ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints

M Xue, S Sun, C He, D Gu, Y Zhang… - IET Computers & …, 2023 - Wiley Online Library
… an effective DNN watermarking scheme, where a numerical watermark is embedded in
the … This watermarking scheme can successfully embed a large-capacity watermark in the …

Active detection against replay attack: A survey on watermark design for cyber-physical systems

H Liu, Y Mo, KH Johansson - Safety, Security and Privacy for Cyber …, 2021 - Springer
watermark design approaches for Cyber-Physical Systems (CPS). We focus on how to design
physical watermarking to actively … A similar problem is studied for multi-agent systems in […

[PDF][PDF] Attacking image watermarking and steganography-a survey

O Hosam - International Journal of Information Technology and …, 2019 - mecs-press.net
watermarking algorithms are used for keeping the watermark robust to attacks. When the
attacker tries to perturb the carrier image to remove the watermarkactive and passive attacks. In …

Design of multiplicative watermarking against covert attacks

AJ Gallo, SC Anand, AMH Teixeira… - 2021 60th IEEE …, 2021 - ieeexplore.ieee.org
… of malicious agents, while the latter actively perturb signals to … Here we focus on the active
detection method proposed in [8]… To avoid this, we consider that the watermark systems have …

Fixing the Double Agent Vulnerability of Deep Watermarking: A Patch-Level Solution against Artwork Plagiarism

Y Luo, T Zhou, S Cui, Y Ye, F Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… the embedded image Iem contains a watermark from the perspective of active plagiarizers.
… 1) embedding watermarks in multi-patches can help at least one watermark handle distortion …

Watermarking as a service (WaaS) with anonymity

F Naz, A Khan, M Ahmed, MI Khan, S Din… - Multimedia Tools and …, 2020 - Springer
… image, protection of database integrity is now a very active research in digital watermarking.
… Our technique is called zero-watermarking technique because watermark bits are not …

Watermark-based proactive defense strategy design for cyber-physical systems with unknown-but-bounded noises

H Liu, Y Li, QL Han, T Raïssi - IEEE Transactions on Automatic …, 2022 - ieeexplore.ieee.org
… is used to generate watermarked input signals that can actively authenticate the dynamics
… if the watermarking exists. Different from some existing results based on the watermark, the …

An intrusion tracking watermarking scheme

J Hou, Q Li, R Tan, S Meng, H Zhang, S Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
… is modulated actively according to the specified watermark implementation strategy. Then
the original watermarking signal is carried by network flow. The original watermark and the …

Dual-rate control framework with safe watermarking against deception attacks

I Bessa, C Trapiello, V Puig… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… the effect of an active attack detection with watermarking by employing the RB to … watermark
signal injection from the controllers’ signals. The design of the attack detector and watermark

A switching multiplicative watermarking scheme for detection of stealthy cyber-attacks

RMG Ferrari, AMH Teixeira - IEEE Transactions on Automatic …, 2020 - ieeexplore.ieee.org
… design of the watermark filters. In particular, we show how the watermarking scheme can be
… Remark 1: The rationale for including the proposed active watermarking scheme is to make …