Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Information forensics: An overview of the first decade
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …
development of VLSI technologies, to communication and networking infrastructure, to the …
A survey of deep neural network watermarking techniques
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …
Networks (DNNs) is a pressing need pushed by the high costs required to train such …
Deepmarks: A secure fingerprinting framework for digital rights management of deep learning models
Deep Neural Networks (DNNs) are revolutionizing various critical fields by providing an
unprecedented leap in terms of accuracy and functionality. Due to the costly training …
unprecedented leap in terms of accuracy and functionality. Due to the costly training …
[KNJIGA][B] Digital watermarking and steganography
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …
respective owners. Unfortunately, along the way, individuals may choose to intervene and …
Data-hiding codes
P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …
information in signals such as images, video, audio, graphics, and text. Such codes have …
Piecewise planar stereo for image-based rendering
We present a novel multi-view stereo method designed for image-based rendering that
generates piecewise planar depth maps from an unordered collection of photographs. First …
generates piecewise planar depth maps from an unordered collection of photographs. First …
Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification
WN Lie, LC Chang - IEEE transactions on multimedia, 2006 - ieeexplore.ieee.org
This work proposes a method of embedding digital watermarks into audio signals in the time
domain. The proposed algorithm exploits differential average-of-absolute-amplitude …
domain. The proposed algorithm exploits differential average-of-absolute-amplitude …
Data hiding in image and video. I. Fundamental issues and solutions
M Wu, B Liu - IEEE Transactions on image processing, 2003 - ieeexplore.ieee.org
We address a number of fundamental issues of data hiding in image and video and propose
general solutions to them. We begin with a review of two major types of embedding, based …
general solutions to them. We begin with a review of two major types of embedding, based …
[PDF][PDF] Search problems in cryptography: from fingerprinting to lattice sieving
T Laarhoven - 2016 - research.tue.nl
Search problems in cryptography Page 1 Search problems in cryptography: from fingerprinting
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …
to lattice sieving Citation for published version (APA): Laarhoven, T. (2016). Search problems …
Video fingerprinting and encryption principles for digital rights management
This paper provides a tutorial and survey of digital fingerprinting and video scrambling
algorithms based on partial encryption. Necessary design tradeoffs for algorithm …
algorithms based on partial encryption. Necessary design tradeoffs for algorithm …