A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

A review on blind detection for image steganography

XY Luo, DS Wang, P Wang, FL Liu - Signal Processing, 2008 - Elsevier
Blind steganalysis techniques detect the existence of secret messages embedded in digital
media when the steganography embedding algorithm is unknown. This paper presents a …

A survey of deep neural network watermarking techniques

Y Li, H Wang, M Barni - Neurocomputing, 2021 - Elsevier
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …

[图书][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

Multimedia watermarking techniques

F Hartung, M Kutter - Proceedings of the IEEE, 1999 - ieeexplore.ieee.org
Multimedia watermarking technology has evolved very quickly during the last few years. A
digital watermark is information that is imperceptibly and robustly embedded in the host data …

Spread-spectrum watermarking of audio signals

D Kirovski, HS Malvar - IEEE transactions on signal processing, 2003 - ieeexplore.ieee.org
Watermarking has become a technology of choice for a broad range of multimedia copyright
protection applications. Watermarks have also been used to embed format-independent …

New shielding functions to enhance privacy and prevent misuse of biometric templates

JP Linnartz, P Tuyls - International Conference on Audio-and Video …, 2003 - Springer
In biometrics, a human being needs to be identified based on some characteristic
physiological parameters. Often this recognition is part of some security system. Secure …

Scalar costa scheme for information embedding

JJ Eggers, R Bauml, R Tzschoppe… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Research on information embedding, particularly information hiding techniques, has
received considerable attention within the last years due to its potential application in …

Applying informed coding and embedding to design a robust high-capacity watermark

ML Miller, GJ Doërr, IJ Cox - IEEE Transactions on image …, 2004 - ieeexplore.ieee.org
We describe a new watermarking system based on the principles of informed coding and
informed embedding. This system is capable of embedding 1380 bits of information in …

Spread-transform dither modulation watermarking of deep neural network

Y Li, B Tondi, M Barni - Journal of Information Security and Applications, 2021 - Elsevier
DNN watermarking is receiving an increasing attention as a suitable mean to protect the
Intellectual Property Rights associated to DNN models. Several methods proposed so far …