Concealed attack for robust watermarking based on generative model and perceptual loss
Q Li, X Wang, B Ma, X Wang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
While existing watermarking attack methods can disturb the correct extraction of watermark
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …
information, the visual quality of watermarked images will be greatly damaged. Therefore, a …
Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2
The current study presents a new methodology for zero watermarking that relies on the
discrete wavelet transform (DWT) and an improved MobileNetV2 convolutional neural …
discrete wavelet transform (DWT) and an improved MobileNetV2 convolutional neural …
Methods for countering attacks on image watermarking schemes: Overview
Image watermarking is an effective and promising technology. Robust watermarks, resistant
to various attacks, allow authors and owners of digital images to protect their rights to digital …
to various attacks, allow authors and owners of digital images to protect their rights to digital …
Data hiding with deep learning: A survey unifying digital watermarking and steganography
The advancement of secure communication and identity verification fields has significantly
increased through the use of deep learning techniques for data hiding. By embedding …
increased through the use of deep learning techniques for data hiding. By embedding …
Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain
Currently, digital mobile devices, especially smartphones, can be used to acquire
information conveniently through photograph taking. To protect information security in this …
information conveniently through photograph taking. To protect information security in this …
RD-IWAN: Residual dense based imperceptible watermark attack network
C Wang, Q Hao, S Xu, B Ma, Z Xia, Q Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Digital watermarking technology and watermark attack methods are mutually reinforcing and
complementary. Currently, traditional watermark attack methods are relatively mature, but …
complementary. Currently, traditional watermark attack methods are relatively mature, but …
Destroying robust steganography in online social networks
In recent years, some robust steganography approaches for covert transmission in online
social networks (OSNs) have been proposed. Some existing image algorithms, such as …
social networks (OSNs) have been proposed. Some existing image algorithms, such as …
Wavelet-FCWAN: fast and covert watermarking attack network in wavelet domain
C Wang, F Sun, Z Xia, Q Li, J Li, B Han, B Ma - Journal of Visual …, 2023 - Elsevier
The protection of digital image content has become an important topic of scientific research
with the continuous development and updates of Internet and multimedia technology. In the …
with the continuous development and updates of Internet and multimedia technology. In the …
Image sanitization in online social networks: A general framework for breaking robust information hiding
With the development of robust information hiding (RIH) approaches, secret messages can
be extracted successfully from stego-data after transmission through lossy channels of …
be extracted successfully from stego-data after transmission through lossy channels of …
Deep learning-based image watermarking technique with hybrid DWT-SVD
R Radha Kumari, V Vijaya Kumar… - The Imaging Science …, 2024 - Taylor & Francis
In digital media copyright protection, image watermarking topologies afford a promising
solution. But the robustness of watermarking methods should be considered. Therefore, a …
solution. But the robustness of watermarking methods should be considered. Therefore, a …