Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …

A survey of deep neural network watermarking techniques

Y Li, H Wang, M Barni - Neurocomputing, 2021 - Elsevier
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …

Deepmarks: A secure fingerprinting framework for digital rights management of deep learning models

H Chen, BD Rouhani, C Fu, J Zhao… - Proceedings of the 2019 …, 2019 - dl.acm.org
Deep Neural Networks (DNNs) are revolutionizing various critical fields by providing an
unprecedented leap in terms of accuracy and functionality. Due to the costly training …

[KNJIGA][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

Data-hiding codes

P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …

Piecewise planar stereo for image-based rendering

S Sinha, D Steedly, R Szeliski - 2009 International Conference on …, 2009 - microsoft.com
We present a novel multi-view stereo method designed for image-based rendering that
generates piecewise planar depth maps from an unordered collection of photographs. First …

Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification

WN Lie, LC Chang - IEEE transactions on multimedia, 2006 - ieeexplore.ieee.org
This work proposes a method of embedding digital watermarks into audio signals in the time
domain. The proposed algorithm exploits differential average-of-absolute-amplitude …

Data hiding in image and video. I. Fundamental issues and solutions

M Wu, B Liu - IEEE Transactions on image processing, 2003 - ieeexplore.ieee.org
We address a number of fundamental issues of data hiding in image and video and propose
general solutions to them. We begin with a review of two major types of embedding, based …

[PDF][PDF] Search problems in cryptography: from fingerprinting to lattice sieving

T Laarhoven - 2016 - research.tue.nl
Search problems in cryptography Page 1 Search problems in cryptography: from fingerprinting
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …

Video fingerprinting and encryption principles for digital rights management

D Kundur, K Karthik - Proceedings of the IEEE, 2004 - ieeexplore.ieee.org
This paper provides a tutorial and survey of digital fingerprinting and video scrambling
algorithms based on partial encryption. Necessary design tradeoffs for algorithm …