Results 51 to 60 of about 22,530 (185)

Impact of Packaging and Recycling Systems on Material Recirculation: A Stage‐Decomposition Model

open access: yesPackaging Technology and Science, EarlyView.
A system‐level view emerges from decomposing recycling into four stages (participation, collection, sorting and process yield), diagnosing constraints and targeting interventions. Cumulative equivalent uses (CEUs) quantify long‐term retention, revealing marginal improvements at high baselines generate disproportionately larger gains than low‐baseline ...
Diogo Figueirinhas   +3 more
wiley   +1 more source

A Digital Watermarking Encryption Technique Based on FPGA Cloud Accelerator

open access: yesIEEE Access, 2020
Digital watermarking has the properties such as invisibility and anti-aggression, so the digital watermarking technology has been widely used in copyright protection, information hiding. The watermarking technology takes into account the invisibility and
Yanpeng Cao, Feng Yu, Yongming Tang
doaj   +1 more source

DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu   +3 more
wiley   +1 more source

Research on color QR code watermarking technology based on chaos theory

open access: yesTongxin xuebao, 2018
In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was ...
Xi YIN, Weiqing HUANG
doaj   +2 more sources

PERFORMANCE ANALYSIS OF SECURE MEDICAL IMAGE COMMUNICATION WITH DIGITAL SIGNATURE AND REVERSIBLE WATERMARKING [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2013
Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which ...
A. Umamageswari, G. R. Suresh
doaj  

Lime: Data Lineage in the Malicious Environment

open access: yes, 2014
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era.
Backes, Michael   +2 more
core   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Removable Watermarking Sebagai Pengendalian Terhadap Cyber Crime Pada Audio Digital

open access: yesJurnal Elektronika dan Telekomunikasi, 2017
Perkembangan teknologi informasi yang pesat menuntut penggunanya untuk lebih berhati-hati seiring semakin meningkatnya cyber crime.Banyak pihak telah mengembangkan berbagai teknik perlindungan data digital, salah satunya adalah watermarking.
Reyhani Lian Putri   +2 more
doaj   +1 more source

The Coloniality of Data: Police Databases and the Rationalization of Surveillance from Colonial Vietnam to the Modern Carceral State

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley   +1 more source

Analysis of Digital Image Watermarking Techniques through Hybrid Methods

open access: yesAdvances in Multimedia, 2020
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Home - About - Disclaimer - Privacy