An overview of digital video watermarking

M Asikuzzaman, MR Pickering - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …

Deep model intellectual property protection via deep watermarking

J Zhang, D Chen, J Liao, W Zhang… - … on Pattern Analysis …, 2021 - ieeexplore.ieee.org
Despite the tremendous success, deep neural networks are exposed to serious IP
infringement risks. Given a target deep model, if the attacker knows its full information, it can …

A comprehensive survey on three-dimensional mesh watermarking

K Wang, G Lavoué, F Denis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Three-dimensional (3-D) meshes have been used more and more in industrial, medical and
entertainment applications during the last decade. Many researchers, from both the …

Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection

HS Devi, KM Singh - Journal of Information Security and Applications, 2020 - Elsevier
This paper proposes a unique Red-Cyan Anaglyph image watermarking using DWT, Fast
Walsh Hadamard transform and SVD. Watermarking of this particular image is not done …

ThermoTag: A hidden ID of 3D printers for fingerprinting and watermarking

Y Gao, W Wang, Y **, C Zhou, W Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To address the increasing challenges of counterfeit detection and IP protection for 3D
printing, we propose that every 3D printer holds unique fingerprinting features characterized …

[PDF][PDF] Securing Copyright Using 3D Objects Blind Watermarking Scheme.

H Abulkasim, M Jamjoom… - Computers, Materials & …, 2022 - cdn.techscience.cn
Recently, securing Copyright has become a hot research topic due to rapidly advancing
information technology. As a host cover, watermarking methods are used to conceal or …

A high capacity 3D steganography algorithm

MW Chao, C Lin, CW Yu, TY Lee - IEEE transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme.
Our steganography approach is based on a novel multi-layered embedding scheme to hide …

A benchmark for 3D mesh watermarking

K Wang, G Lavoué, F Denis… - 2010 Shape Modeling …, 2010 - ieeexplore.ieee.org
This paper presents a benchmarking system for the evaluation of robust mesh watermarking
methods. The proposed benchmark has three different components: a''standard''mesh model …

A 3D steganalytic algorithm and steganalysis-resistant watermarking

Y Yang, R Pintus, H Rushmeier… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
We propose a simple yet efficient steganalytic algorithm for watermarks embedded by two
state-of-the-art 3D watermarking algorithms by Cho et al. The main observation is that while …

Optimized 3D watermarking for minimal surface distortion

AG Bors, M Luo - IEEE Transactions on Image Processing, 2012 - ieeexplore.ieee.org
This paper proposes a new approach to 3D watermarking by ensuring the optimal
preservation of mesh surfaces. A new 3D surface preservation function metric is defined …