Results 71 to 80 of about 23,277 (209)

Impact of Packaging and Recycling Systems on Material Recirculation: A Stage‐Decomposition Model

open access: yesPackaging Technology and Science, EarlyView.
A system‐level view emerges from decomposing recycling into four stages (participation, collection, sorting and process yield), diagnosing constraints and targeting interventions. Cumulative equivalent uses (CEUs) quantify long‐term retention, revealing marginal improvements at high baselines generate disproportionately larger gains than low‐baseline ...
Diogo Figueirinhas   +3 more
wiley   +1 more source

Quantization-Based Image Watermarking by Using a Normalization Scheme in the Wavelet Domain

open access: yesInformation, 2018
To improve the invisibility and robustness of quantization-based image watermarking algorithms, we developed an improved quantization image watermarking method based on the wavelet transform and normalization strategy used in this study.
Jinhua Liu, Qiu Tu, Xinye Xu
doaj   +1 more source

Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication [PDF]

open access: yes, 2012
Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images.
Sun, G., Sun, X., Tan, L.
core   +1 more source

DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu   +3 more
wiley   +1 more source

The Coloniality of Data: Police Databases and the Rationalization of Surveillance from Colonial Vietnam to the Modern Carceral State

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley   +1 more source

Multi-scale adaptive image watermarking algorithm based on cross-attention [PDF]

open access: yesPeerJ Computer Science
With the advancement of digital media in recent years, copyright protection and image information security issues have become increasingly significant.
Yu Bai   +5 more
doaj   +2 more sources

Quantum color image watermarking scheme based on quantum error correction coding

open access: yesNew Journal of Physics, 2023
Quantum image processing, which merges classical image processing techniques with quantum computing, provides exceptional storage capacity and unparalleled parallel computing power. In this study, we present a quantum color image watermarking scheme that
Yumin Dong   +3 more
doaj   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

A Framework for Evaluating Global AI Governance Initiatives

open access: yesGlobal Policy, EarlyView.
ABSTRACT Efforts to develop global governance initiatives for artificial intelligence (AI) have increased significantly in recent years. However, these initiatives have generally had a limited impact due to their vagueness, lack of authority and repetition.
Huw Roberts   +2 more
wiley   +1 more source

An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit [PDF]

open access: yes, 2012
Software watermarking is one of the most important methods for protecting copyrights and authenticating ownership; which can be used to prevent software piracy.
Abdullah Bamatraf, Abdullah Omar
core  

Home - About - Disclaimer - Privacy