Results 71 to 80 of about 22,530 (185)
Beyond CUDOS and DECAY: Mapping Research Norms With an Institutional Logics Wheel
ABSTRACT The normative landscape of academic research is increasingly fragmented. Classical CUDOS norms and counternorms coexist across profession, market, corporation, state and community logics, yet existing scholarship rarely explains how these norms are patterned, how they interact, or how tensions between them are mediated. This conceptual article
Yuzhuo Cai, Bruce Macfarlane
wiley +1 more source
Watermarking-Based Digital Audio Data Authentication
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing.
Dittmann Jana, Steinebach Martin
doaj +1 more source
Terahertz Encryption With a Polarization‐Sensitive Metasurface
We propose a dual‐functional terahertz encryption metasurface that enables independent information retrieval in both the near field and the far field within a single device. In the near field, polarization‐selective amplitude modulation reveals textual patterns, whereas in the far field, phase engineering encodes multiple digital data in focal‐spot ...
Yixuan He +4 more
wiley +1 more source
Watermarking Techniques for Protecting Intellectual Properties in aDigital Environment
The protection and enforcement of intellectual property rights for digital media has become an important issue in many countries of the world. There is increase in the popularity and accessibility of the Internet to record, edit, replicate and broadcast ...
T. K. Aroge, F. O. Isinkaye
doaj
Aspects of a Watermark Solution [PDF]
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU +2 more
core
The Firebrands Echo: National Fantasy as an Obstacle to Jean‐Luc Mélenchon's Populist Spectacle
Constellations, EarlyView.
Reid A. Kleinberg
wiley +1 more source
A Review of Text Watermarking: Theory, Methods, and Applications
During the recent years, the issue of preserving the integrity of digital text has become a focus of interest in the transmission of online content on the Internet. Watermarking has a useful tool in the protection of digital text content as it solves the
Nurul Shamimi Kamaruddin +3 more
doaj +1 more source
Text information hiding and recovery via wavelet digital watermarking method. [PDF]
Xiaohui Z.
europepmc +1 more source
Digital watermarking techniques have been developed to protect the intellectual property. A digital watermarking system is basically judged based on two characteristics: security robustness and image quality.
Tsai Min-Jen, Liu Jung
doaj
Analysis of New Orthogonal Transforms for Digital Watermarking. [PDF]
Bogacki P, Dziech A.
europepmc +1 more source

