F Cao, T Wang, D Guo, J Li, C Qin - Journal of Visual Communication and …, 2023 - Elsevier
Currently, digital mobile devices, especially smartphones, can be used to acquire information conveniently through photograph taking. To protect information security in this …
W Chen, Y Li, Z Niu, Y Xu, A Keskinarkaus… - Knowledge-Based …, 2024 - Elsevier
Unauthorized photography of screen-loaded information has become a low-cost and difficult- to-trace method for leakage. Many researchers have proposed screen-cam robust …
W Chen, N Ren, C Zhu, Q Zhou, T Seppänen… - Applied Sciences, 2020 - mdpi.com
The screen-cam process, which is taking pictures of the content displayed on a screen with mobile phones or cameras, is one of the main ways that image information is leaked …
W Chen, C Zhu, N Ren, T Seppänen… - IEEE …, 2020 - ieeexplore.ieee.org
To achieve watermark synchronization from an image with perspective distortion is a challenge. This paper proposes a screen-cam robust and blind watermarking scheme for tile …
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking …
B Ma, K Du, J Xu, C Wang, J Li, L Zhou - Journal of Information Security and …, 2023 - Elsevier
This paper presents a screen-shooting resilient data-hiding scheme for JPEG images based on a two-level Singular Value Decomposition (SVD). The mid-to-high frequency coefficients …
Camcorder piracy refers to the process of using a camcorder to record a screen that displays copyrighted content. In contrast to the previous works that aimed at detecting the occurrence …
Y Bai, L Li, S Zhang, J Lu, M Emam - Mathematics, 2023 - mdpi.com
With high performances of image capturing tools, image information can be easily obtained by screenshots that make image copyright protection a challenging task. The existing screen …
Z Gan, X Zheng, Y Song, X Chai - Signal, Image and Video Processing, 2024 - Springer
In recent years, there has been an increasing concern regarding the security and copyright issues associated with images. Unscrupulous individuals exploit electronic images through …