On Tracing Screen Photos-A Moiré Pattern-based Approach

W Xu, Y Cheng, X Ji, YC Chen - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cyber-theft of trade secrets has become a serious business threat. Digital watermarking is a
popular technique to help identify the source of the file leakage, whereby a unique …

{mID}: Tracing screen photos via {Moiré} patterns

Y Cheng, X Ji, L Wang, Q Pang, YC Chen… - 30th USENIX Security …, 2021 - usenix.org
Cyber-theft of trade secrets has become a serious business threat. Digital watermarking is a
popular technique to assist in identifying the source of the file leakage, whereby a unique …

Screen watermarking for data theft investigation and attribution

D Gugelmann, D Sommer, V Lenders… - … on Cyber Conflict …, 2018 - ieeexplore.ieee.org
Organizations not only need to defend their IT systems against external cyber attackers, but
also from malicious insiders, that is, agents who have infiltrated an organization or malicious …

Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain

Y Zhang, C Huang, S Liu, L Huang, T Yang… - International Journal of … - Wiley Online Library
Metaverse's augmented reality (AR) function allows virtual information to be seamlessly
superimposed onto real scenes through the camera of a head‐mounted device. However …

Flicker forensics for pirate device identification

A Hajj-Ahmad, S Baudry, B Chupeau… - Proceedings of the 3rd …, 2015 - dl.acm.org
Cryptography-based content protection is an efficient means to protect multimedia content
during transport. Nevertheless, content is eventually decrypted at rendering time, leaving it …

Modeling the flicker effect in camcorded videos to improve watermark robustness

S Baudry, B Chupeau, M De Vito… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Camcording a screen is a common and easy way for a pirate to capture a protected video
and circumvent any cryptography-based protection system like DRM. Therefore, antipiracy …

FaceSigns: Semi-Fragile Watermarks for Media Authentication

P Neekhara, S Hussain, X Zhang, K Huang… - ACM Transactions on …, 2024 - dl.acm.org
Manipulated media is becoming a prominent threat due to the recent advances in realistic
image and video synthesis techniques. There have been several attempts at detecting …

Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices

DF Smith, A Wiliem, BC Lovell - IEEE International Conference …, 2015 - ieeexplore.ieee.org
Mobile devices (laptops, tablets, and smart phones) are ideal for the wide deployment of
biometric authentication, such as face recognition. However, their uncontrolled use and …

Screen-Shooting Resistant Watermarking with Grayscale Deviation Simulation

Y Li, X Liao, X Wu - IEEE Transactions on Multimedia, 2024 - ieeexplore.ieee.org
With the prevalence of electronic devices in our daily lives, content leakages frequently
occur, and to enable leakage tracing, screen-shooting resistant watermarking has attracted …

Screen-shooting resilient watermarking

H Fang, W Zhang, H Zhou, H Cui… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a novel screen-shooting resilient watermarking scheme, which means
that if the watermarked image is displayed on the screen and the screen information is …