نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

2007
Jessie Pallud Detmar W. Straub

People travel and increasingly engage in cultural activities, a phenomenon that has been called cultural tourism. Two principal reasons for these trips or visits are the need to break with monotony and the search for enjoyment and authentic experiences. Conversely, cultural places such as museums tend to rely on Information Technologies (IT) to support their exhibition and communication to the ...

2014
Antoni Barnard Nirvana Simbhoo

South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five sen...

2013
Alice E. Marwick

Fashion blogging is an international subculture comprised primarily of young women who post photographs of themselves and their possessions, comment on clothes and fashion, and use self-branding techniques to promote themselves and their blogs. Drawing from ethnographic interviews with 30 participants, I examine how fashion bloggers use “authenticity” as an organizing principle to differentiate...

2010
Francois Lombard

Biology now produces massive genomic and other data, new ways of building knowledge rely ever more on the processing of data through information technology. Biological data such as DNA sequences and analysis tools are widely accessible via Internet and qualify as authentic. They offer new opportunities to explore, test and validate hypotheses in numerous fields of biology and allow students to ...

Journal: :The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences 2021

Abstract. The concept of preventive protection originates from the European heritage field. Nowadays, a complete knowledge system and normative reference framework have been formed in field museum collection cultural relics. However, it is just beginning traditional garden protection. Based on review theories practices international historical building heritage, this paper makes comprehensive s...

2009
Helen Balinsky Edward McDonnell Liqun Chen Keith A. Harrison

We propose a new hardware and software solution for anticounterfeiting that puts product authentication directly into the hands of end-users, enabling them to be confident of the authenticity of a product regardless of the integrity of the distribution chain. This is made possible by a new type of tamper-resistant hardware chip, called “memory spot”, which has a unique combination of small size...

2001
Yusuk Lim Changsheng Xu David Dagan Feng

The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Waterm...

2010
W. Scheirer W. Bishop T. Boult

Public Key Infrastructure is a widely deployed security technology for handling key distribution and validation in computer security. Despite PKI’s popularity as a security solution, Phishing and other Man-in-the-Middle related network attacks are accomplished with ease. The major problems with PKI come down to trust, and largely, how much faith we must place in cryptographic keys alone to esta...

2005
Aravind K. Mikkilineni Pei-Ju Chiang Gazi N. Ali George T.-C. Chiu Jan P. Allebach Edward J. Delp

In today’s digital world securing different forms of content is very important in terms of protecting copyright and verifying authenticity. Many techniques have been developed to protect audio, video, digital documents, images, and programs (executable code). One example is watermarking of digital audio and images. We believe that a similar type of protection for printed documents is very impor...

Journal: :Computers, materials & continua 2022

Teleradiology plays a vital role in the medical field, which permits transmitting and imaging data over communication network. It ensures reliability provides convenient for clinical interpretation diagnostic purposes. The transmission of this network raises problems legal, ethical issues, privacy, copyright authenticity. protection images is significant issue field. Watermarking schemes are us...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید