Secure watermarking schemes and their approaches in the IoT technology: an overview

R Wazirali, R Ahmad, A Al-Amayreh, M Al-Madi… - Electronics, 2021 - mdpi.com
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …

Watermarking Techniques for Large Language Models: A Survey

Y Liang, J Xiao, W Gan, PS Yu - arXiv preprint arXiv:2409.00089, 2024 - arxiv.org
With the rapid advancement and extensive application of artificial intelligence technology,
large language models (LLMs) are extensively used to enhance production, creativity …

Blind reliable invisible watermarking method in wavelet domain for face image watermark

H Agarwal, B Raman, I Venkat - Multimedia Tools and Applications, 2015 - Springer
In this paper, we have combined watermarking and biometrics for possible improvement in
owner identification/verification technology. We have proposed and compared wavelet …

Image watermarking in real oriented wavelet transform domain

H Agarwal, PK Atrey, B Raman - Multimedia Tools and Applications, 2015 - Springer
In this paper, we propose blind and non-blind watermarking schemes in the real oriented
wavelet transform (ROWT) domain. The ROWT, which is a member of the dual tree complex …

Global resynchronization-based image watermarking resilient to geometric attacks

W Zhang, J Chen, Y Zhang - Computers & Electrical Engineering, 2018 - Elsevier
How to resist geometric attacks effectively and improve the watermark embedding capacity
are still challenging tasks. An algorithm with better capabilities to resist cropping and …

Securing Clinical Information Through Multimedia Watermarking Techniques

KR Devi, K Balasamy - … of Research on Mathematical Modeling for …, 2022 - igi-global.com
Today, in this technological world, the information available can be easily copied,
manipulated, as well as broadcasted among different channels, which should be protected …

Methods and arrangements for device to device communication

T Filler - US Patent 11,049,094, 2021 - Google Patents
The disclosure relates, eg, to image processing technology including device to device
communication. One claim recites an apparatus for device to device communication using …

基于喷泉码和人眼视觉系统的扩频数字水印方案

陈留洋, 鲁荣波, 滕娟 - 吉首大学学报(自然科学版), 2016 - zkxb.jsu.edu.cn
为了更好地在Contourlet 域里选择合适的嵌入位置和嵌入强度, 提出基于人眼视觉系统(HVS)
的视觉掩蔽. 利用此视觉掩蔽在Contourlet 域里选择适当的嵌入位置和嵌入强度来嵌入水印信息 …

Affine correction based image watermarking robust to geometric attacks

W Zhang, J Chen, R Wang, X Wang… - 2016 17th International …, 2016 - ieeexplore.ieee.org
How to resist combined geometric attacks effectively while maintain a high embedding
capacity is still a challenging task for the digital watermarking research. An affine correction …

Improving Steganographic capacity using distributed steganography over BMP

II Araujo, H Kazemian - Multimedia Tools and Applications, 2020 - Springer
Our research area tackles the improvement of private data security using our proposed
Steganographic method called DSoBMP-I (Distributed Steganography over BMP faze I) to …