An overview of digital video watermarking
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …
Deep model intellectual property protection via deep watermarking
Despite the tremendous success, deep neural networks are exposed to serious IP
infringement risks. Given a target deep model, if the attacker knows its full information, it can …
infringement risks. Given a target deep model, if the attacker knows its full information, it can …
A comprehensive survey on three-dimensional mesh watermarking
K Wang, G Lavoué, F Denis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Three-dimensional (3-D) meshes have been used more and more in industrial, medical and
entertainment applications during the last decade. Many researchers, from both the …
entertainment applications during the last decade. Many researchers, from both the …
Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection
This paper proposes a unique Red-Cyan Anaglyph image watermarking using DWT, Fast
Walsh Hadamard transform and SVD. Watermarking of this particular image is not done …
Walsh Hadamard transform and SVD. Watermarking of this particular image is not done …
ThermoTag: A hidden ID of 3D printers for fingerprinting and watermarking
To address the increasing challenges of counterfeit detection and IP protection for 3D
printing, we propose that every 3D printer holds unique fingerprinting features characterized …
printing, we propose that every 3D printer holds unique fingerprinting features characterized …
[PDF][PDF] Securing Copyright Using 3D Objects Blind Watermarking Scheme.
Recently, securing Copyright has become a hot research topic due to rapidly advancing
information technology. As a host cover, watermarking methods are used to conceal or …
information technology. As a host cover, watermarking methods are used to conceal or …
A high capacity 3D steganography algorithm
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme.
Our steganography approach is based on a novel multi-layered embedding scheme to hide …
Our steganography approach is based on a novel multi-layered embedding scheme to hide …
A benchmark for 3D mesh watermarking
K Wang, G Lavoué, F Denis… - 2010 Shape Modeling …, 2010 - ieeexplore.ieee.org
This paper presents a benchmarking system for the evaluation of robust mesh watermarking
methods. The proposed benchmark has three different components: a''standard''mesh model …
methods. The proposed benchmark has three different components: a''standard''mesh model …
A 3D steganalytic algorithm and steganalysis-resistant watermarking
We propose a simple yet efficient steganalytic algorithm for watermarks embedded by two
state-of-the-art 3D watermarking algorithms by Cho et al. The main observation is that while …
state-of-the-art 3D watermarking algorithms by Cho et al. The main observation is that while …
Optimized 3D watermarking for minimal surface distortion
AG Bors, M Luo - IEEE Transactions on Image Processing, 2012 - ieeexplore.ieee.org
This paper proposes a new approach to 3D watermarking by ensuring the optimal
preservation of mesh surfaces. A new 3D surface preservation function metric is defined …
preservation of mesh surfaces. A new 3D surface preservation function metric is defined …