Results 71 to 80 of about 42,975 (207)
Asymmetric Watermarking Scheme Based on Correlation Testing
Asymmetric watermarking is the second generation of watermarking scheme which uses different keys for embedding and detecting watermark. Key for embedding is private or secret, but key for detecting can be available publicly and everyone who has the key ...
Rinaldi Munir +3 more
doaj +1 more source
Robust Dual-Color Watermarking Based on Quaternion Singular Value Decomposition
This paper proposes a robust dual-color watermarking based on quaternion singular value decomposition (QSVD), which can embed large payloads into color images with low distortion, and can obtain strong robustness to process color image in a holistic ...
Yong Chen +3 more
doaj +1 more source
A Framework for Evaluating Global AI Governance Initiatives
ABSTRACT Efforts to develop global governance initiatives for artificial intelligence (AI) have increased significantly in recent years. However, these initiatives have generally had a limited impact due to their vagueness, lack of authority and repetition.
Huw Roberts +2 more
wiley +1 more source
Watermarking for Ontologies [PDF]
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight
Suchanek, Fabian M. +2 more
openaire +1 more source
MaX4Zero: Masked Extended Attention for Zero‐Shot Virtual Try‐On In The Wild
Max4Zero is a zero‐shot, training‐free virtual try‐on method that leverages diffusion priors and extended attention for accurate garment transfer. By warping reference garments and mitigating texture sticking, it achieves superior fidelity, garment preservation and identity consistency over state‐of‐the‐art methods without additional training ...
Nadav Orzech +4 more
wiley +1 more source
The combination of encryption and digital watermarking technologies is an increasingly popular approach to achieve full lifecycle data protection. Recently, reversible data hiding in the encrypted domain (RDHED) has greatly aroused the interest of many ...
Qianyi Dai +4 more
doaj +1 more source
Visual Attention-Based Image Watermarking
Imperceptibility and robustness are two complementary but fundamental requirements of any watermarking algorithm. Low strength watermarking yields high imperceptibility but exhibits poor robustness.
Deepayan Bhowmik +2 more
doaj +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Automation and Augmentation in Theological Perspective
Abstract AI enables forms of automation that threaten unemployment and deskilling, eliminating important opportunities for the development of virtue. The concomitant loss of virtue and meaningful employment makes it a theological problem from the perspective of Catholic social teaching and theological anthropology.
Paul Scherz
wiley +1 more source
A NOVEL DIGITAL IMAGE WATERMARKING SCHEME USING BIORTHOGONAL WAVELETS [PDF]
Copyright protection is considered as an issue of vital significance owing to the escalating utilization of internet and effortless copying, tampering and distribution of digital images.
G. Yamuna, D. Sivakumar
doaj

