A comprehensive survey on robust image watermarking
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …
general essential concern. Especially, as manipulation of digital images gets much easier …
A review on blind detection for image steganography
XY Luo, DS Wang, P Wang, FL Liu - Signal Processing, 2008 - Elsevier
Blind steganalysis techniques detect the existence of secret messages embedded in digital
media when the steganography embedding algorithm is unknown. This paper presents a …
media when the steganography embedding algorithm is unknown. This paper presents a …
A survey of deep neural network watermarking techniques
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …
Networks (DNNs) is a pressing need pushed by the high costs required to train such …
[图书][B] Digital watermarking and steganography
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …
respective owners. Unfortunately, along the way, individuals may choose to intervene and …
Multimedia watermarking techniques
Multimedia watermarking technology has evolved very quickly during the last few years. A
digital watermark is information that is imperceptibly and robustly embedded in the host data …
digital watermark is information that is imperceptibly and robustly embedded in the host data …
Spread-spectrum watermarking of audio signals
D Kirovski, HS Malvar - IEEE transactions on signal processing, 2003 - ieeexplore.ieee.org
Watermarking has become a technology of choice for a broad range of multimedia copyright
protection applications. Watermarks have also been used to embed format-independent …
protection applications. Watermarks have also been used to embed format-independent …
New shielding functions to enhance privacy and prevent misuse of biometric templates
JP Linnartz, P Tuyls - International Conference on Audio-and Video …, 2003 - Springer
In biometrics, a human being needs to be identified based on some characteristic
physiological parameters. Often this recognition is part of some security system. Secure …
physiological parameters. Often this recognition is part of some security system. Secure …
Scalar costa scheme for information embedding
JJ Eggers, R Bauml, R Tzschoppe… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Research on information embedding, particularly information hiding techniques, has
received considerable attention within the last years due to its potential application in …
received considerable attention within the last years due to its potential application in …
Applying informed coding and embedding to design a robust high-capacity watermark
ML Miller, GJ Doërr, IJ Cox - IEEE Transactions on image …, 2004 - ieeexplore.ieee.org
We describe a new watermarking system based on the principles of informed coding and
informed embedding. This system is capable of embedding 1380 bits of information in …
informed embedding. This system is capable of embedding 1380 bits of information in …
Spread-transform dither modulation watermarking of deep neural network
DNN watermarking is receiving an increasing attention as a suitable mean to protect the
Intellectual Property Rights associated to DNN models. Several methods proposed so far …
Intellectual Property Rights associated to DNN models. Several methods proposed so far …