This paper presents a comprehensive survey of deep learning-based image watermarking; this technique entails the invisible embedding and extraction of watermarks within a cover …
The unprecedented success of deep learning could not be achieved without the synergy of big data, computing power, and human knowledge, among which none is free. This calls for …
X Zuo, X Wang, W Zhang, Y Wang - Applied Soft Computing, 2023 - Elsevier
The vulnerability of deep learning models to adversarial attacks is a growing concern, as the emergence of adversarial samples exposes almost all models to the risk of such attacks …
Z Chen, X Chai, Z Gan, B Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Medical images on the Internet of Medical Things (IoMT) can be easily collected, recognized and analyzed by unauthorized individuals and companies using deep neural networks …
M Li, X Wang, Q Cui, J Zhang - Information Processing & Management, 2023 - Elsevier
Making adversarial samples to fool deep neural network (DNN) is an emerging research direction of privacy protection, since the output of the attacker's DNN can be easily changed …
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and …
M Li, Z Yang, T Wang, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, the uploading of massive personal images has increased the security risks, mainly including privacy breaches and copyright infringement. Adversarial examples …
J Wang, W Huang, J Zhang, X Luo, B Ma - Journal of Information Security …, 2024 - Elsevier
Digital image watermarking used to be an important tool for copyright protection. However, as neural network-based watermark removal methods have been proposed in recent years …