Media forensics and deepfakes: an overview

L Verdoliva - IEEE journal of selected topics in signal …, 2020 - ieeexplore.ieee.org
With the rapid progress in recent years, techniques that generate and manipulate
multimedia content can now provide a very advanced level of realism. The boundary …

Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

The stable signature: Rooting watermarks in latent diffusion models

P Fernandez, G Couairon, H Jégou… - Proceedings of the …, 2023 - openaccess.thecvf.com
Generative image modeling enables a wide range of applications but raises ethical
concerns about responsible deployment. This paper introduces an active strategy combining …

The science of detecting llm-generated text

R Tang, YN Chuang, X Hu - Communications of the ACM, 2024 - dl.acm.org
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …

Protecting intellectual property of deep neural networks with watermarking

J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin… - Proceedings of the …, 2018 - dl.acm.org
Deep learning technologies, which are the key components of state-of-the-art Artificial
Intelligence (AI) services, have shown great success in providing human-level capabilities …

Tree-rings watermarks: Invisible fingerprints for diffusion images

Y Wen, J Kirchenbauer, J Geiping… - Advances in Neural …, 2024 - proceedings.neurips.cc
Watermarking the outputs of generative models is a crucial technique for tracing copyright
and preventing potential harm from AI-generated content. In this paper, we introduce a novel …

Stegastamp: Invisible hyperlinks in physical photographs

M Tancik, B Mildenhall, R Ng - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Printed and digitally displayed photos have the ability to hide imperceptible digital data that
can be accessed through internet-connected imaging systems. Another way to think about …

Invisible backdoor attacks on deep neural networks via steganography and regularization

S Li, M Xue, BZH Zhao, H Zhu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been proven vulnerable to backdoor attacks, where
hidden features (patterns) trained to a normal model, which is only activated by some …

Unbiased watermark for large language models

Z Hu, L Chen, X Wu, Y Wu, H Zhang… - arXiv preprint arXiv …, 2023 - arxiv.org
The recent advancements in large language models (LLMs) have sparked a growing
apprehension regarding the potential misuse. One approach to mitigating this risk is to …

Embedding watermarks into deep neural networks

Y Uchida, Y Nagai, S Sakazawa, S Satoh - Proceedings of the 2017 …, 2017 - dl.acm.org
Significant progress has been made with deep neural networks recently. Sharing trained
models of deep neural networks has been a very important in the rapid progress of research …