Results 51 to 60 of about 42,393 (181)

Robust Object-Based Watermarking Using SURF Feature Matching and DFT Domain [PDF]

open access: yes, 2013
In this paper we propose a robust object-based watermarking method, in which the watermark is embedded into the middle frequencies band of the Discrete Fourier Transform (DFT) magnitude of the selected object region, altogether with the Speeded Up Robust
Cedillo-Hernandez, M.   +3 more
core   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Practical Challenges for Digital Watermarking Applications

open access: yesEURASIP Journal on Advances in Signal Processing, 2002
The field of digital watermarking has recently seen numerous articles covering novel techniques, theoretical studies, attacks, and analysis. In this paper, we focus on an emerging application to highlight practical challenges for digital watermarking ...
Sharma Ravi K, Decker Steve
doaj   +1 more source

Image Watermarking pada Citra Medis menggunakan Compressive Sensing berbasis Stationary Wavelet Transform

open access: yesJurnal Elkomika, 2020
ABSTRAK Watermarking pada citra medis dilakukan untuk melindungi hak kepemilikan dan keaslian sebuah citra medis. Proses embedding dan extraction dirancang menggunakan metode Stationary Wavelet Transform (SWT) dan Statistical Mean Manipulation (SMM ...
YASQI HAFIZHANA   +3 more
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Statistical Image Watermark Algorithm for FAPHFMs Domain Based on BKF–Rayleigh Distribution

open access: yesMathematics, 2023
In the field of image watermarking, imperceptibility, robustness, and watermarking capacity are key indicators for evaluating the performance of watermarking techniques.
Siyu Yang, Ansheng Deng, Hui Cui
doaj   +1 more source

Legal and ethical considerations around the use of existing illustrations to generate new illustrations in the anatomical sciences

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 289-300, March 2025.
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall   +7 more
wiley   +1 more source

Watermarking cryptographic capabilities [PDF]

open access: yesProceedings of the forty-eighth annual ACM symposium on Theory of Computing, 2016
Summary: A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the program. In this work, we study the problem of watermarking various cryptographic programs such as pseudorandom function (PRF) evaluation ...
Aloni Cohen   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy