A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

[HTML][HTML] Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

[PDF][PDF] 信息安全综述

沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 - 2007 - metc.hactcm.edu.cn
摘要21 世纪是信息的时代. 信息成为一种重要的战略资源, 信息的获取, 处理和安全保障能力
成为一个国家综合国力的重要组成部分. 信息安全事关国家安全, 事关社会稳定. 因此 …

A survey of deep neural network watermarking techniques

Y Li, H Wang, M Barni - Neurocomputing, 2021 - Elsevier
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …

ReDMark: Framework for residual diffusion watermarking based on deep networks

M Ahmadi, A Norouzi, N Karimi, S Samavi… - Expert Systems with …, 2020 - Elsevier
Due to the rapid growth of machine learning tools and specifically deep networks in various
computer vision and image processing areas, applications of Convolutional Neural …

Current status and key issues in image steganography: A survey

MS Subhedar, VH Mankar - Computer science review, 2014 - Elsevier
Steganography and steganalysis are the prominent research fields in information hiding
paradigm. Steganography is the science of invisible communication while steganalysis is …

Watermarking schemes for digital images: Robustness overview

O Evsutin, K Dzhanashia - Signal Processing: Image Communication, 2022 - Elsevier
Digital watermarking is an important scientific direction located at the intersection of
cybersecurity and multimedia processing. Digital watermarking is used for digital objects …

Reversible data hiding

Z Ni, YQ Shi, N Ansari, W Su - … on circuits and systems for video …, 2006 - ieeexplore.ieee.org
A novel reversible data hiding algorithm, which can recover the original image without any
distortion from the marked image after the hidden data have been extracted, is presented in …

[图书][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …