Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

Current status and key issues in image steganography: A survey

MS Subhedar, VH Mankar - Computer science review, 2014 - Elsevier
Steganography and steganalysis are the prominent research fields in information hiding
paradigm. Steganography is the science of invisible communication while steganalysis is …

[PDF][PDF] 信息安全综述

沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 - 2007 - metc.hactcm.edu.cn
摘要21 世纪是信息的时代. 信息成为一种重要的战略资源, 信息的获取, 处理和安全保障能力
成为一个国家综合国力的重要组成部分. 信息安全事关国家安全, 事关社会稳定. 因此 …

A survey on LLM-generated text detection: Necessity, methods, and future directions

J Wu, S Yang, R Zhan, Y Yuan, LS Chao… - Computational …, 2025 - direct.mit.edu
The remarkable ability of large language models (LLMs) to comprehend, interpret, and
generate complex language has rapidly integrated LLM-generated text into various aspects …

RNN-stega: Linguistic steganography based on recurrent neural networks

ZL Yang, XQ Guo, ZM Chen, YF Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Linguistic steganography based on text carrier auto-generation technology is a current topic
with great promise and challenges. Limited by the text automatic generation technology or …

Distortion agnostic deep watermarking

X Luo, R Zhan, H Chang, F Yang… - Proceedings of the …, 2020 - openaccess.thecvf.com
Watermarking is the process of embedding information into an image that can survive under
distortions, while requiring the encoded image to have little or no perceptual difference with …

A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine

A Zear, AK Singh, P Kumar - Multimedia tools and applications, 2018 - Springer
In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms
(DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been …

An overview of digital video watermarking

M Asikuzzaman, MR Pickering - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …

Opposition-based learning: a new scheme for machine intelligence

HR Tizhoosh - … for modelling, control and automation and …, 2005 - ieeexplore.ieee.org
Opposition-based learning as a new scheme for machine intelligence is introduced.
Estimates and counter-estimates, weights and opposite weights, and actions versus counter …

Reversible data hiding

Z Ni, YQ Shi, N Ansari, W Su - … on circuits and systems for video …, 2006 - ieeexplore.ieee.org
A novel reversible data hiding algorithm, which can recover the original image without any
distortion from the marked image after the hidden data have been extracted, is presented in …