Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (488)

Search Parameters:
Keywords = reversible embedding

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
7 pages, 1025 KB  
Proceeding Paper
A Novel Pattern-Based Dual-Image Reversible Data Hiding Scheme
by Chin-Feng Lee and Yu-Yun Yeh
Eng. Proc. 2025, 120(1), 45; https://doi.org/10.3390/engproc2025120045 - 4 Feb 2026
Viewed by 141
Abstract
We developed a novel pattern-based dual-image reversible data hiding scheme utilizing vertical bars and bitten square blocks to improve data capacity, security, embedding efficiency, and visual quality. By embedding secret messages into two grayscale images that closely match the original, the approach significantly [...] Read more.
We developed a novel pattern-based dual-image reversible data hiding scheme utilizing vertical bars and bitten square blocks to improve data capacity, security, embedding efficiency, and visual quality. By embedding secret messages into two grayscale images that closely match the original, the approach significantly lowers the risk of detection by unauthorized parties. The technique includes reference matrix construction, position-based embedding, and perfect message extraction and image recovery. Experimental results demonstrate that the pattern-based method achieves a superior balance between payload and visual quality, making it well-suited for secure and high-performance applications. Full article
(This article belongs to the Proceedings of 8th International Conference on Knowledge Innovation and Invention)
Show Figures

Figure 1

65 pages, 4595 KB  
Article
Dual-Leverage Effects of Embeddedness and Emission Costs on ESCO Financing: Engineering-Driven Design and Dynamic Decision-Making in Low-Carbon Supply Chains
by Liurui Deng, Lingling Jiang and Shunli Gan
Mathematics 2026, 14(3), 522; https://doi.org/10.3390/math14030522 - 1 Feb 2026
Viewed by 277
Abstract
Against the backdrop of carbon quota trading policies and Energy Performance Contracting (EPC), Energy Service Companies (ESCOs) engage in supply chain emission reduction via embedded low-carbon services. However, the impact mechanism of their financing mode selection on emission reduction efficiency and economic benefits [...] Read more.
Against the backdrop of carbon quota trading policies and Energy Performance Contracting (EPC), Energy Service Companies (ESCOs) engage in supply chain emission reduction via embedded low-carbon services. However, the impact mechanism of their financing mode selection on emission reduction efficiency and economic benefits has not been fully revealed, and there is a lack of support from a systematic theoretical and engineering design framework. Therefore, this study innovatively constructs a multi-agent Stackelberg game model with bank financing, green bond financing, and internal factoring financing. We incorporate the embedding degree, emission reduction cost coefficient, and financing mode selection into a unified analysis framework. The research findings are as follows: (1) There is a significant positive linear relationship between supply chain profit and the embedding degree. In contrast, the profit of ESCOs shows an inverted “U-shaped” change trend. Moreover, there is a sustainable cooperation threshold for each of the three financing modes. (2) Green bond financing can significantly increase the overall emission reduction rate of the industrial supply chain in high-embedding-degree scenarios. However, due to emission reduction investment cost pressure, ESCOs tend to choose bank financing. (3) The dynamic change of the emission reduction investment cost coefficient will trigger a reversal effect on the financing preferences of the supply chain and ESCOs. This study unveils the internal mechanism of multi-party decision-making in the low-carbon industrial supply chain and is supported by cross-country institutional evidence and comparative case-based analysis, providing a scientific basis and engineering design guidance for optimizing ESCO financing strategies, crafting incentive contracts, and enhancing government subsidy policies. Full article
(This article belongs to the Special Issue Modeling and Optimization in Supply Chain Management)
Show Figures

