Results 51 to 60 of about 22,530 (185)
Impact of Packaging and Recycling Systems on Material Recirculation: A Stage‐Decomposition Model
A system‐level view emerges from decomposing recycling into four stages (participation, collection, sorting and process yield), diagnosing constraints and targeting interventions. Cumulative equivalent uses (CEUs) quantify long‐term retention, revealing marginal improvements at high baselines generate disproportionately larger gains than low‐baseline ...
Diogo Figueirinhas +3 more
wiley +1 more source
A Digital Watermarking Encryption Technique Based on FPGA Cloud Accelerator
Digital watermarking has the properties such as invisibility and anti-aggression, so the digital watermarking technology has been widely used in copyright protection, information hiding. The watermarking technology takes into account the invisibility and
Yanpeng Cao, Feng Yu, Yongming Tang
doaj +1 more source
DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu +3 more
wiley +1 more source
Research on color QR code watermarking technology based on chaos theory
In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was ...
Xi YIN, Weiqing HUANG
doaj +2 more sources
PERFORMANCE ANALYSIS OF SECURE MEDICAL IMAGE COMMUNICATION WITH DIGITAL SIGNATURE AND REVERSIBLE WATERMARKING [PDF]
Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which ...
A. Umamageswari, G. R. Suresh
doaj
Lime: Data Lineage in the Malicious Environment
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era.
Backes, Michael +2 more
core +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
Removable Watermarking Sebagai Pengendalian Terhadap Cyber Crime Pada Audio Digital
Perkembangan teknologi informasi yang pesat menuntut penggunanya untuk lebih berhati-hati seiring semakin meningkatnya cyber crime.Banyak pihak telah mengembangkan berbagai teknik perlindungan data digital, salah satunya adalah watermarking.
Reyhani Lian Putri +2 more
doaj +1 more source
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley +1 more source
Analysis of Digital Image Watermarking Techniques through Hybrid Methods
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,
Mahbuba Begum, Mohammad Shorif Uddin
doaj +1 more source

