Results 61 to 70 of about 22,260 (189)
Removable Watermarking Sebagai Pengendalian Terhadap Cyber Crime Pada Audio Digital
Perkembangan teknologi informasi yang pesat menuntut penggunanya untuk lebih berhati-hati seiring semakin meningkatnya cyber crime.Banyak pihak telah mengembangkan berbagai teknik perlindungan data digital, salah satunya adalah watermarking.
Reyhani Lian Putri +2 more
doaj +1 more source
Blind and robust images watermarking based on wavelet and edge insertion
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition.
Karim, Attoumani Mohamed +1 more
core +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Analysis of Digital Image Watermarking Techniques through Hybrid Methods
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,
Mahbuba Begum, Mohammad Shorif Uddin
doaj +1 more source
Digital Image Watermarking using Singular Value Decomposition [PDF]
This paper presents a digital image watermarking that applied theory of linear algebra called “Singular Value Decomposition (SVD)” to digital image watermarking .SVD watermarking scheme, which successfully embeds watermarks into images imperceptible ...
Sura Sheriff
doaj +1 more source
Automation and Augmentation in Theological Perspective
Abstract AI enables forms of automation that threaten unemployment and deskilling, eliminating important opportunities for the development of virtue. The concomitant loss of virtue and meaningful employment makes it a theological problem from the perspective of Catholic social teaching and theological anthropology.
Paul Scherz
wiley +1 more source
The Benefits of Access: Evidence from Private Meetings with Portfolio Firms
ABSTRACT We use large language models to analyze the content of 4,700 private meetings between a large active asset manager and its portfolio firms. The high‐level meetings convey mostly soft information about the firm, and little about industry or market. Fund manager meetings focus on business models and financial metrics, while governance specialist
MARCO BECHT +2 more
wiley +1 more source
Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and ...
Mayssa Tayachi +5 more
doaj +1 more source
Recent Advances on Thermochromic Inks for Security Applications
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira +5 more
wiley +1 more source
An Efficient Watermarking Scheme for Medical Data Security With the Aid of Neural Network
Digital watermarking has emerged as major technique for ensuring security for various types of data like medical data, digital copyright protection, transaction tracing and so on.
K. Kalaivani
doaj +1 more source

