12,967 research outputs found

    Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic

    Full text link
    In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying. This paper deals with a fuzzy inference filter to choose the larger entropy of coefficients to embed watermarks. Unlike most previous watermarking frameworks which embedded watermarks in the larger coefficients of inner coarser subbands, the proposed technique is based on utilizing a context model and fuzzy inference filter by embedding watermarks in the larger-entropy coefficients of coarser DWT subbands. The proposed approaches allow us to embed adaptive casting degree of watermarks for transparency and robustness to the general image-processing attacks such as smoothing, sharpening, and JPEG compression. The approach has no need the original host image to extract watermarks. Our schemes have been shown to provide very good results in both image transparency and robustness.Comment: 13 pages, 7 figure

    The Economy and Foreign Trade of China

    Get PDF

    A co-original approach towards law-making in the internet age

    Get PDF
    There is an increasing interest in incorporating significant citizen participation into the law-making process by developing the use of the internet in the public sphere. However, no well-accepted e-participation model has prevailed. This article points out that, to be successful, we need critical reflection of legal theory and we also need further institutional construction based on the theoretical reflection. Contemporary dominant legal theories demonstrate too strong an internal legal point of view to empower the informal, social normative development on the internet. Regardless of whether we see the law as a body of rules or principles, the social aspect is always part of people’s background and attracts little attention. In this article, it is advocated that the procedural legal paradigm advanced by Jürgen Habermas represents an important breakthrough in this regard. Further, Habermas’s co-originality thesis reveals a neglected internal relationship between public autonomy and private autonomy. I believe the co-originality theory provides the essential basis on which a connecting infrastructure between the legal and the social could be developed. In terms of the development of the internet to include the public sphere, co-originality can also help us direct the emphasis on the formation of public opinion away from the national legislative level towards the local level; that is, the network of governance.1 This article is divided into two sections. The focus of Part One is to reconstruct the co-originality thesis (section 2, 3). This paper uses the application of discourse in the adjudication theory of Habermas as an example. It argues that Habermas would be more coherent, in terms of his insistence on real communication in his discourse theory, if he allowed his judges to initiate improved interaction with the society. This change is essential if the internal connection between public autonomy and private autonomy in the sense of court adjudication is to be truly enabled. In order to demonstrate such improved co-original relationships, the empowering character of the state-made law is instrumental in initiating the mobilization of legal intermediaries, both individual and institutional. A mutually enhanced relationship is thus formed; between the formal, official organization and its governance counterpart aided by its associated ‘local’ public sphere. Referring to Susan Sturm, the Harris v Forklift Systems Inc. (1930) decision of the Supreme Court of the United States in the field of sexual harassment is used as an example. Using only one institutional example to illustrate how the co-originality thesis can be improved is not sufficient to rebuild the thesis but this is as much as can be achieved in this article. In Part Two, the paper examines, still at the institutional level, how Sturm develops an overlooked sense of impartiality, especially in the derivation of social norms; i.e. multi-partiality instead of neutral detachment (section 4). These two ideas should be combined as the criterion for impartiality to evaluate the legitimacy of the joint decision-making processes of both the formal official organization and ‘local’ public sphere. Sturm’s emphasis on the deployment of intermediaries, both institutional and individual, can also enlighten the discourse theory. Intermediaries are essential for connecting the disassociated social networks, especially when a breakdown of communication occurs due to a lack of data, information, knowledge, or disparity of value orientation, all of which can affect social networks. If intermediaries are used, further communication will not be blocked as a result of the lack of critical data, information, knowledge or misunderstandings due to disparity of value orientation or other causes. The institutional impact of the newly constructed co-originality thesis is also discussed in Part Two. Landwehr’s work on institutional design and assessment for deliberative interaction is first discussed. This article concludes with an indication of how the ‘local’ public sphere, through e-rulemaking or online dispute resolution, for example, can be constructed in light of the discussion of this article

    Currency attack/defense with two-sided private information

    Get PDF
    A currency attack fails on its own when the speculator suffers from her financial problem. This paper extends the existing models and argues that the monetary authority?s willingness to peg and the speculator?s cost of attack are private information. Our model thus accounts for the duration of currency attack/defense, and more importantly, allows for failed attack. We employ an asymmetric war of attrition and gauge the time when the speculator stops attacking, or when the monetary authority de-pegs. Comparative static results throw light on the interest rate policy amidst the Exchange Rate Mechanism Crisis and the Asian Currency CrisisAsymmetric war of attrition; Credibility of policymakers; Failed speculative attack; Persistent effect; Two-sided private information

    The influence of emotions on trust in ethical decision making

    Get PDF
    This paper attempts to delineate the interaction between trust, emotion, and ethical decision making. The authors first propose that trust can either incite an individual toward ethical decisions or drag him or her away from ethical decisions, depending on different situations. The authors then postulate that the feeling of guilt is central in understanding how trust affects the ethical decision making process. Several propositions based on these assumptions are introduced and implications for practice discussed

    Invariant Solutions to the Strominger System on Complex Lie Groups and Their Quotients

    Get PDF
    Using canonical 1-parameter family of Hermitian connections on the tangent bundle, we provide invariant solutions to the Strominger system on complex Lie groups. Both flat and non-flat cases are discussed in detail.Comment: 11 pages, comments are welcome. Updates in v2: minor typos are corrected. Updates in v3: small revisions, to be consistent with published versio
    corecore