{"id":"https://openalex.org/W4417508735","doi":"https://doi.org/10.1109/tce.2025.3646370","title":"Q-AudioShield: Quantum-Resilient Audio Watermarking and Authentication Framework for Secure CIoT Multimedia Streams","display_name":"Q-AudioShield: Quantum-Resilient Audio Watermarking and Authentication Framework for Secure CIoT Multimedia Streams","publication_year":2025,"publication_date":"2025-12-19","ids":{"openalex":"https://openalex.org/W4417508735","doi":"https://doi.org/10.1109/tce.2025.3646370"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3646370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3646370","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://infoscience.epfl.ch/handle/20.500.14299/257496","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106484204","display_name":"Jing Yang","orcid":"https://orcid.org/0009-0008-0467-5984"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Jing Yang","raw_affiliation_strings":["Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112250026","display_name":"V. S. Govindarajan","orcid":"https://orcid.org/0009-0004-1915-1519"},"institutions":[{"id":"https://openalex.org/I4210106647","display_name":"Expedia Group (United States)","ror":"https://ror.org/01sh85g09","country_code":"US","type":"company","lineage":["https://openalex.org/I4210106647"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Govindarajan","raw_affiliation_strings":["Distribution and Supply Technology, Expedia Group, Seattle, WA, USA","Distribution and Supply Technology, Expedia Group, Seattle, WA, United States"],"affiliations":[{"raw_affiliation_string":"Distribution and Supply Technology, Expedia Group, Seattle, WA, USA","institution_ids":["https://openalex.org/I4210106647"]},{"raw_affiliation_string":"Distribution and Supply Technology, Expedia Group, Seattle, WA, United States","institution_ids":["https://openalex.org/I4210106647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100732302","display_name":"Muhammad Attique Khan","orcid":"https://orcid.org/0000-0001-5723-3858"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Attique Khan","raw_affiliation_strings":["Center of AI, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia","Center of AI, Prince Mohammad bin Fahd University, KSA"],"affiliations":[{"raw_affiliation_string":"Center of AI, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]},{"raw_affiliation_string":"Center of AI, Prince Mohammad bin Fahd University, KSA","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065229553","display_name":"Muhammad Umair Ali","orcid":"https://orcid.org/0000-0002-7326-1813"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Muhammad Umair Ali","raw_affiliation_strings":["Department of Artificial Intelligence and Robotics, Sejong University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Robotics, Sejong University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I28777354"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101789974","display_name":"Zaffar Ahmed Shaikh","orcid":"https://orcid.org/0000-0003-0323-2061"},"institutions":[{"id":"https://openalex.org/I1308893265","display_name":"Shaheed Benazir Bhutto University","ror":"https://ror.org/02zwhz281","country_code":"PK","type":"education","lineage":["https://openalex.org/I1308893265"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zaffar Ahmed Shaikh","raw_affiliation_strings":["Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Pakistan","institution_ids":["https://openalex.org/I1308893265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015599560","display_name":"Jyoti Bhola","orcid":"https://orcid.org/0000-0001-9226-3913"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jyoti Bhola","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India","Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079089116","display_name":"Abdullah Alenezi","orcid":"https://orcid.org/0000-0003-0233-6838"},"institutions":[{"id":"https://openalex.org/I143601524","display_name":"Public Authority for Applied Education and Training","ror":"https://ror.org/024242h31","country_code":"KW","type":"education","lineage":["https://openalex.org/I143601524"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Abdullah Feraih Alenezi","raw_affiliation_strings":["College of Business Studies, The Public Authority for Applied Education and Training, Safat, Kuwait","College of Business Studies, Public Authority for Applied Education and Training, Kuwait"],"affiliations":[{"raw_affiliation_string":"College of Business Studies, The Public Authority for Applied Education and Training, Safat, Kuwait","institution_ids":["https://openalex.org/I143601524"]},{"raw_affiliation_string":"College of Business Studies, Public Authority for Applied Education and Training, Kuwait","institution_ids":["https://openalex.org/I143601524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076085699","display_name":"Jamel Baili","orcid":"https://orcid.org/0000-0001-5564-6114"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Jamel Baili","raw_affiliation_strings":["Department of Computer Engineering, College of Computer Science, King Khalid University, Abha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer Science, King Khalid University, Abha, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003091988","display_name":"Lip Yee Por","orcid":"https://orcid.org/0000-0001-5865-1533"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Lip Yee Por","raw_affiliation_strings":["Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Center of Research for Cyber Security and Network (CSNET), Universiti Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100375645","display_name":"Seung Won Lee","orcid":"https://orcid.org/0000-0001-5632-5208"},"institutions":[{"id":"https://openalex.org/I4210103535","display_name":"Kangbuk Samsung Hospital","ror":"https://ror.org/013e76m06","country_code":"KR","type":"healthcare","lineage":["https://openalex.org/I2250650973","https://openalex.org/I2802194831","https://openalex.org/I4210103535"]},{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seung-Won Lee","raw_affiliation_strings":["Department of Precision Medicine, the Department of Artificial Intelligence, the Department of Metabiohealth, the Personalized Cancer Immunotherapy Research Center, and the Department of Family Medicine, Kangbuk Samsung Hospital, Sungkyunkwan University School of Medicine, Seoul, Republic of Korea","Department of Precision Medicine, Sungkyunkwan University School of Medicine, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Precision