Results 61 to 70 of about 42,975 (207)

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Dynamic Watermarking for General LTI Systems

open access: yes, 2017
Detecting attacks in control systems is an important aspect of designing secure and resilient control systems. Recently, a dynamic watermarking approach was proposed for detecting malicious sensor attacks for SISO LTI systems with partial state ...
Aswani, Anil   +3 more
core   +1 more source

Impact of Packaging and Recycling Systems on Material Recirculation: A Stage‐Decomposition Model

open access: yesPackaging Technology and Science, EarlyView.
A system‐level view emerges from decomposing recycling into four stages (participation, collection, sorting and process yield), diagnosing constraints and targeting interventions. Cumulative equivalent uses (CEUs) quantify long‐term retention, revealing marginal improvements at high baselines generate disproportionately larger gains than low‐baseline ...
Diogo Figueirinhas   +3 more
wiley   +1 more source

Digital Image Watermarking Techniques: A Review

open access: yesInformation, 2020
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu   +3 more
wiley   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Xml Streams Watermarking [PDF]

open access: yes, 2006
XML streams are valuable, continuous, high-throughput sources of information whose owners must be protected against illegal redistributions. Watermarking is a known technique for hiding copyrights marks within documents, thus preventing redistributions.
Lafaye, Julien, Gross-Amblard, David
openaire   +3 more sources

The Coloniality of Data: Police Databases and the Rationalization of Surveillance from Colonial Vietnam to the Modern Carceral State

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley   +1 more source

Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal

open access: yes, 2022
As a common security tool, visible watermarking has been widely applied to protect copyrights of digital images. However, recent works have shown that visible watermarks can be removed by DNNs without damaging their host images. Such watermark-removal techniques pose a great threat to the ownership of images.
Liu, Xinwei   +6 more
openaire   +2 more sources

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Home - About - Disclaimer - Privacy