نتایج جستجو برای: digital files

تعداد نتایج: 333935  

Journal: :J. Visual Communication and Image Representation 2010
Pei-Ying Chiang May-Chen Kuo Jessy Lee C.-C. Jay Kuo Todd Richmond Milton Rosenberg Jeff Lund Kip Haynes Lindsay Armstrong

The Automated Metadata Indexing and Analysis (AMIA) project aims to provide an effective digital asset management (DAM) tool for large digital asset databases. We began with text-based indexing since it is still the most reliable approach as compared with other content-based media features. AMIA not only searches for the text of the file name, but also utilizes embedded information such as the ...

2016
Vitor Hugo Galhardo Marco Aurelio Amaral

Digital forensics is a science related to the analysis of digital devices in order to find evidences of a crime. However, the overwhelming amount of data required to be handled, caused by the increase of storage capacity of hard disks, make examiners’ work harder and sometimes impossible to succeed in a reasonable time. For this reason, methods that can reduce the time needed in an investigatio...

2014
Franziska Frey

1.0 Introduction 2.0 Attributes Associated with Performance 2.1 Ability of Files to Open Easily on Any Platform 2.2 Scope (Size of Containers) 2.3 Pros and Cons of Various Formats 2.4 Image Processing (Viability to Create Deliverable Images from Digital Masters) 3.0 Attributes Associated with Persistence 3.1 Standards 3.2 Archival Format for Digital Photography: Myth or Reality? 3.3 Color Repre...

2012
Abdulaleem Z. Al-Othmani Azizah Abdul Manaf Akram M. Zeki

Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. Audio files and signals make appropriate mediums for steganography due to the high data transmission...

2006
Konstantina Stoupa Zisis Simeoforidis Athena Vakali

XML has been widely adopted for Web data representation under various applications (such as DBMSs, Digital Libraries etc). Therefore, access to XML data sources has become a crucial issue. In this paper we introduce a credential-based access control framework for protecting XML resources. Under this framework, we propose the use of access policy files containing policies concerning a specific c...

Journal: :Axioms 2023

The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that directly using each digital file as a source of randomness. Two use cases considered: the protection and verification authenticity information distributed storage nodes files kept terminal devices operating contested zero-trust environments comprised weak signals presence obfuscating electromagnetic ...

2012
Christopher Hale

In an ever expanding field such as computer and digital forensics, new threats to data privacy and legality are presented daily. As such, new methods for hiding and securing data need to be created. Using steganography to hide data within video game files presents a solution to this problem. In response to this new method of data obfuscation, investigators need methods to recover specific data ...

The present study was an attempt to investigate the use of semantic technologies to organize information in digital library software systems. The present study was a practical one which employed a descriptive survey method. The study sample consisted of three digital library software systems entitled Pars Azarakhsh, Parvan Pajoh, and Payam Mashregh. Data were collected through a checklist incl...

Journal: :Software: Practice and Experience 1984

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید