[PDF][PDF] Digital watermark mobile agents

J Zhao, C Luo - Proceedings of the 22th National Information System …, 1999 - Citeseer
… If the agent detects the specified watermarks, it collects evidence of any misuse … agent, we
have also developed a state-of-the-art active watermark method that allows the watermarked

Dynamic watermarking: Active defense of networked cyber–physical systems

B Satchidanandan, PR Kumar - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
… Using this approach of active … of “watermarking,” [6] whereby certain indelible patterns
are imprinted into a medium that can detect tampering [6]–[8]. It shows how one can watermark

ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints

M Xue, S Sun, C He, D Gu, Y Zhang… - IET Computers & …, 2023 - Wiley Online Library
… an effective DNN watermarking scheme, where a numerical watermark is embedded in
the … This watermarking scheme can successfully embed a large-capacity watermark in the …

Sleepy watermark tracing: An active network-based intrusion response framework

X Wang, DS Reeves, SF Wu, J Yuill - Trusted Information: The New …, 2001 - Springer
… Therefore, watermark belongs to the application layer and is application-specific. One
challenge in generating watermark is how to make watermarks invisible to end-users. For text …

Smart images using Digimarc's watermarking technology

AM Alattar - Security and Watermarking of Multimedia Contents …, 2000 - spiedigitallibrary.org
… A Smart Image is a digital or a physical image that is embedded with a specialized digital
watermark. The digital watermark acts as an active agent or catalyst that empowers the Smart …

Active detection for exposing intelligent attacks in control systems

S Weerakkody, O Ozel, P Griffioen… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
… Our interest lies in detecting integrity attacks, where malicious agents inject inputs at … predict
all future watermarks. We recommend the examination of alternative watermarking designs. …

A buyer-seller watermarking protocol

N Memon, PW Wong - IEEE Transactions on image processing, 2001 - ieeexplore.ieee.org
… assume that Alice is the agent selling the content and Bob is … buyer–seller watermarking
protocol assuming the watermark certification … He was actively involved in the formation of a new …

[图书][B] Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures

NF Johnson, Z Duric, S Jajodia - 2001 - books.google.com
watermark unusable. In assessing these attacks, countermeasures are developed to assist
in protecting digital watermarkingwatermarks are attributes of the carrier, as a watermark

[PDF][PDF] Digital watermarking: A tutorial review

SP Mohanty - URL: http://www. csee. usf. edu/~ smohanty/research …, 1999 - Citeseer
… In some watermarking schemes, a watermark can be extracted in its exact form, a procedure
… Here, it is the desire of a news agency to verify that an image is true to the original capture …

Image watermarking: Techniques and applications

A Tefas, N Nikolaidis, I Pitas - The Essential Guide to Image Processing, 2009 - Elsevier
… is over, watermarking is still a very active research area, … news photos distributed by a news
agency. In this context, the … to detect a watermark in an image that is not watermarked or is …