Digital watermarking ≈ Digital watermarking
View article
Embedding Watermarks into Deep Neural Networks Open
Deep neural networks have recently achieved significant progress. Sharing\ntrained models of these deep neural networks is very important in the rapid\nprogress of researching or developing deep neural network systems. At the same\ntime, i…
View article
Digital Image Watermarking Techniques: A Review Open
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digit…
View article
Hiding Images within Images Open
We present a system to hide a full color image inside another of the same size with minimal quality loss to either image. Deep neural networks are simultaneously trained to create the hiding and revealing processes and are designed to spec…
View article
Gap-enhanced Raman tags for physically unclonable anticounterfeiting labels Open
Anticounterfeiting labels based on physical unclonable functions (PUFs), as one of the powerful tools against counterfeiting, are easy to generate but difficult to duplicate due to inherent randomness. Gap-enhanced Raman tags (GERTs) with …
View article
Secure and Robust Fragile Watermarking Scheme for Medical Images Open
Over the past decade advances in computer-based communication and health services, the need for image security becomes urgent to address the requirements of both safety and non-safety in medical applications. This paper proposes a new frag…
View article
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection Open
In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of me…
View article
Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform Open
Now-a-days, multimedia based applications have been developed rapidly. Digital information is easy to process but it allows illegal users to access the data. For protecting the data from this illegal use, Digital Rights Management (DRM) ca…
View article
An imperceptible spatial domain color image watermarking scheme Open
The paper proposes a novel scheme for color image watermarking. Spatial domain techniques are used here for embedding the watermark information to generate high quality watermarked image. Spatial domain methods are popular with fragile wat…
View article
Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption Open
This paper presents a chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images. Discrete cosine transform (DCT) is used before embedding the watermark in the host image. The host ima…
View article
The Watermark Benchmark for Underwater Acoustic Modulation Schemes Open
International audience
View article
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks\n by Backdooring Open
Deep Neural Networks have recently gained lots of success after enabling\nseveral breakthroughs in notoriously challenging problems. Training these\nnetworks is computationally expensive and requires vast amounts of training\ndata. Selling…
View article
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection Open
The leakage of medical audio data in telemedicine seriously violates the privacy of patients. In order to avoid the leakage of patient information in telemedicine, a two-stage reversible robust audio watermarking algorithm is proposed to p…
View article
Area Efficient High Speed FPGA Based Invisible Watermarking for Image Authentication Open
Objectives: Present work deals with FPGA based implementation of either watermarking or cryptography alone. Objective is to improve the security using less number of slices with optimum speed. Methods/Statistical Analysis: Digital data is …
View article
An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain Open
In this paper, a novel image watermarking method is proposed which is based on discrete wave transformation (DWT), Hessenberg decomposition (HD), and singular value decomposition (SVD). First, in the embedding process, the host image is de…
View article
DWT-PCA based Video Watermarking Open
Progressed watermarking video may be a methodology for embedding additional data another to video salute. Embedded data is utilized for proprietor copyright or recognizable affirmation. It added up to approach for watermarking is shown in …
View article
An Algorithm for Security Enhancement in Image Transmission Using Steganography Open
Data communication through the public communication channels is insecure due to advanced technology available for interception of third party users. Therefore, an efficient data hiding technology is vital for secure data transmission espec…
View article
Efficient Quantum Information Hiding for Remote Medical Image Sharing Open
Information hiding aims to embed secret data into the multimedia, such as image, audio, video, and text. In this paper, two new quantum information hiding approaches are put forward. A quantum steganography approach is proposed to hide a q…
View article
Video Watermarking System Open
Advanced video watermarking may be a procedure for inserting extra information beside video flag. Inserted information is utilized for copyright proprietor recognizable proof. A number of video watermarking techniques are proposed. These m…
View article
Can AI-Generated Text be Reliably Detected? Open
Large Language Models (LLMs) perform impressively well in various applications. However, the potential for misuse of these models in activities such as plagiarism, generating fake news, and spamming has raised concern about their responsib…
View article
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks Open
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number…
View article
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold Open
This paper presents a reliable digital watermarking technique that provides high imperceptibility and robustness for copyright protection using an optimal discrete cosine transform (DCT) psychovisual threshold. An embedding process in this…
View article
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC Open
Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacit…
View article
An overview of steganography techniques applied to the protection of biometric data Open
Identification of persons by way of biometric features is an emerging phenomenon. Over the years, biometric recognition has received much attention due to its need for security. Amongst the many existing biometrics, fingerprints are consid…
View article
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring Open
Deep Neural Networks have recently gained lots of success after enabling several breakthroughs in notoriously challenging problems. Training these networks is computationally expensive and requires vast amounts of training data. Selling su…
View article
A Review of Text Watermarking: Theory, Methods, and Applications Open
During the recent years, the issue of preserving the integrity of digital text has become a focus of interest in the transmission of online content on the Internet. Watermarking has a useful tool in the protection of digital text content a…
View article
A Watermark for Large Language Models Open
Potential harms of large language models can be mitigated by watermarking model output, i.e., embedding signals into generated text that are invisible to humans but algorithmically detectable from a short span of tokens. We propose a water…
View article
Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions Open
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protec…
View article
Model Watermarking for Image Processing Networks Open
Deep learning has achieved tremendous success in numerous industrial applications. As training a good model often needs massive high-quality data and computation resources, the learned models often have significant business values. However…
View article
A Novel Robust Reversible Watermarking Scheme for Protecting Authenticity and Integrity of Medical Images Open
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new col…
View article
A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition Open
Digital data sharing is increased day by day due to the rapid access of the Internet by mass people. Multimedia, for example text, image, video, and audio can be easily accessed by unauthorized users. To ensure multimedia security, researc…