Fourier Transform (DFT) magnitude of the selected object region, altogether with the Speeded Up Robust
Cedillo-Hernandez, M.   +3 more
core   +1 more source

A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images

open access: yesAdvanced Intelligent Systems, EarlyView.
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked infrared images. The encoder and decoder incorporate preprocessing steps, attention mechanisms, and activation functions suitable for infrared images.
Yu Bai   +4 more
wiley   +1 more source

Legal and ethical considerations around the use of existing illustrations to generate new illustrations in the anatomical sciences

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 289-300, March 2025.
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall   +7 more
wiley   +1 more source

Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges

open access: yesNew Directions for Community Colleges, EarlyView.
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia   +2 more
wiley   +1 more source

Watermarking cryptographic capabilities [PDF]

open access: yesProceedings of the forty-eighth annual ACM symposium on Theory of Computing, 2016
Summary: A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the program. In this work, we study the problem of watermarking various cryptographic programs such as pseudorandom function (PRF) evaluation ...
Aloni Cohen   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy