A comprehensive survey on robust image watermarking
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …
general essential concern. Especially, as manipulation of digital images gets much easier …
Digital steganography and watermarking for digital images: A review of current research directions
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …
multimedia traffic in data networks. This has necessitated to solve the following information …
The stable signature: Rooting watermarks in latent diffusion models
Generative image modeling enables a wide range of applications but raises ethical
concerns about responsible deployment. This paper introduces an active strategy combining …
concerns about responsible deployment. This paper introduces an active strategy combining …
Hinet: Deep image hiding by invertible network
Image hiding aims to hide a secret image into a cover image in an imperceptible way, and
then recover the secret image perfectly at the receiver end. Capacity, invisibility and security …
then recover the secret image perfectly at the receiver end. Capacity, invisibility and security …
DeepMIH: Deep invertible network for multiple image hiding
Multiple image hiding aims to hide multiple secret images into a single cover image, and
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …
Editguard: Versatile image watermarking for tamper localization and copyright protection
In the era of AI-generated content (AIGC) malicious tampering poses imminent threats to
copyright integrity and information security. Current deep image watermarking while widely …
copyright integrity and information security. Current deep image watermarking while widely …
Concealed attack for robust watermarking based on generative model and perceptual loss
Q Li, X Wang, B Ma, X Wang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
While existing watermarking attack methods can disturb the correct extraction of watermark
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …
Copyrnerf: Protecting the copyright of neural radiance fields
Abstract Neural Radiance Fields (NeRF) have the potential to be a major representation of
media. Since training a NeRF has never been an easy task, the protection of its model …
media. Since training a NeRF has never been an easy task, the protection of its model …
Distortion agnostic deep watermarking
Watermarking is the process of embedding information into an image that can survive under
distortions, while requiring the encoded image to have little or no perceptual difference with …
distortions, while requiring the encoded image to have little or no perceptual difference with …
Watermarking schemes for digital images: Robustness overview
O Evsutin, K Dzhanashia - Signal Processing: Image Communication, 2022 - Elsevier
Digital watermarking is an important scientific direction located at the intersection of
cybersecurity and multimedia processing. Digital watermarking is used for digital objects …
cybersecurity and multimedia processing. Digital watermarking is used for digital objects …