Stegastamp: Invisible hyperlinks in physical photographs

M Tancik, B Mildenhall, R Ng - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Printed and digitally displayed photos have the ability to hide imperceptible digital data that
can be accessed through internet-connected imaging systems. Another way to think about …

An automated and robust image watermarking scheme based on deep neural networks

X Zhong, PC Huang, S Mastorakis… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Digital image watermarking is the process of embedding and extracting a watermark covertly
on a cover-image. To dynamically adapt image watermarking algorithms, deep learning …

Screen-shooting resilient watermarking

H Fang, W Zhang, H Zhou, H Cui… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a novel screen-shooting resilient watermarking scheme, which means
that if the watermarked image is displayed on the screen and the screen information is …

Responsible disclosure of generative models using scalable fingerprinting

N Yu, V Skripniuk, D Chen, L Davis, M Fritz - arXiv preprint arXiv …, 2020 - arxiv.org
Over the past years, deep generative models have achieved a new level of performance.
Generated data has become difficult, if not impossible, to be distinguished from real data …

Application of QR code watermarking and encryption in the protection of data privacy of intelligent mouth-opening trainer

J Liu, J Han, K Fu, J Jia, D Zhu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Quick response (QR) codes are widely used in offline to online channels to transfer
information from promotional materials to mobile devices. Self-service medical equipment …

A Transfer Attack to Image Watermarks

Y Hu, Z Jiang, M Guo, N Gong - arXiv preprint arXiv:2403.15365, 2024 - arxiv.org
Watermark has been widely deployed by industry to detect AI-generated images. The
robustness of such watermark-based detector against evasion attacks in the white-box and …

Screen-Cam robust image watermarking with feature-based synchronization

W Chen, N Ren, C Zhu, Q Zhou, T Seppänen… - Applied Sciences, 2020 - mdpi.com
The screen-cam process, which is taking pictures of the content displayed on a screen with
mobile phones or cameras, is one of the main ways that image information is leaked …

Screen-cam robust and blind watermarking for tile satellite images

W Chen, C Zhu, N Ren, T Seppänen… - IEEE …, 2020 - ieeexplore.ieee.org
To achieve watermark synchronization from an image with perspective distortion is a
challenge. This paper proposes a screen-cam robust and blind watermarking scheme for tile …

Joint image encryption and screen-cam robust two watermarking scheme

W Chen, N Ren, C Zhu, A Keskinarkaus, T Seppänen… - Sensors, 2021 - mdpi.com
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This
method combines the advantages of smartphone, encryption and watermarking …

Fourier image watermarking: Print-cam application

K Gourrame, F Ros, H Douzi, R Harba, R Riad - Electronics, 2022 - mdpi.com
Digital image watermarking is an active research field since it provides protection, security,
and authenticity of data. This paper presents development and implementation of a blind …