Figure 1

29 pages, 2647 KB  
Article
A Unified Reversible Data Hiding Framework for Block-Scrambling Encryption-then-Compression Systems
by Ruifeng Li and Masaaki Fujiyoshi
Information 2026, 17(2), 118; https://doi.org/10.3390/info17020118 - 26 Jan 2026
Cited by 1 | Viewed by 237
Abstract
Encryption-then-compression (EtC) based on block scrambling enables privacy-preserving image sharing while maintaining compatibility with standard image codecs, yet it disrupts the spatial correlations and synchronization cues required by conventional reversible data hiding (RDH). This difficulty is further amplified in grayscale-based EtC pipelines, where [...] Read more.
Encryption-then-compression (EtC) based on block scrambling enables privacy-preserving image sharing while maintaining compatibility with standard image codecs, yet it disrupts the spatial correlations and synchronization cues required by conventional reversible data hiding (RDH). This difficulty is further amplified in grayscale-based EtC pipelines, where RGB-to-YCbCr conversion and component serialization introduce representation shifts and non-bijective rounding/clamping effects, complicating reliable embedding and extraction. This paper presents a unified RDH framework compatible with both RGB-based and grayscale-based block-scrambling EtC systems, without altering the underlying encryption procedures. The core idea is to restore embedding and extraction synchronization directly in the encrypted domain using two encryption-invariant cues: diagonal pixel absolute difference (DPAD) and an encryption-invariant synchronization index (EISI), together with domain-consistent handling of the grayscale conversion pipeline. Experimental results on standard datasets demonstrate perfect reversibility and stable embedding performance under the evaluated settings, with negligible impact on lossless compressibility. We further observe that the proposed embedding can increase statistical dispersion within encrypted blocks; although not designed as a security enhancement, this effect degrades the performance of representative texture-based analyses in the considered ciphertext-only setting. Full article
(This article belongs to the Section Information Security and Privacy)
Show Figures

Figure 1

15 pages, 6910 KB  
Article
A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding
by Tao Liu, Yongjie Wang, Xuehu Yan, Yanlin Huo and Canju Lu
Mathematics 2026, 14(3), 405; https://doi.org/10.3390/math14030405 - 23 Jan 2026
Viewed by 272
Abstract
Visual secret sharing (VSS) schemes can enhance the security of image transmission over networks. Conventional VSS schemes often generate meaningless shares, which can raise suspicion among potential attackers. To address this issue, this paper proposes a novel VSS scheme that integrates information hiding [...] Read more.
Visual secret sharing (VSS) schemes can enhance the security of image transmission over networks. Conventional VSS schemes often generate meaningless shares, which can raise suspicion among potential attackers. To address this issue, this paper proposes a novel VSS scheme that integrates information hiding techniques with quick response (QR) codes to generate meaningful shares. The first n1 shares are encoded as standard QR codes, while the n-th share is embedded into a grayscale carrier image using a reversible information hiding method, ensuring the carrier remains visually meaningful. During transmission, the n1 QR codes and the hidden image are distributed. At the receiver end, the hidden n-th share is extracted losslessly from the carrier image using the n1 QR codes, and the original secret image is perfectly reconstructed by bitwise XORing all n shares. Experimental results demonstrate the feasibility, security, and visual quality of the proposed scheme. Full article
Show Figures

Figure 1

18 pages, 2210 KB  
Article
SPINET-KSP: A Multi-Modal LLM-Graph Foundation Model for Contextual Prediction of Kinase-Substrate-Phosphatase Triads
by Michael Olaolu Arowolo, Marian Emmanuel Okon, Davis Austria, Muhammad Azam and Sulaiman Olaniyi Abdulsalam
Kinases Phosphatases 2026, 4(1), 3; https://doi.org/10.3390/kinasesphosphatases4010003 - 22 Jan 2026
Viewed by 249
Abstract
Reversible protein phosphorylation is an important regulatory mechanism in cellular signalling and disease, regulated by the opposing actions of kinases and phosphatases. Modern computer methods predict kinase–substrate or phosphatase–substrate interactions in isolation and lack specificity for biological conditions, neglecting triadic regulation. We present [...] Read more.
Reversible protein phosphorylation is an important regulatory mechanism in cellular signalling and disease, regulated by the opposing actions of kinases and phosphatases. Modern computer methods predict kinase–substrate or phosphatase–substrate interactions in isolation and lack specificity for biological conditions, neglecting triadic regulation. We present SPINET-KSP, a multi-modal LLM–Graph foundation model engineered for the prediction of kinase–substrate–phosphatase (KSP) triads with contextual awareness. SPINET-KSP integrates high-confidence interactomes (SIGNOR, BioGRID, STRING), structural contacts obtained from AlphaFold3, ESM-3 sequence embeddings, and a 512-dimensional cell-state manifold with 1612 quantitative phosphoproteomic conditions. A heterogeneous KSP graph is examined utilising a cross-attention Graphormer with Reversible Triad Attention to mimic kinase–phosphatase antagonism. SPINET-KSP, pre-trained on 3.41 million validated phospho-sites utilising masked phosphorylation modelling and contrastive cell-state learning, achieves an AUROC of 0.852 for kinase-family classification (sensitivity 0.821, specificity 0.834, MCC 0.655) and a Pearson correlation coefficient of 0.712 for phospho-occupancy prediction. In distinct 2025 mass spectrometry datasets, it identifies 72% of acknowledged cancer-resistance triads within the top 10 rankings and uncovers 247 supplementary triads validated using orthogonal proteomics. SPINET-KSP is the first foundational model for simulating context-dependent reversible phosphorylation, enabling the targeting of dysregulated kinase-phosphatase pathways in diseases. Full article
Show Figures

