{"version":"1.0","provider_name":"\u0410\u043a\u0430\u0434\u0435\u043c\u0438\u044f Enago","provider_url":"https:\/\/www.enago.com\/academy\/ru","author_name":"Enago Academy","author_url":"https:\/\/www.enago.com\/academy\/ru\/author\/editor\/","title":"How to Avoid Fraudulent Image Manipulation - \u0410\u043a\u0430\u0434\u0435\u043c\u0438\u044f Enago","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ql6UJUUdHF\"><a href=\"https:\/\/www.enago.com\/academy\/ru\/how-to-avoid-fraudulent-image-manipulation-2\/\">How to Avoid Fraudulent Image Manipulation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.enago.com\/academy\/ru\/how-to-avoid-fraudulent-image-manipulation-2\/embed\/#?secret=ql6UJUUdHF\" width=\"600\" height=\"338\" title=\"&#8220;How to Avoid Fraudulent Image Manipulation&#8221; &#8212; \u0410\u043a\u0430\u0434\u0435\u043c\u0438\u044f Enago\" data-secret=\"ql6UJUUdHF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.enago.com\/academy\/ru\/wp-content\/uploads\/sites\/19\/2020\/03\/Image-Manipulation.jpg","thumbnail_width":750,"thumbnail_height":430,"description":"Understanding the stipulated guidelines regarding image alterations is paramount to ensure that researchers are accountable for maintaining image integrity and standards. This webinar will help researchers to understand how they can avoid image manipulation and present them with integrity."}