A survey of deep neural network watermarking techniques

Y Li, H Wang, M Barni - Neurocomputing, 2021 - Elsevier
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …

Adversarial frontier stitching for remote neural network watermarking

E Le Merrer, P Perez, G Trédan - Neural Computing and Applications, 2020 - Springer
The state-of-the-art performance of deep learning models comes at a high cost for
companies and institutions, due to the tedious data collection and the heavy processing …

On the properties of non-media digital watermarking: a review of state of the art techniques

AS Panah, R Van Schyndel, T Sellis, E Bertino - IEEE Access, 2016 - ieeexplore.ieee.org
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …

A fast method for robust video watermarking based on zernike moments

S Chen, A Malik, X Zhang, G Feng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Watermarking by Zernike moments has been proven to be effective in providing high
rotational resistance. However, due to the high computational complexity, the conventional …

Graph clustering and anomaly detection of access control log for forensic purposes

H Studiawan, C Payne, F Sohel - Digital Investigation, 2017 - Elsevier
Attacks on operating system access control have become a significant and increasingly
common problem. This type of security threat is recorded in a forensic artifact such as an …

Robust and imperceptible black-box DNN watermarking based on Fourier perturbation analysis and frequency sensitivity clustering

Y Liu, H Wu, X Zhang - IEEE Transactions on Dependable and …, 2024 - ieeexplore.ieee.org
Recently, more and more attention has been focused on the intellectual property protection
of deep neural networks (DNNs), promoting DNN watermarking to become a hot research …

Robust {Optimization-Based} watermarking scheme for sequential data

E Ayday, E Yilmaz, A Yilmaz - … on Research in Attacks, Intrusions and …, 2019 - usenix.org
In this work, we address the liability issues that may arise due to unauthorized sharing of
personal data. We consider a scenario in which an individual shares his sequential data …

New results on distributed secret sharing protocols

A De Santis, B Masucci - IFIP Annual Conference on Data and Applications …, 2023 - Springer
Abstract A Distributed Secret Sharing Protocol (DSSP for short) allows a dealer to share
multiple secrets among a set of users by storing the shares on storage nodes distributed …

Graph spectral domain blind watermarking

H Al-Khafaji, C Abhayaratne - ICASSP 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
This paper proposes the first ever graph spectral domain blind watermarking algorithm. We
explore the recently developed graph signal processing for spread-spectrum watermarking …

Probabilistic Fingerprinting Scheme for Correlated Data

E Yilmaz, E Ayday - IFIP Annual Conference on Data and Applications …, 2023 - Springer
In order to receive personalized services, individuals share their personal data with a wide
range of service providers, hoping that their data will remain confidential. Thus, in case of an …