Twenty years of digital audio watermarking—a comprehensive review

G Hua, J Huang, YQ Shi, J Goh, VLL Thing - Signal processing, 2016 - Elsevier
Digital audio watermarking is an important technique to secure and authenticate audio
media. This paper provides a comprehensive review of the twenty years' research and …

Wavelet based image watermarking: futuristic concepts in information security

AK Singh, M Dave, A Mohan - Proceedings of the National Academy of …, 2014 - Springer
In this paper, we have reviewed the state-of-art of the various wavelet based image
watermarking techniques in spatial as well as in transform domain based on the robustness …

Deep learning for signal authentication and security in massive internet-of-things systems

A Ferdowsi, W Saad - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Secure signal authentication is arguably one of the most challenging problems in the
Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to …

Watermarking security: theory and practice

F Cayre, C Fontaine, T Furon - IEEE Transactions on signal …, 2005 - ieeexplore.ieee.org
This paper proposes a theory of watermarking security based on a cryptanalysis point of
view. The main idea is that information about the secret key leaks from the observations, for …

Data-hiding codes

P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …

A multi-scale image watermarking based on integer wavelet transform and singular value decomposition

Y Luo, L Li, J Liu, S Tang, L Cao, S Zhang, S Qiu… - Expert Systems with …, 2021 - Elsevier
Image watermarking technique is one of effective solutions to protect copyright, and it is
applied to a variety of information security application domains. It needs to meet four …

Reversible data hiding in encrypted three-dimensional mesh models

R Jiang, H Zhou, W Zhang, N Yu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Reversible data hiding in encrypted domain (RDH-ED) has greatly attracted researchers as
the original content can be losslessly reconstructed after the embedded data are extracted …

Deep learning-based dynamic watermarking for secure signal authentication in the Internet of Things

A Ferdowsi, W Saad - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the
deployment of its applications and services. In particular, the functionality of the IoT devices …

Using deep learning for image watermarking attack

MW Hatoum, JF Couchot, R Couturier… - Signal Processing: Image …, 2021 - Elsevier
Digital image watermarking has justified its suitability for copyright protection and copy
control of digital images. In the past years, various watermarking schemes were proposed to …

Algorithms for audio watermarking and steganography

N Cvejic - 2004 - oulurepo.oulu.fi
Broadband communication networks and multimedia data available in a digital format
opened many challenges and opportunities for innovation. Versatile and simple-to-use …