Results 81 to 90 of about 23,063 (201)

A robust watermarking technique based on image normalization

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
This paper presents a robust watermarking method against geometric distortions and several other signal processing schemes. In the proposed watermarking method, image normalization is used to get geometric invariant features. The watermark embedding and
Manuel Cedillo Hernández   +2 more
doaj   +1 more source

Robust watermarking of fingerprint images

open access: yesPattern Recognition, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gunsel, B, Uludag, U, Tekalp, AM
openaire   +2 more sources

The Diremption of Meaning

open access: yesModern Theology, EarlyView.
Abstract Examining work by Rowan Williams, this essay explores what he often refers to as the ‘difficulty’ of writing theology. The difficulty of theology lies in engaging the ruse of having ultimate answers to ultimate questions. The stakes are high: ‘God‐talk’ must concern itself with truth, with reality.
Graham Ward
wiley   +1 more source

The Tree of Chivalry and the Black Lady: Juana of Castile's 1496 Joyous Entry into Brussels☆

open access: yesRenaissance Studies, EarlyView.
Abstract Kupferstichkabinett MS 78D5 (Staatliche Museen Berlin) presents an iconographic account of the Joyous Entry of Juana of Castile into Brussels on 9 December 1496. In this article, we newly identify a rare visual record of a civic contribution to a tournament within the manuscript.
Nadia T. van Pelt   +2 more
wiley   +1 more source

Imperceptible of Watermarking in Digital Image Based Singular Value Decomposition

open access: yesMakara Seri Sains, 2006
Watermarking is a commonly used technique to protect digital image from unintended used such as counterfeiting. This paper will address one of the techniques to embed a watermark to digital image which is based on the singular value decomposition.
Cahyana, T. Basaruddin
doaj  

The Contribution of Educational Changes to Fertility Declines in Low‐ and Middle‐Income Countries

open access: yesStudies in Family Planning, EarlyView.
Abstract Educational expansion is widely regarded as a central mechanism in fertility transitions, yet some research suggests its role may be more modest. This study analyzes birth histories from 414 surveys in 72 low‐ and middle‐income countries to reassess the contribution of the shift in the educational composition of the population to fertility ...
Bruno D. Schoumaker   +1 more
wiley   +1 more source

Can Teacher Preparation Impact Multilingual Learner Achievement?: A Study of Multilingual Student Learning Gains in Pre‐Service Teachers' Internship Classes

open access: yesTESOL Journal, Volume 17, Issue 2, June 2026.
ABSTRACT This study investigated the impact of a differentiated teacher preparation model, One‐Plus, which focused on equipping teachers to improve multilingual learner (ML) achievement. The One‐Plus curriculum integrates ML‐focused content into coursework and field experiences.
Nirmal Ghimire, Joyce W. Nutta
wiley   +1 more source

Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

open access: yesFuture Internet, 2017
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention.
Xiaoyan Yu, Chengyou Wang, Xiao Zhou
doaj   +1 more source

Digital Image Watermarking Using Ellipse Watermark

open access: yes, 2018
From past few decades watermarking became very crucial for digital images being transmitted over network. All the time ownership and license are great issues if someone fetches the image sent by one without any ownership seal, i.e. watermark, and uses as his own image.
openaire   +1 more source

Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness

open access: yesAlgorithms
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern.
Mahbuba Begum   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy