[PDF][PDF] Image steganography techniques: an overview

N Hamid, A Yahya, RB Ahmad… - International Journal of …, 2012 - Citeseer
Steganography is one of the methods used for the hidden exchange of information and it
can be defined as the study of invisible communication that usually deals with the ways of …

Deepsigns: An end-to-end watermarking framework for ownership protection of deep neural networks

B Darvish Rouhani, H Chen, F Koushanfar - Proceedings of the twenty …, 2019 - dl.acm.org
Deep Learning (DL) models have created a paradigm shift in our ability to comprehend raw
data in various important fields, ranging from intelligence warfare and healthcare to …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

Exploring the learning capabilities of convolutional neural networks for robust image watermarking

H Kandi, D Mishra, SRKS Gorthi - Computers & Security, 2017 - Elsevier
Existing techniques of watermarking make use of transform domain to have better
robustness towards attacks. Here, we propose a novel learning based auto-encoder …

[หนังสือ][B] Digital watermarking and steganography: fundamentals and techniques

FY Shih - 2017 - taylorfrancis.com
This book intends to provide a comprehensive overview on different aspects of mechanisms
and techniques for information security. It is written for students, researchers, and …

Deepsigns: A generic watermarking framework for ip protection of deep learning models

BD Rouhani, H Chen, F Koushanfar - arxiv preprint arxiv:1804.00750, 2018 - arxiv.org
Deep Learning (DL) models have caused a paradigm shift in our ability to comprehend raw
data in various important fields, ranging from intelligence warfare and healthcare to …

[หนังสือ][B] Scientific foundations in research in Engineering

I Kornylo, O Gnyp, M Lemeshev, O Bereziuk, K Sivak… - 2022 - books.google.com
5.2 Calculation modelling thermophysical characteristics of fuel rods were Operating
conditions were analyzed, thermophysical characteristics calculated as applied to VVER …

[PDF][PDF] Fixed neural network steganography: Train the images, not the network

V Kishore, X Chen, Y Wang, B Li… - … conference on learning …, 2021 - drive.google.com
Recent attempts at image steganography make use of advances in deep learning to train an
encoder-decoder network pair to hide and retrieve secret messages in images. These …

Blackmarks: Blackbox multibit watermarking for deep neural networks

H Chen, BD Rouhani, F Koushanfar - arxiv preprint arxiv:1904.00344, 2019 - arxiv.org
Deep Neural Networks have created a paradigm shift in our ability to comprehend raw data
in various important fields ranging from computer vision and natural language processing to …

Contourlet-based image watermarking using optimum detector in a noisy environment

MA Akhaee, SME Sahraeian… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
In this paper, an improved multiplicative image watermarking system is presented. Since
human visual system is less sensitive to the image edges, watermarking is applied in the …