A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

A survey of deep neural network watermarking techniques

Y Li, H Wang, M Barni - Neurocomputing, 2021 - Elsevier
Abstract Protecting the Intellectual Property Rights (IPR) associated to Deep Neural
Networks (DNNs) is a pressing need pushed by the high costs required to train such …

ReDMark: Framework for residual diffusion watermarking based on deep networks

M Ahmadi, A Norouzi, N Karimi, S Samavi… - Expert Systems with …, 2020 - Elsevier
Due to the rapid growth of machine learning tools and specifically deep networks in various
computer vision and image processing areas, applications of Convolutional Neural …

Wavmark: Watermarking for audio generation

G Chen, Y Wu, S Liu, T Liu, X Du, F Wei - arxiv preprint arxiv:2308.12770, 2023 - arxiv.org
Recent breakthroughs in zero-shot voice synthesis have enabled imitating a speaker's voice
using just a few seconds of recording while maintaining a high level of realism. Alongside its …

Robust coverless image steganography based on DCT and LDA topic classification

X Zhang, F Peng, M Long - IEEE Transactions on Multimedia, 2018 - ieeexplore.ieee.org
In order to improve the robustness and capability of resisting image steganalysis, a novel
coverless image steganography algorithm based on discrete cosine transform and latent …

Current status and key issues in image steganography: A survey

MS Subhedar, VH Mankar - Computer science review, 2014 - Elsevier
Steganography and steganalysis are the prominent research fields in information hiding
paradigm. Steganography is the science of invisible communication while steganalysis is …

Reversible data hiding

Z Ni, YQ Shi, N Ansari, W Su - … on circuits and systems for video …, 2006 - ieeexplore.ieee.org
A novel reversible data hiding algorithm, which can recover the original image without any
distortion from the marked image after the hidden data have been extracted, is presented in …

[KNIHA][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

Information forensics: An overview of the first decade

MC Stamm, M Wu, KJR Liu - IEEE access, 2013 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …