Comprehensive review of watermarking techniques in deep-learning environments
Recently, the demand for the generation, sharing, and storage of massive amounts of
multimedia information—especially in the form of images—from different intelligent devices …
multimedia information—especially in the form of images—from different intelligent devices …
Learning-based image steganography and watermarking: A survey
K Hu, M Wang, X Ma, J Chen, X Wang… - Expert Systems with …, 2024 - Elsevier
Extensive research has been conducted on image steganography and watermarking
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …
Adaptor: Improving the robustness and imperceptibility of watermarking by the adaptive strength factor
In watermarking, the watermark embedding strength is crucial, and the introduction of the
strength factor can adjust the trade-off between the quality of the encoded image and the …
strength factor can adjust the trade-off between the quality of the encoded image and the …
Visualizing the truth: A survey of multimedia forensic analysis
A Diwan, U Sonkar - Multimedia Tools and Applications, 2024 - Springer
Multimedia forensics is an essential field of research that deals with the authenticity and
integrity of multimedia content in the digital world. With the increasing use of digital platforms …
integrity of multimedia content in the digital world. With the increasing use of digital platforms …
BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake
The rapid progress of the DeepFake technique has caused severe privacy problems. Thus
protecting facial data against DeepFake becomes an urgent requirement. Face protection …
protecting facial data against DeepFake becomes an urgent requirement. Face protection …
Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking
In moment-based watermarking schemes, the accuracy of the moments is crucial for
constructing robust watermarking schemes. The robustness of the watermarking scheme …
constructing robust watermarking schemes. The robustness of the watermarking scheme …
StegaEdge: learning edge-guidance steganography
K Hu, Z Huang, X Wang, X Wang - The Visual Computer, 2023 - Springer
Steganography is critical in traceability, authentication, and secret delivery for multimedia. In
this paper, we propose a novel image steganography framework, named StegaEdge, via …
this paper, we propose a novel image steganography framework, named StegaEdge, via …
[HTML][HTML] Real-time and screen-cam robust screen watermarking
W Chen, Y Li, Z Niu, Y Xu, A Keskinarkaus… - Knowledge-Based …, 2024 - Elsevier
Unauthorized photography of screen-loaded information has become a low-cost and difficult-
to-trace method for leakage. Many researchers have proposed screen-cam robust …
to-trace method for leakage. Many researchers have proposed screen-cam robust …
DRAW: Dual-decoder-based Robust Audio Watermarking Against Desynchronization and Replay Attacks
Digital watermarking is a widely adopted authentication technique and one of its primary
concerns in practical usage is robustness. However, existing audio watermarking methods …
concerns in practical usage is robustness. However, existing audio watermarking methods …
C3hartMark: A Chart Watermarking Scheme with Consecutive-Encoding and Concurrent-Decoding
Chart images are widely employed as the intuitive form to express information, which
renders them highly valuable. Consequently, there is an urgent demand to develop a …
renders them highly valuable. Consequently, there is an urgent demand to develop a …