Comprehensive review of watermarking techniques in deep-learning environments

HK Singh, AK Singh - Journal of Electronic Imaging, 2023 - spiedigitallibrary.org
Recently, the demand for the generation, sharing, and storage of massive amounts of
multimedia information—especially in the form of images—from different intelligent devices …

Learning-based image steganography and watermarking: A survey

K Hu, M Wang, X Ma, J Chen, X Wang… - Expert Systems with …, 2024 - Elsevier
Extensive research has been conducted on image steganography and watermarking
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …

Adaptor: Improving the robustness and imperceptibility of watermarking by the adaptive strength factor

B Wang, Y Wu, G Wang - … on Circuits and Systems for Video …, 2023 - ieeexplore.ieee.org
In watermarking, the watermark embedding strength is crucial, and the introduction of the
strength factor can adjust the trade-off between the quality of the encoded image and the …

Visualizing the truth: A survey of multimedia forensic analysis

A Diwan, U Sonkar - Multimedia Tools and Applications, 2024 - Springer
Multimedia forensics is an essential field of research that deals with the authenticity and
integrity of multimedia content in the digital world. With the increasing use of digital platforms …

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake

H Liu, X Li, W Zhou, H Fang, P Bestagini… - Proceedings of the 31st …, 2023 - dl.acm.org
The rapid progress of the DeepFake technique has caused severe privacy problems. Thus
protecting facial data against DeepFake becomes an urgent requirement. Face protection …

Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking

M He, H Wang, F Zhang, Y Xiang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In moment-based watermarking schemes, the accuracy of the moments is crucial for
constructing robust watermarking schemes. The robustness of the watermarking scheme …

StegaEdge: learning edge-guidance steganography

K Hu, Z Huang, X Wang, X Wang - The Visual Computer, 2023 - Springer
Steganography is critical in traceability, authentication, and secret delivery for multimedia. In
this paper, we propose a novel image steganography framework, named StegaEdge, via …

[HTML][HTML] Real-time and screen-cam robust screen watermarking

W Chen, Y Li, Z Niu, Y Xu, A Keskinarkaus… - Knowledge-Based …, 2024 - Elsevier
Unauthorized photography of screen-loaded information has become a low-cost and difficult-
to-trace method for leakage. Many researchers have proposed screen-cam robust …

DRAW: Dual-decoder-based Robust Audio Watermarking Against Desynchronization and Replay Attacks

B Li, J Chen, Y Xu, W Li, Z Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Digital watermarking is a widely adopted authentication technique and one of its primary
concerns in practical usage is robustness. However, existing audio watermarking methods …

C3hartMark: A Chart Watermarking Scheme with Consecutive-Encoding and Concurrent-Decoding

L Ma, H Fang, Z Ma, Z Jia, W Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Chart images are widely employed as the intuitive form to express information, which
renders them highly valuable. Consequently, there is an urgent demand to develop a …