Deep Learning based Image Watermarking: A Brief Survey

X Zhong, A Das, F Alrasheedi, A Tanvir - arXiv preprint arXiv:2308.04603, 2023 - arxiv.org
The act of secretly embedding and extracting a watermark on a cover image to protect it is
known as image watermarking. In recent years, deep learning-based image watermarking …

A brief, in-depth survey of deep learning-based image watermarking

X Zhong, A Das, F Alrasheedi, A Tanvir - Applied Sciences, 2023 - mdpi.com
This paper presents a comprehensive survey of deep learning-based image watermarking;
this technique entails the invisible embedding and extraction of watermarks within a cover …

Unambiguous and high-fidelity backdoor watermarking for deep neural networks

G Hua, ABJ Teoh, Y Xiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The unprecedented success of deep learning could not be achieved without the synergy of
big data, computing power, and human knowledge, among which none is free. This calls for …

MISPSO-Attack: An efficient adversarial watermarking attack based on multiple initial solution particle swarm optimization

X Zuo, X Wang, W Zhang, Y Wang - Applied Soft Computing, 2023 - Elsevier
The vulnerability of deep learning models to adversarial attacks is a growing concern, as the
emergence of adversarial samples exposes almost all models to the risk of such attacks …

RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things

Z Chen, X Chai, Z Gan, B Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Medical images on the Internet of Medical Things (IoMT) can be easily collected, recognized
and analyzed by unauthorized individuals and companies using deep neural networks …

Adversarial data hiding with only one pixel

M Li, X Wang, Q Cui, J Zhang - Information Processing & Management, 2023 - Elsevier
Making adversarial samples to fool deep neural network (DNN) is an emerging research
direction of privacy protection, since the output of the attacker's DNN can be easily changed …

Adversarial data hiding in digital images

D Wang, M Li, Y Zhang - Entropy, 2022 - mdpi.com
In recent studies of generative adversarial networks (GAN), researchers have attempted to
combine adversarial perturbation with data hiding in order to protect the privacy and …

Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

M Li, Z Yang, T Wang, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, the uploading of massive personal images has increased the security risks,
mainly including privacy breaches and copyright infringement. Adversarial examples …

Adversarial watermark: A robust and reliable watermark against removal

J Wang, W Huang, J Zhang, X Luo, B Ma - Journal of Information Security …, 2024 - Elsevier
Digital image watermarking used to be an important tool for copyright protection. However,
as neural network-based watermark removal methods have been proposed in recent years …

针对身份证文本识别的黑盒攻击算法研究

徐昌凯, 冯卫栋, 张淳杰, 郑晓龙, 张辉, 王飞跃 - 自动化学报, 2024 - aas.net.cn
身份证认证场景多采用文本识别模型对身份证图片的字段进行提取, 识别和身份认证,
存在很大的隐私泄露隐患. 并且, 当前基于文本识别模型的对抗攻击算法大多只考虑简单背景的 …