Medicine, the Department of Artificial Intelligence, the Department of Metabiohealth, the Personalized Cancer Immunotherapy Research Center, and the Department of Family Medicine, Kangbuk Samsung Hospital, Sungkyunkwan University School of Medicine, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I4210103535"]},{"raw_affiliation_string":"Department of Precision Medicine, Sungkyunkwan University School of Medicine, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":7,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5106484204"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45075125,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"2476","last_page":"2486"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.4198000133037567,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.4198000133037567,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.06920000165700912,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.05829999968409538,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7429999709129333},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7078999876976013},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5109000205993652},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.506600022315979},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43459999561309814},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.391400009393692},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.37880000472068787},{"id":"https://openalex.org/keywords/digital-multimedia-broadcasting","display_name":"Digital multimedia broadcasting","score":0.37299999594688416},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.3540000021457672}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277000188827515},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7429999709129333},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7078999876976013},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5109000205993652},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.506600022315979},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4239000082015991},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41359999775886536},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.391400009393692},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.37880000472068787},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.37880000472068787},{"id":"https://openalex.org/C2780079832","wikidata":"https://www.wikidata.org/wiki/Q482605","display_name":"Digital multimedia broadcasting","level":3,"score":0.37299999594688416},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3540000021457672},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.33559998869895935},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.31459999084472656},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.29499998688697815},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29490000009536743},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2930000126361847},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.288100004196167},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.28450000286102295},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.27239999175071716},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.2662000060081482},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.25290000438690186},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.251800000667572},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2025.3646370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3646370","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:infoscience.epfl.ch:20.500.14299/257496","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/257496","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"research article"}],"best_oa_location":{"id":"pmh:oai:infoscience.epfl.ch:20.500.14299/257496","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/257496","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"research article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,46],"proliferation":[1],"of":[2],"voice-enabled":[3],"consumer":[4],"IoT":[5,171],"(CIoT)":[6],"devices":[7],"raises":[8],"critical":[9],"security":[10,150,168],"concerns":[11],"regarding":[12],"audio":[13,32],"forgery":[14],"and":[15,34,61,101,115,147],"privacy":[16],"breaches,":[17],"while":[18],"quantum":[19,149],"computing":[20],"threats":[21],"render":[22],"traditional":[23],"cryptography":[24,51],"obsolete.":[25],"This":[26],"research":[27],"presents":[28],"Q-AudioShield,":[29],"a":[30],"quantum-resilient":[31,166],"watermarking":[33],"authentication":[35],"framework":[36],"for":[37,58,65,106,144,165],"secure":[38],"real-time":[39],"multimedia":[40,167],"streams":[41],"in":[42,121,169],"resource-constrained":[43,145],"CIoT":[44],"environments.":[45],"system":[47],"integrates":[48],"lattice-based":[49],"post-quantum":[50],"with":[52,80,98,138],"adaptive":[53],"spectral":[54],"watermarking,":[55],"employing":[56],"NTRUEncrypt":[57],"key":[59],"exchange":[60],"lightweight":[62],"neural":[63],"autoencoders":[64],"robust":[66],"watermark":[67],"detection.":[68],"Four":[69],"synergistic":[70],"components":[71],"compose":[72],"the":[73],"framework:":[74],"Quantum-Safe":[75],"Key":[76],"Management":[77],"System":[78],"(QSKMS)":[79],"Learning":[81],"With":[82],"Errors":[83],"encryption,":[84],"Adaptive":[85],"Spectral":[86],"Watermarking":[87],"Engine":[88],"(ASWE)":[89],"utilizing":[90],"psychoacoustic":[91],"masking,":[92],"Neural":[93],"Autoencoder":[94],"Detection":[95],"Unit":[96],"(NADU)":[97],"adversarial":[99],"training,":[100],"Integrity":[102],"Validation":[103],"Controller":[104],"(IVC)":[105],"threat":[107],"response.":[108],"Evaluation":[109],"across":[110],"smart":[111],"speakers,":[112],"surveillance":[113],"systems,":[114],"mobile":[116],"assistants":[117],"demonstrates":[118],"15%":[119],"enhancement":[120],"tamper":[122],"detection":[123],"accuracy,":[124],"0.7-point":[125],"PESQ":[126],"improvement,":[127],"41.3%":[128],"latency":[129],"reduction":[130],"to":[131],"11.1":[132],"ms,":[133],"21.5%":[134],"average":[135],"CPU":[136],"utilization":[137],"69":[139],"MB":[140],"memory":[141],"footprint,":[142],"suitable":[143],"devices,":[146],"2.0x":[148],"margins":[151],"(256-bit":[152],"vs.":[153],"128-bit":[154],"classical":[155],"baseline,":[156],"achieving":[157],"NIST":[158],"PQC":[159],"Level":[160],"3),":[161],"establishing":[162],"new":[163],"benchmarks":[164],"next-generation":[170],"ecosystems.":[172]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-19T00:00:00"}
