A method for assurance of image integrity in CAD-PACS integration

2007 ◽  
Author(s):  
Zheng Zhou
Author(s):  
Veronika Chekalyk

The article represents the following aspects: the main principles of national mass media activity, the methods of image creation of a state, the analyses of interrelation in image creation of a state and mass media. This scientific study intends to provide professional analysis of the article’s author as an image-maker as well as assessmentfeedback from the point of view of a media psychological readiness to accept a public persona offered by image-makers. This text proposes the several methods how to create image and how to define the terms. The author treats a state image as an internal and external image of a country, which is formed and fixed in mass consciousness of citizens under influence of mass media, distinguished by men and economical, political, ecological as well as others factors. This article is devoted to the study of state image of Ukraine; press about the state image; integrity and incompatibility perception of information materials of Ukraine by the world society. The image, shown in press, is made by image carrier and information audience.


Open Biology ◽  
2020 ◽  
Vol 10 (6) ◽  
pp. 200165
Author(s):  
Jon Pines
Keyword(s):  

1995 ◽  
Author(s):  
Ricky K. Taira ◽  
Hing-Ming Chan ◽  
Claudine M. Breant ◽  
Lu J. Huang ◽  
Daniel J. Valentino

2012 ◽  
Vol 224 ◽  
pp. 485-488
Author(s):  
Fei Li ◽  
Yuan Yuan Wang

Abstract: In order to solve the easily copied problem of images in face recognition software, an algorithm combining the image feature with digital watermark is presented in this paper. As watermark information, image feature of the adjacent blocks are embedded to the face image. And primitive face images are not needed when recovering the watermark. So face image integrity can be well confirmed, and the algorithm can detect whether the face image is the original one and identify whether the face image is attacked by malicious aim-such as tampering, replacing or illegally adding. Experimental results show that the algorithm with good invisibility and excellent robustness has no interference on face recognition rate, and it can position the specific tampered location of human face image.


Sign in / Sign up

Export Citation Format

Share Document