Results 51 to 60 of about 42,393 (181)
Robust Object-Based Watermarking Using SURF Feature Matching and DFT Domain [PDF]
In this paper we propose a robust object-based watermarking method, in which the watermark is embedded into the middle frequencies band of the Discrete Fourier Transform (DFT) magnitude of the selected object region, altogether with the Speeded Up Robust
Cedillo-Hernandez, M. +3 more
core +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu +10 more
wiley +1 more source
Practical Challenges for Digital Watermarking Applications
The field of digital watermarking has recently seen numerous articles covering novel techniques, theoretical studies, attacks, and analysis. In this paper, we focus on an emerging application to highlight practical challenges for digital watermarking ...
Sharma Ravi K, Decker Steve
doaj +1 more source
ABSTRAK Watermarking pada citra medis dilakukan untuk melindungi hak kepemilikan dan keaslian sebuah citra medis. Proses embedding dan extraction dirancang menggunakan metode Stationary Wavelet Transform (SWT) dan Statistical Mean Manipulation (SMM ...
YASQI HAFIZHANA +3 more
doaj +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Statistical Image Watermark Algorithm for FAPHFMs Domain Based on BKF–Rayleigh Distribution
In the field of image watermarking, imperceptibility, robustness, and watermarking capacity are key indicators for evaluating the performance of watermarking techniques.
Siyu Yang, Ansheng Deng, Hui Cui
doaj +1 more source
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall +7 more
wiley +1 more source
Watermarking cryptographic capabilities [PDF]
Summary: A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the program. In this work, we study the problem of watermarking various cryptographic programs such as pseudorandom function (PRF) evaluation ...
Aloni Cohen +4 more
openaire +3 more sources

