Results 101 to 110 of about 42,975 (207)

Strategic (Inconsistent) Disclosures and Sophisticated Investors: Evidence from Hedge Funds

open access: yesJournal of Accounting Research, Volume 64, Issue 2, Page 923-978, May 2026.
ABSTRACT Recent SEC regulations require that qualified hedge fund advisers provide their investors with narrative disclosures of their business and operations. We find that 40% of these disclosures omit or de‐emphasize information regarding advisers' operational and investment risks when compared to other sources of public information. Funds with such “
YICHANG LIU   +2 more
wiley   +1 more source

WATERMARK DENGAN GABUNGAN STEGANOGRAFI DAN VISIBLE WATERMARKING

open access: yesJurnal Algoritma, Logika dan Komputasi, 2018
Images, that are currently circulating on the internet are many, such as advertising images for the promotion of products from a particular brand / institution, the image of the digital image, photographs of the works of famous photographers and many other examples.
Juni Rosmiyati   +1 more
openaire   +2 more sources

Watermarks [PDF]

open access: yesElectronic Workshops in Computing, 2017
openaire   +1 more source

Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables

open access: yesIEEE Access
The use of watermarking techniques, which incorporate invisible information into multimedia files, is crucial for securing digital content.
Yasmin Alaa Hassan, Abdul Monem S. Rahma
doaj   +1 more source

SPY-Watermark: Robust Invisible Watermarking for Backdoor Attack

open access: yesICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Backdoor attack aims to deceive a victim model when facing backdoor instances while maintaining its performance on benign data. Current methods use manual patterns or special perturbations as triggers, while they often overlook the robustness against data corruption, making backdoor attacks easy to defend in practice.
Wang, Ruofei   +4 more
openaire   +2 more sources

Digital Image Watermarking Using Ellipse Watermark

open access: yes, 2018
From past few decades watermarking became very crucial for digital images being transmitted over network. All the time ownership and license are great issues if someone fetches the image sent by one without any ownership seal, i.e. watermark, and uses as his own image.
openaire   +1 more source

Watermarks [PDF]

open access: yesParallax, 2008
openaire   +1 more source

Home - About - Disclaimer - Privacy