Pan et al., 2025 - Google Patents
Finding needles in a haystack: A black-box approach to invisible watermark detectionPan et al., 2025
View PDF- Document ID
- 17974902928440570675
- Author
- Pan M
- Wang Z
- Dong X
- Sehwag V
- Lyu L
- Lin X
- Publication year
- Publication venue
- European Conference on Computer Vision
External Links
Snippet
In this paper, we propose WaterMark Detector (\(\textsc {WMD}\)), the first invisible watermark detection method under a black-box and annotation-free setting.\(\textsc {WMD}\) is capable of detecting arbitrary watermarks within a given detection dataset using a clean …
- 238000001514 detection method 0 title abstract description 156
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wen et al. | Tree-ring watermarks: Fingerprints for diffusion images that are invisible and robust | |
Chen et al. | A fuzzy c-means clustering-based fragile watermarking scheme for image authentication | |
Han et al. | Content-based image authentication: current status, issues, and challenges | |
Hsu et al. | Enhancing the robustness of image watermarking against cropping attacks with dual watermarks | |
Hadmi et al. | Perceptual image hashing | |
Tanha et al. | An overview of attacks against digital watermarking and their respective countermeasures | |
An et al. | Benchmarking the robustness of image watermarks | |
Raj et al. | Blockwise fragile watermarking schemes for tamper localization in digital images | |
Su | Color image watermarking: algorithms and technologies | |
Pan et al. | Finding needles in a haystack: A black-box approach to invisible watermark detection | |
CN106600516A (en) | Digital fingerprint based image insertion method | |
Parah et al. | Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication | |
Wu et al. | Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics | |
Ye et al. | Deep neural networks watermark via universal deep hiding and metric learning | |
Hassan et al. | Steganalysis techniques and comparison of available softwares | |
Chen et al. | When deep learning meets watermarking: A survey of application, attacks and defenses | |
Sajedi et al. | HYSA: hybrid steganographic approach using multiple steganography methods | |
Kashifa et al. | Digital Image Watermarking and Its Applications: A Detailed Review | |
Kumar et al. | A compreshensive review on digital image watermarking techniques | |
Parasuraman et al. | Reversible image watermarking using interpolation technique | |
Sahu | Multimedia Watermarking: Latest Developments and Trends | |
Malshe et al. | Survey of digital image watermarking techniques to achieve robustness | |
Nwoke | Detection of pirated images on the internet using an algorithm | |
Tuncer et al. | A watermarking application for authentication of Holy Quran | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking |