Mahapatra, 2022 - Google Patents
Deep Learning-Based Watermarking SystemsMahapatra, 2022
View PDF- Document ID
- 10652732217022960552
- Author
- Mahapatra D
- Publication year
External Links
Snippet
Over the last decade, we have witnessed a Digital Revolution that has led to a large availability and ease of access to online content across the Internet. However, there have been several challenges and threats towards the maintenance of such content on the web …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
- G06K9/527—Scale-space domain transformation, e.g. with wavelet analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | Robust high-capacity watermarking over online social network shared images | |
Xu et al. | Structural design of convolutional neural networks for steganalysis | |
Garg et al. | Neural style transfer for image steganography and destylization with supervised image to image translation | |
Khoo et al. | Deepfake attribution: On the source identification of artificially generated images | |
Kim et al. | CNN-based image steganalysis using additional data embedding | |
Singh et al. | Comprehensive review of watermarking techniques in deep-learning environments | |
Chang | [Retracted] Neural Reversible Steganography with Long Short‐Term Memory | |
Mahapatra et al. | Autoencoder-convolutional neural network-based embedding and extraction model for image watermarking | |
Gao et al. | A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain | |
Ouyang et al. | A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion | |
Bertini et al. | Are social networks watermarking us or are we (unawarely) watermarking ourself? | |
Zhu et al. | Robust location-secured high-definition image watermarking based on key-point detection and deep learning | |
Su et al. | JPEG steganalysis based on ResNeXt with gauss partial derivative filters | |
Begum et al. | Towards the development of an effective image watermarking system | |
Shaik et al. | A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication | |
Li et al. | Robust image steganography framework based on generative adversarial network | |
Tyagi et al. | ForensicNet: Modern convolutional neural network‐based image forgery detection network | |
Deng et al. | A survey of defenses against ai-generated visual media: Detection, disruption, and authentication | |
Shukla et al. | A survey on digital image forensic methods based on blind forgery detection | |
Sonam et al. | Secure digital image watermarking using memristor-based hyperchaotic circuit | |
Mo et al. | MDRSteg: large-capacity image steganography based on multi-scale dilated ResNet and combined chi-square distance loss | |
Darwish et al. | Improved color image watermarking using logistic maps and quaternion Legendre-Fourier moments | |
Dong et al. | Implicit neural representation steganography by neuron pruning | |
Mahapatra | Deep Learning-Based Watermarking Systems | |
Darwish et al. | Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function |