A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

Recent trends in image watermarking techniques for copyright protection: a survey

A Ray, S Roy - International Journal of Multimedia Information …, 2020 - Springer
Digital copyright protection signifies the technology of rights protection, utilization control,
and management of digital substances in the activity of production, propagation, retailing …

Robust watermarking algorithm for medical images based on log-polar transform

T Li, J Li, J Liu, M Huang, YW Chen… - EURASIP Journal on …, 2022 - Springer
In the information age, network security has gradually become a potentially huge problem,
especially in the medical field, it is essential to ensure the accuracy and safety of images …

Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithm

E Gul, AN Toprak - Expert Systems with Applications, 2023 - Elsevier
Today, advances in photo editing and manipulation software and widespread access to
social media have made it easier for unauthorized persons to manipulate and copy digital …

Image watermarking between conventional and learning-based techniques: a literature review

S Boujerfaoui, R Riad, H Douzi, F Ros, R Harba - Electronics, 2022 - mdpi.com
Currently, most transactions and exchanges are conducted through the Internet thanks to
technological tools, running the risk of the falsification and distortion of information. This is …

Backdoor Attacks with Wavelet Embedding: Revealing and enhancing the insights of vulnerabilities in visual object detection models on transformers within digital twin …

M Shen, R Huang - Advanced Engineering Informatics, 2024 - Elsevier
Given the pervasive use of deep learning models across various domains, ensuring model
security has emerged as a critical concern. This paper examines backdoor attacks, a form of …

A robust zero-watermarkinging algorithm based on PHTs-DCT for medical images in the encrypted domain

D Yi, J Li, Y Fang, W Cui, X Xiao, UA Bhatti… - Innovation in Medicine …, 2021 - Springer
In the process of network transmission, medical images are maliciously attacked to cause
the loss of diagnostic data or the leakage of patient privacy. To solve this problem, this paper …

A Neural-Network-Based Watermarking Method Approximating JPEG Quantization

S Yamauchi, M Kawamura - Journal of Imaging, 2024 - mdpi.com
We propose a neural-network-based watermarking method that introduces the quantized
activation function that approximates the quantization of JPEG compression. Many neural …

[PDF][PDF] Image Watermarking between Conventional and Learning-Based Techniques: A Literature Review. Electronics 2023, 12, 74

S Boujerfaoui, R Riad, H Douzi, F Ros, R Harba - 2022 - researchgate.net
Currently, most transactions and exchanges are conducted through the Internet thanks to
technological tools, running the risk of the falsification and distortion of information. This is …

[PDF][PDF] Analisis Kualitas Stego Video dalam Penyisipan Data Memanfaatkan Metode DCT-DWT

AS Pratama, IM Suartana - Journal Information Engineering and …, 2021 - academia.edu
Peran media digital saat ini merupakan dampak dari pencapaian teknologi terkini. Tidak
dapat dipungkiri bahwa internet merupakan sarana akses data dan komunikasi yang paling …