Figure 1

19 pages, 14454 KB  
Article
Primordial Black Holes and Instantons: Shadow of an Extra Dimension
by Reinoud Jan Slagter
Universe 2026, 12(1), 26; https://doi.org/10.3390/universe12010026 - 16 Jan 2026
Viewed by 319
Abstract
We investigated an exact solution in a conformal invariant Randall-Sundrum 5D warped brane world model on a time dependent Kerr-like spacetime. The singular points are determined by a quintic polynomial in the complex plane and fulfills Cauchy’s theorem on holomorphic functions. The solution, [...] Read more.
We investigated an exact solution in a conformal invariant Randall-Sundrum 5D warped brane world model on a time dependent Kerr-like spacetime. The singular points are determined by a quintic polynomial in the complex plane and fulfills Cauchy’s theorem on holomorphic functions. The solution, which is determined by a first-degree differential equation, shows many similarities with an instanton. In order to describe the quantum mechanical aspects of the black hole solution, we apply the antipodal boundary condition. The solution is invariant under time reversal and also valid in Riemannian space. Moreover, CPT invariance in maintained. The vacuum instanton solution follows from the 5D as well as the effective 4D brane equations, only when we allow the contribution of the projected 5D Weyl tensor on the brane (the KK-‘particles’). The topology of the effective 4D space of the brane is the projective RP3 (elliptic space) by identifying antipodal points on S3. The 5D is completed by applying the Klein bottle embedding and the Z2 symmetry of the RS model. This model fits very well with the description of the Hawking radiation, which remains pure. We have also indicated a possible way to include fermions. Our 5D space admits a double cover of S3 and after fibering to the S2, we obtain the effective black hole horizon. The connection with the icosahedron discrete symmetry group is investigated. It seem that Bekenstein’s conjecture that the area of a black hole is quantized, could be applied to our model. Full article
(This article belongs to the Section Foundations of Quantum Mechanics and Quantum Gravity)
Show Figures

Figure 1

15 pages, 1607 KB  
Article
Using Steganography and Artificial Neural Network for Data Forensic Validation and Counter Image Deepfakes
by Matimu Caswell Nkuna, Ebenezer Esenogho and Ahmed Ali
Computers 2026, 15(1), 61; https://doi.org/10.3390/computers15010061 - 15 Jan 2026
Viewed by 407
Abstract
The merging of the Internet of Things (IoT) and Artificial Intelligence (AI) advances has intensified challenges related to data authenticity and security. These advancements necessitate a multi-layered security approach to ensure the security, reliability, and integrity of critical infrastructure and intelligent surveillance systems. [...] Read more.
The merging of the Internet of Things (IoT) and Artificial Intelligence (AI) advances has intensified challenges related to data authenticity and security. These advancements necessitate a multi-layered security approach to ensure the security, reliability, and integrity of critical infrastructure and intelligent surveillance systems. This paper proposes a two-layered security approach that combines a discrete cosine transform least significant bit 2 (DCT-LSB-2) with artificial neural networks (ANNs) for data forensic validation and mitigating deepfakes. The proposed model encodes validation codes within the LSBs of cover images captured by an IoT camera on the sender side, leveraging the DCT approach to enhance the resilience against steganalysis. On the receiver side, a reverse DCT-LSB-2 process decodes the embedded validation code, which is subjected to authenticity verification by a pre-trained ANN model. The ANN validates the integrity of the decoded code and ensures that only device-originated, untampered images are accepted. The proposed framework achieved an average SSIM of 0.9927 across the entire investigated embedding capacity, ranging from 0 to 1.988 bpp. DCT-LSB-2 showed a stable Peak Signal-to-Noise Ratio (average 42.44 dB) under various evaluated payloads ranging from 0 to 100 kB. The proposed model achieved a resilient and robust multi-layered data forensic validation system. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Graphical abstract

