Concealed attack for robust watermarking based on generative model and perceptual loss

Q Li, X Wang, B Ma, X Wang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
While existing watermarking attack methods can disturb the correct extraction of watermark
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …

Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2

SA Nawaz, J Li, UA Bhatti, MU Shoukat, D Li… - Information Sciences, 2024 - Elsevier
The current study presents a new methodology for zero watermarking that relies on the
discrete wavelet transform (DWT) and an improved MobileNetV2 convolutional neural …

Methods for countering attacks on image watermarking schemes: Overview

A Melman, O Evsutin - Journal of Visual Communication and Image …, 2024 - Elsevier
Image watermarking is an effective and promising technology. Robust watermarks, resistant
to various attacks, allow authors and owners of digital images to protect their rights to digital …

Data hiding with deep learning: A survey unifying digital watermarking and steganography

Z Wang, O Byrnes, H Wang, R Sun… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The advancement of secure communication and identity verification fields has significantly
increased through the use of deep learning techniques for data hiding. By embedding …

Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain

F Cao, T Wang, D Guo, J Li, C Qin - Journal of Visual Communication and …, 2023 - Elsevier
Currently, digital mobile devices, especially smartphones, can be used to acquire
information conveniently through photograph taking. To protect information security in this …

RD-IWAN: Residual dense based imperceptible watermark attack network

C Wang, Q Hao, S Xu, B Ma, Z Xia, Q Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Digital watermarking technology and watermark attack methods are mutually reinforcing and
complementary. Currently, traditional watermark attack methods are relatively mature, but …

Destroying robust steganography in online social networks

Z Zhu, S Li, Z Qian, X Zhang - Information Sciences, 2021 - Elsevier
In recent years, some robust steganography approaches for covert transmission in online
social networks (OSNs) have been proposed. Some existing image algorithms, such as …

Wavelet-FCWAN: fast and covert watermarking attack network in wavelet domain

C Wang, F Sun, Z Xia, Q Li, J Li, B Han, B Ma - Journal of Visual …, 2023 - Elsevier
The protection of digital image content has become an important topic of scientific research
with the continuous development and updates of Internet and multimedia technology. In the …

Image sanitization in online social networks: A general framework for breaking robust information hiding

Z Zhu, P Wei, Z Qian, S Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of robust information hiding (RIH) approaches, secret messages can
be extracted successfully from stego-data after transmission through lossy channels of …

Deep learning-based image watermarking technique with hybrid DWT-SVD

R Radha Kumari, V Vijaya Kumar… - The Imaging Science …, 2024 - Taylor & Francis
In digital media copyright protection, image watermarking topologies afford a promising
solution. But the robustness of watermarking methods should be considered. Therefore, a …