-
241
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article -
242
Cybercrime as a New Object of Statistical Analysis
Published 2021-12-01“…When writing the work, the author used the methods of mathematical statistics; methods of the general theory of statistics, namely, relative, absolute and average values, methods of synthesis and analysis. For visual display of statistical data, graphical and tabular methods of data visualization were used. …”
Get full text
Article -
243
-
244
Adaptive Reversible Data Hiding Scheme Based on Novel Cascading Prediction Error Histogram Shifting Using Decimal Floating Stream
Published 2025-03-01“…The need to hide data and maintain security attracted the attention of researchers. In this paper, a reversible data hiding method based on the prediction error histogram shifting is proposed in order to increase the embedding capacity and maintains the visual quality of the image as well. …”
Get full text
Article -
245
Neurophysiological Approaches to Lie Detection: A Systematic Review
Published 2025-05-01Get full text
Article -
246
Convergence or Divergence? A Cluster Analysis of Energy Poverty Patterns Across the European Union Amidst Policy Shifts and Crises
Published 2025-06-01“…Data processing and trend analysis were performed using R and RStudio, while a k-means cluster analysis, executed in Python via Visual Studio Code, identified and compared distinct country groupings based on their energy poverty profiles in 2015 and 2023. …”
Get full text
Article -
247
Creating a system of protection against counterfeiting and unauthorized useof the products in railway transport
Published 2016-02-01“…Implementation of advanced and proven methods and ways of marking of products by drawing on its surface identifiers, providing visual (working mark) and automated perception with the use of special reading devices (protective markings). 3. …”
Get full text
Article -
248
Selected Topics on Business Informatics Research: Editorial Introduction to Issue 6 of CSIMQ
Published 2016-04-01Get full text
Article -
249
TACO: Adversarial Camouflage Optimization on Trucks to Fool Object Detectors
Published 2025-03-01Get full text
Article -
250
Mitigating cloud vulnerabilities using a blockchain platform
Published 2025-04-01“…Content-Based Image Retrieval (CBIR) has become a critical technology for efficiently searching and retrieving images from large datasets based on their visual content. Traditional CBIR systems, which rely on low-level features like color, texture, and shape, often struggle with semantic gaps and scalability issues. …”
Get full text
Article -
251
Rice Variety Identification Based on Transfer Learning Architecture Using DENS-INCEP
Published 2025-01-01“…However, traditional manual methods of identification, relying on visual characteristics, are prone to human error, resulting in variety mixing, reduced quality, and higher costs. …”
Get full text
Article -
252
-
253
Research on ecological quality and restoration of fragile mining areas in the Yellow River Basin—The case of Xiegou coal mine
Published 2025-05-01“…Thus, a detailed analysis of the spatiotemporal dynamics and drivers of ecological quality in fragile coal mining areas is vital for ensuring the ecological security of the Loess Plateau and restoring the Yellow River Basin’s ecosystems to support sustainable development. …”
Get full text
Article -
254
DETECTION OF TOXICANTS BASED ON LUMINESCENT REAGENTS
Published 2019-01-01“…Relationship between technologies for improving safety and security at the crossroads of analytical chemistry of warfare agents, criminalistics, chemical safety and pharmaceutics has been demonstrated.…”
Get full text
Article -
255
Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision
Published 2025-01-01“…As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. …”
Get full text
Article -
256
-
257
Spatial–Temporal Heatmap Masked Autoencoder for Skeleton-Based Action Recognition
Published 2025-05-01Get full text
Article -
258
The possibility of the event-based flight safety control taking into account the particular qualities of the pilot
Published 2020-09-01“…The necessity of flight safety management based on the event-based control principle with the use of documented flight safety contour is proved. The example which visually demonstrates the capabilities and prospects of event-based flight safety management has been considered. …”
Get full text
Article -
259
An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design
Published 2025-02-01“…A mixed methods approach was used that included sophisticated visualization techniques and use cases in the hospitality sector, in global food security, and in educational development. …”
Get full text
Article -
260