Results 61 to 70 of about 22,260 (189)

Removable Watermarking Sebagai Pengendalian Terhadap Cyber Crime Pada Audio Digital

open access: yesJurnal Elektronika dan Telekomunikasi, 2017
Perkembangan teknologi informasi yang pesat menuntut penggunanya untuk lebih berhati-hati seiring semakin meningkatnya cyber crime.Banyak pihak telah mengembangkan berbagai teknik perlindungan data digital, salah satunya adalah watermarking.
Reyhani Lian Putri   +2 more
doaj   +1 more source

Blind and robust images watermarking based on wavelet and edge insertion

open access: yes, 2013
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition.
Karim, Attoumani Mohamed   +1 more
core   +1 more source

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

Analysis of Digital Image Watermarking Techniques through Hybrid Methods

open access: yesAdvances in Multimedia, 2020
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Digital Image Watermarking using Singular Value Decomposition [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
This paper  presents a digital image watermarking  that  applied theory of linear algebra called “Singular Value Decomposition (SVD)” to digital image watermarking .SVD watermarking scheme, which successfully embeds watermarks into images imperceptible ...
Sura Sheriff
doaj   +1 more source

Automation and Augmentation in Theological Perspective

open access: yesModern Theology, EarlyView.
Abstract AI enables forms of automation that threaten unemployment and deskilling, eliminating important opportunities for the development of virtue. The concomitant loss of virtue and meaningful employment makes it a theological problem from the perspective of Catholic social teaching and theological anthropology.
Paul Scherz
wiley   +1 more source

The Benefits of Access: Evidence from Private Meetings with Portfolio Firms

open access: yesThe Journal of Finance, Volume 81, Issue 2, Page 739-789, April 2026.
ABSTRACT We use large language models to analyze the content of 4,700 private meetings between a large active asset manager and its portfolio firms. The high‐level meetings convey mostly soft information about the firm, and little about industry or market. Fund manager meetings focus on business models and financial metrics, while governance specialist
MARCO BECHT   +2 more
wiley   +1 more source

Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems

open access: yesCryptography, 2020
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and ...
Mayssa Tayachi   +5 more
doaj   +1 more source

Recent Advances on Thermochromic Inks for Security Applications

open access: yesAdvanced Materials Technologies, Volume 11, Issue 6, 18 March 2026.
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira   +5 more
wiley   +1 more source

An Efficient Watermarking Scheme for Medical Data Security With the Aid of Neural Network

open access: yesBrazilian Archives of Biology and Technology
Digital watermarking has emerged as major technique for ensuring security for various types of data like medical data, digital copyright protection, transaction tracing and so on.
K. Kalaivani
doaj   +1 more source

Home - About - Disclaimer - Privacy