A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

Digital steganography and watermarking for digital images: A review of current research directions

O Evsutin, A Melman, R Meshcheryakov - IEEE Access, 2020 - ieeexplore.ieee.org
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …

The stable signature: Rooting watermarks in latent diffusion models

P Fernandez, G Couairon, H Jégou… - Proceedings of the …, 2023 - openaccess.thecvf.com
Generative image modeling enables a wide range of applications but raises ethical
concerns about responsible deployment. This paper introduces an active strategy combining …

Hinet: Deep image hiding by invertible network

J Jing, X Deng, M Xu, J Wang… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Image hiding aims to hide a secret image into a cover image in an imperceptible way, and
then recover the secret image perfectly at the receiver end. Capacity, invisibility and security …

DeepMIH: Deep invertible network for multiple image hiding

Z Guan, J Jing, X Deng, M Xu, L Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Multiple image hiding aims to hide multiple secret images into a single cover image, and
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …

Editguard: Versatile image watermarking for tamper localization and copyright protection

X Zhang, R Li, J Yu, Y Xu, W Li… - Proceedings of the …, 2024 - openaccess.thecvf.com
In the era of AI-generated content (AIGC) malicious tampering poses imminent threats to
copyright integrity and information security. Current deep image watermarking while widely …

Concealed attack for robust watermarking based on generative model and perceptual loss

Q Li, X Wang, B Ma, X Wang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
While existing watermarking attack methods can disturb the correct extraction of watermark
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …

Copyrnerf: Protecting the copyright of neural radiance fields

Z Luo, Q Guo, KC Cheung, S See… - Proceedings of the …, 2023 - openaccess.thecvf.com
Abstract Neural Radiance Fields (NeRF) have the potential to be a major representation of
media. Since training a NeRF has never been an easy task, the protection of its model …

Distortion agnostic deep watermarking

X Luo, R Zhan, H Chang, F Yang… - Proceedings of the …, 2020 - openaccess.thecvf.com
Watermarking is the process of embedding information into an image that can survive under
distortions, while requiring the encoded image to have little or no perceptual difference with …

Watermarking schemes for digital images: Robustness overview

O Evsutin, K Dzhanashia - Signal Processing: Image Communication, 2022 - Elsevier
Digital watermarking is an important scientific direction located at the intersection of
cybersecurity and multimedia processing. Digital watermarking is used for digital objects …