[PDF][PDF] Image steganography techniques: an overview

N Hamid, A Yahya, RB Ahmad… - International Journal of …, 2012 - Citeseer
Steganography is one of the methods used for the hidden exchange of information and it
can be defined as the study of invisible communication that usually deals with the ways of …

Deepsigns: An end-to-end watermarking framework for ownership protection of deep neural networks

B Darvish Rouhani, H Chen, F Koushanfar - Proceedings of the twenty …, 2019 - dl.acm.org
Deep Learning (DL) models have created a paradigm shift in our ability to comprehend raw
data in various important fields, ranging from intelligence warfare and healthcare to …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

[图书][B] Digital watermarking and steganography: fundamentals and techniques

FY Shih - 2017 - taylorfrancis.com
This book intends to provide a comprehensive overview on different aspects of mechanisms
and techniques for information security. It is written for students, researchers, and …

Exploring the learning capabilities of convolutional neural networks for robust image watermarking

H Kandi, D Mishra, SRKS Gorthi - Computers & Security, 2017 - Elsevier
Existing techniques of watermarking make use of transform domain to have better
robustness towards attacks. Here, we propose a novel learning based auto-encoder …

Deepsigns: A generic watermarking framework for ip protection of deep learning models

BD Rouhani, H Chen, F Koushanfar - arXiv preprint arXiv:1804.00750, 2018 - arxiv.org
Deep Learning (DL) models have caused a paradigm shift in our ability to comprehend raw
data in various important fields, ranging from intelligence warfare and healthcare to …

Contourlet-based image watermarking using optimum detector in a noisy environment

MA Akhaee, SME Sahraeian… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
In this paper, an improved multiplicative image watermarking system is presented. Since
human visual system is less sensitive to the image edges, watermarking is applied in the …

[PDF][PDF] A modified high capacity image steganography technique based on wavelet transform

A Al-Ataby, F Al-Naima - changes, 2008 - academia.edu
Steganography is the art and science of concealing information in unremarkable cover
media so as not to arouse an eavesdropper's suspicion. It is an application under …

Blackmarks: Blackbox multibit watermarking for deep neural networks

H Chen, BD Rouhani, F Koushanfar - arXiv preprint arXiv:1904.00344, 2019 - arxiv.org
Deep Neural Networks have created a paradigm shift in our ability to comprehend raw data
in various important fields ranging from computer vision and natural language processing to …

[图书][B] Scientific foundations in research in Engineering

I Kornylo, O Gnyp, M Lemeshev, O Bereziuk, K Sivak… - 2022 - books.google.com
Operating conditions were analyzed, thermophysical characteristics were calculated as
applied to VVER-1000 fuel rods in four-year cycle for unified core. Models for calculating gas …