Results 131 to 140 of about 36,777 (311)

A Watermark-Based Scheme for Authenticating JPEG 2000 Image Integrity That Complies with JPEG Privacy and Security

open access: yesApplied Sciences
Network development has made it easier to access multimedia material and to change it by allowing the collection, modification, and transmission of digital data.
Jinhee Lee   +3 more
doaj   +1 more source

On the Ambiguities of Laclauian Populist Leadership

open access: yes
Constellations, EarlyView.
Riku Kusumoto
wiley   +1 more source

An Ontological Security Interpretation of Global South Middle Powers' Non‐Alignment in the Ukrainian War

open access: yesGlobal Policy, EarlyView.
ABSTRACT This paper explores why a group of Global South middle powers has adopted stances on the Ukrainian war that diverged from the positions of the United States under President Joe Biden, the European Union and the broader NATO/Western alliance. I claim that these disparities are partially explained by the affiliation these states have with the ...
Marco Vieira
wiley   +1 more source

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks [PDF]

open access: bronze, 2018
Jiehang Deng   +4 more
openalex   +1 more source

The Issue of Pre‐Islamic Arabic Christian Poetry Revisited

open access: yesArabian Archaeology and Epigraphy, EarlyView.
ABSTRACT Is only very little Arabic Christian poetry extant from pre‐Islamic times? While distancing myself from Louis Cheikho's (1859–1927) view that almost all pre‐Islamic poets were Christians, I contend in this article that some of them indeed were.
Ilkka Lindstedt
wiley   +1 more source

Spiritual Manifest Destiny: B.A. Santamaria's Political Theology

open access: yesAustralian Journal of Politics &History, EarlyView.
This article offers a reading of B.A. Santamaria's political theology and its role in the making of contemporary Australian political imaginaries. The article charts the shifting targets of Santamaria's critique and activism, showing his departure from the perceived communist threat to a wide‐ranging attack on liberal and leftist social movements.
Clare Monagle
wiley   +1 more source

Lady Anne Kerr: From the Rise of International Conference Interpreting to the Whitlam Dismissal

open access: yesAustralian Journal of Politics &History, EarlyView.
Before Anne Robson (née Taggart) became the second Lady Kerr upon marrying governor‐general John Kerr in 1975, she had an international career of some 30 years working as a French to English interpreter and consultant at over 30 national and international conferences and became the first Australian elected to the International Association of Conference
Alexis Bergantz
wiley   +1 more source

A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images [PDF]

open access: gold, 2020
Mohammad Manzurul Islam   +3 more
openalex   +1 more source

When First Nations Don't Count: H.V. Evatt and the Erasure of Palestinian Rights

open access: yesAustralian Journal of Politics &History, EarlyView.
As Minister for External Affairs in the Chifley Government, Herbert Vere Evatt played a pivotal role at the United Nations in securing the partition of Palestine and recognition of the State of Israel. These endeavours were represented by Evatt and in subsequent commentary as exemplifying Evatt's commitment to justice.
Jeff Rickertt
wiley   +1 more source

Efficient group signature scheme with revocation

open access: yesTongxin xuebao, 2016
A group signature scheme which combines the subset cover framework with Camenisch-Stadler scheme was proposed.This scheme allowed any group members’ entrance and revocation without changing other members’ secret key.Meanwhile,the scheme added a knowledge
Hong ZHONG   +3 more
doaj  

Home - About - Disclaimer - Privacy