Showing 241 - 260 results of 841 for search 'security in visualization', query time: 0.09s Refine Results
  1. 241

    Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition by Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN

    Published 2023-06-01
    “…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
    Get full text
    Article
  2. 242

    Cybercrime as a New Object of Statistical Analysis by A. E. Lyapin

    Published 2021-12-01
    “…When writing the work, the author used the methods of mathematical statistics; methods of the general theory of statistics, namely, relative, absolute and average values, methods of synthesis and analysis. For visual display of statistical data, graphical and tabular methods of data visualization were used. …”
    Get full text
    Article
  3. 243
  4. 244

    Adaptive Reversible Data Hiding Scheme Based on Novel Cascading Prediction Error Histogram Shifting Using Decimal Floating Stream by Reza Ghorbandost Soveiri, Maryam Rajabzadeh Asaar, Pouya Derakhshan Barjoei

    Published 2025-03-01
    “…The need to hide data and maintain security attracted the attention of researchers. In this paper, a reversible data hiding method based on the prediction error histogram shifting is proposed in order to increase the embedding capacity and maintains the visual quality of the image as well. …”
    Get full text
    Article
  5. 245
  6. 246

    Convergence or Divergence? A Cluster Analysis of Energy Poverty Patterns Across the European Union Amidst Policy Shifts and Crises by Piotr Kosowski

    Published 2025-06-01
    “…Data processing and trend analysis were performed using R and RStudio, while a k-means cluster analysis, executed in Python via Visual Studio Code, identified and compared distinct country groupings based on their energy poverty profiles in 2015 and 2023. …”
    Get full text
    Article
  7. 247

    Creating a system of protection against counterfeiting and unauthorized useof the products in railway transport by G. V. Raykov, M. A. Kuznetsov, S. V. Petrov

    Published 2016-02-01
    “…Implementation of advanced and proven methods and ways of marking of products by drawing on its surface identifiers, providing visual (working mark) and automated perception with the use of special reading devices (protective markings). 3. …”
    Get full text
    Article
  8. 248
  9. 249
  10. 250

    Mitigating cloud vulnerabilities using a blockchain platform by Dina Zoughbi, Kavitha Venkatachalam

    Published 2025-04-01
    “…Content-Based Image Retrieval (CBIR) has become a critical technology for efficiently searching and retrieving images from large datasets based on their visual content. Traditional CBIR systems, which rely on low-level features like color, texture, and shape, often struggle with semantic gaps and scalability issues. …”
    Get full text
    Article
  11. 251

    Rice Variety Identification Based on Transfer Learning Architecture Using DENS-INCEP by Wahyudi Agustiono, Kurniawan Eka Permana, Caroline Chan, Deshinta Arrova Dewi, Moch. Miftachur Rifqi Al Husain

    Published 2025-01-01
    “…However, traditional manual methods of identification, relying on visual characteristics, are prone to human error, resulting in variety mixing, reduced quality, and higher costs. …”
    Get full text
    Article
  12. 252
  13. 253

    Research on ecological quality and restoration of fragile mining areas in the Yellow River Basin—The case of Xiegou coal mine by Xin Sui, Yiming Sun, Xuan Wang, Jin Yuan

    Published 2025-05-01
    “…Thus, a detailed analysis of the spatiotemporal dynamics and drivers of ecological quality in fragile coal mining areas is vital for ensuring the ecological security of the Loess Plateau and restoring the Yellow River Basin’s ecosystems to support sustainable development. …”
    Get full text
    Article
  14. 254

    DETECTION OF TOXICANTS BASED ON LUMINESCENT REAGENTS by A. V. Sosnov, M. I. Vlasov, S. V. Sadovnikov, K. A. Rufanov, F. M. Semchenko, A. A. Sosnova, A. S. Radilov, E. I. Savelieva

    Published 2019-01-01
    “…Relationship between technologies for improving safety and security at the crossroads of analytical chemistry of warfare agents, criminalistics, chemical safety and pharmaceutics has been demonstrated.…”
    Get full text
    Article
  15. 255

    Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision by Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang

    Published 2025-01-01
    “…As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. …”
    Get full text
    Article
  16. 256
  17. 257
  18. 258

    The possibility of the event-based flight safety control taking into account the particular qualities of the pilot by B. I. Bachkalo, V. I. Zolotykh

    Published 2020-09-01
    “…The necessity of flight safety management based on the event-based control principle with the use of documented flight safety contour is proved. The example which visually demonstrates the capabilities and prospects of event-based flight safety management has been considered. …”
    Get full text
    Article
  19. 259

    An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design by J. de Curtò, I. de Zarzà, Leandro Sebastián Fervier, Victoria Sanagustín-Fons, Carlos T. Calafate

    Published 2025-02-01
    “…A mixed methods approach was used that included sophisticated visualization techniques and use cases in the hospitality sector, in global food security, and in educational development. …”
    Get full text
    Article
  20. 260