30 pages, 8453 KB  
Article
PBZGNet: A Novel Defect Detection Network for Substation Equipment Based on Gradual Parallel Branch Architecture
by Mintao Hu, Yang Zhuang, Jiahao Wang, Yaoyi Hu, Desheng Sun, Dawei Xu and Yongjie Zhai
Sensors 2026, 26(1), 300; https://doi.org/10.3390/s26010300 - 2 Jan 2026
Viewed by 568
Abstract
As power systems expand and grow smarter, the safe and steady operation of substation equipment has become a prerequisite for grid reliability. In cluttered substation scenes, however, existing deep learning detectors still struggle with small targets, multi-scale feature fusion, and precise localization. To [...] Read more.
As power systems expand and grow smarter, the safe and steady operation of substation equipment has become a prerequisite for grid reliability. In cluttered substation scenes, however, existing deep learning detectors still struggle with small targets, multi-scale feature fusion, and precise localization. To overcome these limitations, we introduce PBZGNet, a defect-detection network that couples a gradual parallel-branch backbone, a zoom-fusion neck, and a global channel-recalibration module. First, BiCoreNet is embedded in the feature extractor: dual-core parallel paths, reversible residual links, and channel recalibration cooperate to mine fault-sensitive cues. Second, cross-scale ZFusion and Concat-CBFuse are dynamically merged so that no scale loses information; a hierarchical composite feature pyramid is then formed, strengthening the representation of both complex objects and tiny flaws. Third, an attention-guided decoupled detection head (ADHead) refines responses to obscured and minute defect patterns. Finally, within the Generalized Focal Loss framework, a quality rating scheme suppresses background interference while distribution regression sharpens the localization of small targets. Across all scales, PBZGNet clearly outperforms YOLOv11. Its lightweight variant, PBZGNet-n, attains 83.9% mAP@50 with only 2.91 M parameters and 7.7 GFLOPs—9.3% above YOLOv11-n. The full PBZGNet surpasses the current best substation model, YOLO-SD, by 7.3% mAP@50, setting a new state of the art (SOTA). Full article
(This article belongs to the Special Issue Deep Learning Based Intelligent Fault Diagnosis)
Show Figures

Figure 1

24 pages, 3847 KB  
Article
Seismic Failure Mechanism Shift in RC Buildings Revealed by NDT-Supported, Field-Calibrated BIM-Based Models
by Mehmet Esen Eren and Cenk Fenerli
Appl. Sci. 2026, 16(1), 455; https://doi.org/10.3390/app16010455 - 1 Jan 2026
Viewed by 414
Abstract
This study proposes a field-calibrated, NDT-integrated BIM modeling framework to improve the reliability of post-earthquake assessment for reinforced concrete (RC) buildings. The approach combines destructive and nondestructive testing (NDT) data—including core drilling, Schmidt hammer, ultrasonic pulse velocity (UPV), and Windsor probe—through a site-specific [...] Read more.
This study proposes a field-calibrated, NDT-integrated BIM modeling framework to improve the reliability of post-earthquake assessment for reinforced concrete (RC) buildings. The approach combines destructive and nondestructive testing (NDT) data—including core drilling, Schmidt hammer, ultrasonic pulse velocity (UPV), and Windsor probe—through a site-specific WinSonReb regression model. The calibrated material properties (average compressive strength ≈ 18.6 MPa, CoV > 20%) were embedded into a Building Information Modeling (BIM) environment, producing an as-is, NDT-calibrated BIM model representing a Level-2 static digital twin of the structure. Nonlinear static pushover analyses performed in accordance with TBDY-2018 and ASCE 41-17 showed that the calibrated model exhibits a fundamental period of 0.85 s—approximately 18% longer than the uncalibrated BIM model. This elongation increased displacement demand and caused a shift in performance classification: while the uncalibrated model indicated Life Safety (LS), the calibrated model predicted behavior approaching Collapse Prevention (CP) in the Y direction. Furthermore, calibration reversed the predicted damage hierarchy, from ductile beam hinging to brittle column- and wall-controlled failure near elevator openings, consistent with post-event observations from the 2023 Kahramanmaraş earthquakes. These results demonstrate that integrating field-calibrated NDT data into BIM-based seismic models fundamentally alters both strength estimation and failure-mechanism prediction, reducing epistemic uncertainty and providing a more conservative basis for retrofit prioritization. Although demonstrated on a single case study, the proposed workflow offers a realistic and scalable pathway for NDT-supported seismic performance assessment of existing RC buildings. Full article
Show Figures

