[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pan et al., 2025 - Google Patents

Finding needles in a haystack: A black-box approach to invisible watermark detection

Pan et al., 2025

View PDF
Document ID
17974902928440570675
Author
Pan M
Wang Z
Dong X
Sehwag V
Lyu L
Lin X
Publication year
Publication venue
European Conference on Computer Vision

External Links

Snippet

In this paper, we propose WaterMark Detector (\(\textsc {WMD}\)), the first invisible watermark detection method under a black-box and annotation-free setting.\(\textsc {WMD}\) is capable of detecting arbitrary watermarks within a given detection dataset using a clean …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods

Similar Documents

Publication Publication Date Title
Wen et al. Tree-ring watermarks: Fingerprints for diffusion images that are invisible and robust
Chen et al. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Han et al. Content-based image authentication: current status, issues, and challenges
Hsu et al. Enhancing the robustness of image watermarking against cropping attacks with dual watermarks
Hadmi et al. Perceptual image hashing
Tanha et al. An overview of attacks against digital watermarking and their respective countermeasures
An et al. Benchmarking the robustness of image watermarks
Raj et al. Blockwise fragile watermarking schemes for tamper localization in digital images
Su Color image watermarking: algorithms and technologies
Pan et al. Finding needles in a haystack: A black-box approach to invisible watermark detection
CN106600516A (en) Digital fingerprint based image insertion method
Parah et al. Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication
Wu et al. Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics
Ye et al. Deep neural networks watermark via universal deep hiding and metric learning
Hassan et al. Steganalysis techniques and comparison of available softwares
Chen et al. When deep learning meets watermarking: A survey of application, attacks and defenses
Sajedi et al. HYSA: hybrid steganographic approach using multiple steganography methods
Kashifa et al. Digital Image Watermarking and Its Applications: A Detailed Review
Kumar et al. A compreshensive review on digital image watermarking techniques
Parasuraman et al. Reversible image watermarking using interpolation technique
Sahu Multimedia Watermarking: Latest Developments and Trends
Malshe et al. Survey of digital image watermarking techniques to achieve robustness
Nwoke Detection of pirated images on the internet using an algorithm
Tuncer et al. A watermarking application for authentication of Holy Quran
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking