Watermarking techniques used in medical images: a survey

SM Mousavi, A Naghsh, SAR Abu-Bakar - Journal of digital imaging, 2014 - Springer
The ever-growing numbers of medical digital images and the need to share them among
specialists and hospitals for better and more accurate diagnosis require that patients' privacy …

Proactive image manipulation detection

V Asnani, X Yin, T Hassner, S Liu… - Proceedings of the …, 2022 - openaccess.thecvf.com
Image manipulation detection algorithms are often trained to discriminate between images
manipulated with particular Generative Models (GMs) and genuine/real images, yet …

Faketagger: Robust safeguards against deepfake dissemination via provenance tracking

R Wang, F Juefei-Xu, M Luo, Y Liu… - Proceedings of the 29th …, 2021 - dl.acm.org
In recent years, DeepFake is becoming a common threat to our society, due to the
remarkable progress of generative adversarial networks (GAN) in image synthesis …

RD-IWAN: Residual dense based imperceptible watermark attack network

C Wang, Q Hao, S Xu, B Ma, Z Xia, Q Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Digital watermarking technology and watermark attack methods are mutually reinforcing and
complementary. Currently, traditional watermark attack methods are relatively mature, but …

Performance comparison of various watermarking techniques

P Garg, RR Kishore - Multimedia Tools and Applications, 2020 - Springer
Digital watermarking is a method to provide authenticity and copyright ownership to digital
content by embedding any presume content like audio, text, data or video into the original …

Finding needles in a haystack: A black-box approach to invisible watermark detection

M Pan, Z Wang, X Dong, V Sehwag, L Lyu… - European Conference on …, 2025 - Springer
In this paper, we propose WaterMark Detector (\(\textsc {WMD}\)), the first invisible
watermark detection method under a black-box and annotation-free setting.\(\textsc {WMD}\) …

Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm

Y Shen, C Tang, Z Fan, T Wu, Z Lei - Expert Systems with Applications, 2024 - Elsevier
The widely used watermarking technique is to hide the watermark information through
adding process, which means the watermark is added with the host image to realize …

Properties of digital image watermarking

M Abdullatif, AM Zeki, J Chebil… - 2013 IEEE 9th …, 2013 - ieeexplore.ieee.org
Digital image watermarking techniques have been developed widely in recent years to
maintain the broadcasting media and content authentication, broadcast monitoring, copy …

[PDF][PDF] Digital Watermarking, Methodology, Techniques, and Attacks: A Review

HM Al-Dabbas, RA Azeez, AE Ali - Iraqi Journal of Science, 2023 - iasj.net
The use of multimedia technology is growing every day, and it is difficult and timeconsuming
to provide allowed data while preventing secret information from being used without …

Robust data hiding using inverse gradient attention

H Zhang, H Wang, Y Cao, C Shen, Y Li - arXiv preprint arXiv:2011.10850, 2020 - arxiv.org
Data hiding is the procedure of encoding desired information into a certain types of cover
media (eg images) to resist potential noises for data recovery, while ensuring the embedded …