Filters








278 Hits in 4.1 sec

A Comprehensive Study of Deep Learning Based Covert Communication

Ashima Anand, Amit Kumar Singh
2022 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
Further, major role of deep learning in the area of information hiding are highlighted.  ...  Deep learning-based methods have been popular in multimedia analysis tasks, including classification, detection, segmentation, and so on.  ...  Deep neural network (DNN), convolutional neural network (CNN) and recurrent neural network (RNN) are some of the commonly used deep learning models.  ... 
doi:10.1145/3508365 fatcat:kboo4h4gn5gahd6yimd3i4d5my

A Secure Image Watermarking Architecture based on DWT-DCT Domain and Pseudo-Random Number

2019 International journal of recent technology and engineering  
Protection against tapering the media contents is one of the challenges facing the individuals and industry in a digital age, in another hand rise of artificial neural network models such as deep fake  ...  In this method, we used four random number as seeds generated by a pseudo-random number generator, randomised numbers used as Initial value for encryption of watermark image.  ...  They create PRN using Elman neural network, then decompose the image into domain wavelet and watermark the cover image using the PRN sequence generated by the neural network.  ... 
doi:10.35940/ijrte.d8724.118419 fatcat:fmj2uounwva7bjkoaacjwv5jii

Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations [article]

Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu
2021 arXiv   pre-print
To deal with such security threats, a few deep neural networks (DNN) IP protection methods have been proposed in recent years.  ...  The training and creation of deep learning model is usually costly, thus it can be regarded as an intellectual property (IP) of the model creator.  ...  Index Terms-Deep neural networks, intellectual property protection, machine learning security, taxonomy, attack resistance I.  ... 
arXiv:2011.13564v2 fatcat:lbts5q52b5axzlmuitb2u62dfa

CropDefender: deep watermark which is more convenient to train and more robust against cropping [article]

Jiayu Ding, Yuchen Cao, Changhao Shi
2021 arXiv   pre-print
In recent years, some research has proposed the use of neural networks to add watermarks to natural images. We take StegaStamp as an example for our research.  ...  By explicitly introducing the perturbation of cropping into the training, the cropping resistance is significantly improved.  ...  In our experiments, we found that the neural-network-based watermark generation technique has amazing robustness.  ... 
arXiv:2109.06651v1 fatcat:gqpocwzcr5hejoo6mlgspk7poy

Framework for Improvising Dual Digital Watermarking through Deep Learning Techniques

Saranya. G, Mrs. Priya Vijay
2018 International Journal of Engineering Research and  
The papers also propose a framework with Deep learning techniques to improvise the existing systems.  ...  Achieving better compression rates in dual digital watermarking is still area of concern. Digital watermarking has four techniques for compression the image.  ...  III FRAMEWORK MODEL The proposed system implements Convolutional Neural Network(CNN) is the deep class that is it is implemented by Forward Neural Networks(FNN) which is used to analysis the visual image  ... 
doi:10.17577/ijertv7is020138 fatcat:bfqj7rm3k5hlje5ibtqhnlw6di

Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach

Ali Alzahrani, Mohammad Ayoub Khan
2022 Security and Communication Networks  
In this paper, a deep learning method based on a convolution neural network (CNN) algorithm was proposed to detect various types of watermarking attacks, namely, median filter, Gaussian filter, salt-and-pepper  ...  , average filter, motion blur, and no attack, to improve the watermarking quality.  ...  Artificial neural networks (ANNs) with several layers are referred to as "deep learning" or "deep neural networks."  ... 
doi:10.1155/2022/4408336 fatcat:nicpyvlzqzczhknvesjp2epzmm

Special issue on real-time image watermarking and forensics in cloud computing

Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang
2019 Journal of Real-Time Image Processing  
Another paper entitled "Deep Neural Networks for Efficient Steganographic Payload Location", co-authored by Yu Sun, Hao Zhang, Tao Zhang, and Ran Wang, presents a tailored deep neural network (DNN) with  ...  Image forensics The paper entitled "A Multi-purpose Image Forensic Method Using Densely Connected Convolutional Neural Networks", co-authored by Yifang Chen, Xiangui Kang, Yun-Qing Shi, and Z.  ... 
doi:10.1007/s11554-019-00881-y fatcat:qgkqy5fxxbhfhj3l4ptrmcoewy

An Automated and Robust Image Watermarking Scheme Based on Deep Neural Networks [article]

Xin Zhong, Pei-Chi Huang, Spyridon Mastorakis, Frank Y. Shih
2020 arXiv   pre-print
In this paper, a robust and blind image watermarking scheme based on deep learning neural networks is proposed.  ...  To minimize the requirement of domain knowledge, the fitting ability of deep neural networks is exploited to learn and generalize an automated image watermarking algorithm.  ...  Preparation of Datasets The proposed deep learning-based image watermarking architecture was trained as a single deep neural network.  ... 
arXiv:2007.02460v1 fatcat:5bd4a3xmjvge7he6wv5cv2jlce

Guest editorial: Recent trends in multimedia data-hiding: a reliable mean for secure communications

Amit Kumar Singh, Zhihan Lv, Huimin Lu, Xiaojun Chang
2019 Journal of Ambient Intelligence and Humanized Computing  
"A study on user recognition using 2D ECG based on ensemble of deep convolutional neural networks" presents a user recognition method based on ensemble networks using ECG signals.  ...  "Secret Image Sharing Scheme with Encrypted Shadow Images using Optimal Homomorphic Encryption Technique", a wavelet-based secret image sharing scheme using optimal Homomorphic Encryption is proposed.  ... 
doi:10.1007/s12652-019-01499-5 fatcat:2yletid6wngcnn2m5j2cunx6oe

Data hiding in encryption–compression domain

O. P. Singh, A. K. Singh
2021 Complex & Intelligent Systems  
Additionally, de-noising convolutional neural network is performed at extracted mark data to enhance the robustness of the scheme.  ...  Then, we use appropriate scaling factor to invisibly embed the singular value of watermark data into the lower frequency sub-band of the host image.  ...  Deep Learning toolbox is used to apply pre-trained denoising convolutional neural network. The several steps of De-noising process of recovered data are described in Algorithm 4.  ... 
doi:10.1007/s40747-021-00309-w fatcat:ptywxlnf6jf75b55sgjmaeahka

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency [article]

Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani
2021 arXiv   pre-print
Recently, these Machine Learning (ML) methods, such as Deep Neural Networks (DNNs), presented exceptional achievement in implementing human-level capabilities for various predicaments, such as Natural  ...  Deep learning techniques are one of the most significant elements of any Artificial Intelligence (AI) services.  ...  The combination of deep learning and neural networks are called deep neural networks (DNNs).  ... 
arXiv:2103.05590v1 fatcat:esfm4plqjjgwjobal2nuwuh7be

Towards Practical Watermark for Deep Neural Networks in Federated Learning [article]

Fang-Qi Li, Shi-Lin Wang, Alan Wee-Chung Liew
2021 arXiv   pre-print
With the wide application of deep neural networks, it is important to verify a host's possession over a deep neural network model and protect the model.  ...  To meet those requirements, in this paper, we demonstrate a watermarking protocol for protecting deep neural networks in the setting of FL.  ...  INTRODUCTION Deep neural networks (DNN) are intelligent systems that provide services by learning from data and consuming enormous computational resources.  ... 
arXiv:2105.03167v3 fatcat:j77q6sowmjagzejdqi676ulgme

A Robust Image Watermarking System Based on Deep Neural Networks [article]

Xin Zhong, Frank Y. Shih
2019 arXiv   pre-print
In this paper, a fully automated image watermarking system based on deep neural networks is proposed to generalize the image watermarking processes.  ...  Incorporating deep learning networks with image watermarking has attracted increasing attention during recent years.  ...  TABLE I COMPARISON I BETWEEN THE PROPOSED SYSTEM AND STATE-OF-THE-ART IMAGE WATERMARKING METHODS APPLYING DEEP NEURAL NETWORKS Method Function of the deep neural network Blind Robust Concentration  ... 
arXiv:1908.11331v1 fatcat:vxwtyx32rvb57h74ffowri3i3q

Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication

Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, Nenghai Yu
2020 Proceedings of the 28th ACM International Conference on Multimedia  
Deep convolutional neural networks have made outstanding contributions in many fields such as computer vision in the past few years and many researchers published well-trained network for downloading.  ...  Specifically, we present the reversible watermarking problem of deep convolutional neural networks and utilize the pruning theory of model compression technology to construct a host sequence used for embedding  ...  The backdoor is defined as a hidden pattern injected into a deep neural network model by modifying the parameters while training.  ... 
doi:10.1145/3394171.3413729 dblp:conf/mm/GuanFZZZY20 fatcat:5xw37ckspffp3ilb2cbgl4m36q

DLBC: A Deep Learning-Based Consensus in Blockchains for Deep Learning Services [article]

Boyang Li, Changhao Chenli, Xiaowei Xu, Yiyu Shi, Taeho Jung
2020 arXiv   pre-print
With the increasing artificial intelligence application, deep neural network (DNN) has become an emerging task.  ...  Embedding a watermark takes 3 epochs and removing a watermark takes 30 epochs.  ...  model, the miner will generate a watermark and embed the watermark into the deep neural network.  ... 
arXiv:1904.07349v2 fatcat:njbbs6plpzaapp3oe22p6ajgke
« Previous Showing results 1 — 15 out of 278 results