Twenty years of digital audio watermarking—a comprehensive review
Digital audio watermarking is an important technique to secure and authenticate audio
media. This paper provides a comprehensive review of the twenty years' research and …
media. This paper provides a comprehensive review of the twenty years' research and …
Wavelet based image watermarking: futuristic concepts in information security
In this paper, we have reviewed the state-of-art of the various wavelet based image
watermarking techniques in spatial as well as in transform domain based on the robustness …
watermarking techniques in spatial as well as in transform domain based on the robustness …
Deep learning for signal authentication and security in massive internet-of-things systems
A Ferdowsi, W Saad - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Secure signal authentication is arguably one of the most challenging problems in the
Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to …
Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to …
Watermarking security: theory and practice
This paper proposes a theory of watermarking security based on a cryptanalysis point of
view. The main idea is that information about the secret key leaks from the observations, for …
view. The main idea is that information about the secret key leaks from the observations, for …
Data-hiding codes
P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …
information in signals such as images, video, audio, graphics, and text. Such codes have …
A multi-scale image watermarking based on integer wavelet transform and singular value decomposition
Image watermarking technique is one of effective solutions to protect copyright, and it is
applied to a variety of information security application domains. It needs to meet four …
applied to a variety of information security application domains. It needs to meet four …
Reversible data hiding in encrypted three-dimensional mesh models
Reversible data hiding in encrypted domain (RDH-ED) has greatly attracted researchers as
the original content can be losslessly reconstructed after the embedded data are extracted …
the original content can be losslessly reconstructed after the embedded data are extracted …
Deep learning-based dynamic watermarking for secure signal authentication in the Internet of Things
A Ferdowsi, W Saad - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the
deployment of its applications and services. In particular, the functionality of the IoT devices …
deployment of its applications and services. In particular, the functionality of the IoT devices …
Using deep learning for image watermarking attack
Digital image watermarking has justified its suitability for copyright protection and copy
control of digital images. In the past years, various watermarking schemes were proposed to …
control of digital images. In the past years, various watermarking schemes were proposed to …
Algorithms for audio watermarking and steganography
N Cvejic - 2004 - oulurepo.oulu.fi
Broadband communication networks and multimedia data available in a digital format
opened many challenges and opportunities for innovation. Versatile and simple-to-use …
opened many challenges and opportunities for innovation. Versatile and simple-to-use …