Figure 1

19 pages, 4681 KB  
Article
Precision Controllable Reversible Watermarking Algorithm for Oblique Photography 3D Models
by Ruitao Qu, Liming Zhang, Zhaoyang Hou and Mingwang Zhang
Sensors 2026, 26(1), 243; https://doi.org/10.3390/s26010243 - 30 Dec 2025
Viewed by 294
Abstract
Most oblique photography 3D model watermarking algorithms only support limited data recovery or fail to restore the original model, falling short of meeting diverse user needs. Consequently, this study introduces a novel reversible watermarking scheme specifically tailored for oblique photographic 3D models, which [...] Read more.
Most oblique photography 3D model watermarking algorithms only support limited data recovery or fail to restore the original model, falling short of meeting diverse user needs. Consequently, this study introduces a novel reversible watermarking scheme specifically tailored for oblique photographic 3D models, which is designed to adjust the accuracy of model recovery freely. Firstly, considering the global stability of the oblique photography 3D model, the feature points are extracted by utilizing the mean angle between vertex normals. Secondly, a mapping is established based on the ratio of distances between feature points and non-feature points. Then, the vertices are grouped, with each group consisting of one feature point and several non-feature points. Finally, by using the feature point as the origin, a spherical coordinate system is constructed for each group. The watermark information is embedded by modifying the radius in the spherical coordinate system. In the process of extracting watermarks, watermarks can be extracted from different radius ranges, thereby achieving a controllable error in model recovery. Experimental results demonstrate that this approach exhibits significant advantages in reversibility and controllable restoration accuracy, achieving error-free extraction under both translation and rotation attacks. Compared to existing algorithms, it achieves average improvements of 0.121 and 0.298 under cropping and simplification attacks, respectively, showcasing enhanced robustness. This enables it to meet better diverse user demands for watermarking and model restoration in oblique photography 3D models. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

21 pages, 5078 KB  
Article
Parallelizable and Lightweight Reversible Data Hiding Framework for Encryption-Then-Compression Systems
by Ruifeng Li and Masaaki Fujiyoshi
Electronics 2026, 15(1), 136; https://doi.org/10.3390/electronics15010136 - 28 Dec 2025
Cited by 1 | Viewed by 270
Abstract
Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cross-channel correspondence is disrupted, and block-wise encryption operations (permutation, rotation, and brightness inversion) break embedding synchronization. [...] Read more.
Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cross-channel correspondence is disrupted, and block-wise encryption operations (permutation, rotation, and brightness inversion) break embedding synchronization. This paper presents a block-independent and lightweight RDH framework for such component-serialized grayscale EtC systems. The framework combines diagonal pixel absolute difference (DPAD)-based embedding with an encryption-invariant synchronization index (EISI), enabling reliable encrypted-domain extraction and self-synchronization under component serialization and block permutation, without auxiliary side information or any modification to the underlying EtC pipeline. All operations are performed locally at the block level, making the framework naturally parallelizable when needed. Experiments on standard datasets with diverse texture characteristics demonstrate reliable data extraction and perfect reversibility while preserving the structural properties required for secure encryption and lossless-mode compression. These results indicate that the proposed framework is well-suited to practical EtC deployments where lightweight implementation and block-level independence are essential. Full article
(This article belongs to the Special Issue Advanced Techniques in Real-Time Image Processing)
Show Figures

Figure 1

32 pages, 11476 KB  
Article
Secure and Reversible Thumbnail-Preserving Encryption for Point Clouds via Spatial Subdivision and Chaotic Perturbation
by Tz-Yi You, Yu-Ting Huang, Ting-Yu Hsiao, Yung-Wen Cheng, Yuan-Yu Tsai and Ching-Ta Lu
Mathematics 2026, 14(1), 80; https://doi.org/10.3390/math14010080 - 25 Dec 2025
Viewed by 431
Abstract
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details. While existing TPE techniques primarily target 2D images, effective and reversible TPE for 3D point clouds remains underexplored. This [...] Read more.
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details. While existing TPE techniques primarily target 2D images, effective and reversible TPE for 3D point clouds remains underexplored. This paper proposes a thumbnail-preserving encryption framework specifically designed for point clouds, addressing the challenges arising from irregular spatial structure and viewpoint-dependent visualization. The proposed method integrates perception-guided spatial subdivision with key-dependent chaotic perturbation to obfuscate fine-grained geometric details while intentionally preserving coarse structural information under the TPE threat model. A reversible integer-domain design is further incorporated to enable exact recovery of the original point cloud and support reversible data hiding by exploiting coordinate-level redundancy. Extensive experiments conducted on diverse point clouds demonstrate that the proposed framework maintains stable thumbnail fidelity across different viewing conditions, achieving high structural similarity, while guaranteeing perfect reversibility with zero reconstruction error. In contrast to existing image-based TPE frameworks, the proposed method extends the TPE paradigm to 3D point clouds by providing full reversibility, auxiliary message embedding support, and stable thumbnail fidelity under varying viewing conditions. Quantitative results demonstrate that thumbnail-level structural similarity is well preserved, while the original point clouds are exactly recovered after decryption. Full article
(This article belongs to the Special Issue Information Security and Image Processing)
Show Figures

Figure 1

22 pages, 1099 KB  
Article
Cross-Attention Diffusion Model for Semantic-Aware Short-Term Urban OD Flow Prediction
by Hongxiang Li, Zhiming Gui and Zhenji Gao
ISPRS Int. J. Geo-Inf. 2026, 15(1), 2; https://doi.org/10.3390/ijgi15010002 - 19 Dec 2025
Viewed by 792
Abstract
Origin–destination (OD) flow prediction is fundamental to intelligent transportation systems, yet existing diffusion-based models face two critical limitations. First, they inadequately exploit spatial semantics, focusing primarily on temporal dependencies or topological correlations while neglecting urban functional heterogeneity encoded in Points of Interest (POIs). [...] Read more.
Origin–destination (OD) flow prediction is fundamental to intelligent transportation systems, yet existing diffusion-based models face two critical limitations. First, they inadequately exploit spatial semantics, focusing primarily on temporal dependencies or topological correlations while neglecting urban functional heterogeneity encoded in Points of Interest (POIs). Second, static embedding fusion cannot dynamically capture semantic importance variations during denoising—particularly during traffic surges in POI-dense areas. To address these gaps, we propose the Cross-Attention Diffusion Model (CADM), a semantically conditioned framework for short-term OD flow forecasting. CADM integrates POI embeddings as spatial semantic priors and employs cross-attention to enable semantic-guided denoising, facilitating dynamic spatiotemporal feature fusion. This design adaptively reweights regional representations throughout reverse diffusion, enhancing the model’s capacity to capture complex mobility patterns. Experiments on real-world datasets demonstrate that CADM achieves balanced performance across multiple metrics. At the 30 min horizon, CADM attains the lowest RMSE of 5.77, outperforming iTransformer by 1.9%, while maintaining competitive performance at the 15 min horizon. Ablation studies confirm that removing POI features increases prediction errors by 15–20%, validating the critical role of semantic conditioning. These findings advance semantic-aware generative modeling for spatiotemporal prediction and provide practical insights for intelligent transportation systems, particularly for newly established transportation hubs or functional zone reconfigurations where semantic understanding is essential. Full article
(This article belongs to the Special Issue Spatial Data Science and Knowledge Discovery)
Show Figures

Figure 1

40 pages, 5487 KB  
Communication
Physics-Informed Temperature Prediction of Lithium-Ion Batteries Using Decomposition-Enhanced LSTM and BiLSTM Models
by Seyed Saeed Madani, Yasmin Shabeer, Michael Fowler, Satyam Panchal, Carlos Ziebert, Hicham Chaoui and François Allard
World Electr. Veh. J. 2026, 17(1), 2; https://doi.org/10.3390/wevj17010002 - 19 Dec 2025
Cited by 1 | Viewed by 959
Abstract
Accurately forecasting the operating temperature of lithium-ion batteries (LIBs) is essential for preventing thermal runaway, extending service life, and ensuring the safe operation of electric vehicles and stationary energy-storage systems. This work introduces a unified, physics-informed, and data-driven temperature-prediction framework that integrates mathematically [...] Read more.
Accurately forecasting the operating temperature of lithium-ion batteries (LIBs) is essential for preventing thermal runaway, extending service life, and ensuring the safe operation of electric vehicles and stationary energy-storage systems. This work introduces a unified, physics-informed, and data-driven temperature-prediction framework that integrates mathematically governed preprocessing, electrothermal decomposition, and sequential deep learning architectures. The methodology systematically applies the governing relations to convert raw temperature measurements into trend, seasonal, and residual components, thereby isolating long-term thermal accumulation, reversible entropy-driven oscillations, and irreversible resistive heating. These physically interpretable signatures serve as structured inputs to machine learning and deep learning models trained on temporally segmented temperature sequences. Among all evaluated predictors, the Bidirectional Long Short-Term Memory (BiLSTM) network achieved the highest prediction fidelity, yielding an RMSE of 0.018 °C, a 35.7% improvement over the conventional Long Short-Term Memory (LSTM) (RMSE = 0.028 °C) due to its ability to simultaneously encode forward and backward temporal dependencies inherent in cyclic electrochemical operation. While CatBoost exhibited the strongest performance among classical regressors (RMSE = 0.022 °C), outperforming Random Forest, Gradient Boosting, Support Vector Regression, XGBoost, and LightGBM, it remained inferior to BiLSTM because it lacks the capacity to represent bidirectional electrothermal dynamics. This performance hierarchy confirms that LIB thermal evolution is not dictated solely by historical load sequences; it also depends on forthcoming cycling patterns and entropic interactions, which unidirectional and memoryless models cannot capture. The resulting hybrid physics-data-driven framework provides a reliable surrogate for real-time LIB thermal estimation and can be directly embedded within BMS to enable proactive intervention strategies such as predictive cooling activation, current derating, and early detection of hazardous thermal conditions. By coupling physics-based decomposition with deep sequential learning, this study establishes a validated foundation for next-generation LIB thermal-management platforms and identifies a clear trajectory for future work extending the methodology to module- and pack-level systems suitable for industrial deployment. Full article
(This article belongs to the Section Vehicle Control and Management)
Show Figures

Figure 1

27 pages, 8990 KB  
Article
A Non-Embedding Watermarking Framework Using MSB-Driven Reference Mapping for Distortion-Free Medical Image Authentication
by Osama Ouda
Electronics 2026, 15(1), 7; https://doi.org/10.3390/electronics15010007 - 19 Dec 2025
Viewed by 404
Abstract
Ensuring the integrity of medical images is essential to securing clinical workflows, telemedicine platforms, and healthcare IoT environments. Existing watermarking and reversible data-hiding approaches often modify pixel intensities, reducing diagnostic fidelity, introducing embedding constraints, or causing instability under compression and format conversion. This [...] Read more.
Ensuring the integrity of medical images is essential to securing clinical workflows, telemedicine platforms, and healthcare IoT environments. Existing watermarking and reversible data-hiding approaches often modify pixel intensities, reducing diagnostic fidelity, introducing embedding constraints, or causing instability under compression and format conversion. This work proposes a distortion-free, non-embedding authentication framework that leverages the inherent stability of the most significant bit (MSB) patterns in the Non-Region of Interest (NROI) to construct a secure and tamper-sensitive reference for the diagnostic Region of Interest (ROI). The ROI is partitioned into fixed blocks, each producing a 256-bit SHA-256 signature. Instead of embedding this signature, each hash bit is mapped to an NROI pixel whose MSB matches the corresponding bit value, and only the encrypted coordinates of these pixels are stored externally in a secure database. During verification, hashes are recomputed and compared bit-by-bit with the MSB sequence extracted from the referenced NROI coordinates, enabling precise block-level tamper localization without modifying the image. Extensive experiments conducted on MRI (OASIS), X-ray (ChestX-ray14), and CT (CT-ORG) datasets demonstrate the following: (i) perfect zero-distortion fidelity; (ii) stable and deterministic MSB-class mapping with abundant coordinate diversity; (iii) 100% detection of intentional ROI tampering with no false positives across the six clinically relevant manipulation types; and (iv) robustness to common benign Non-ROI operations. The results show that the proposed scheme offers a practical, secure, and computationally lightweight solution for medical image integrity verification in PACS systems, cloud-based archives, and healthcare IoT applications, while avoiding the limitations of embedding-based methods. Full article
(This article belongs to the Special Issue Advances in Cryptography and Image Encryption)
Show Figures

Figure 1

Back to TopTop