2020
DOI: 10.3390/technologies8040079
|View full text |Cite
|
Sign up to set email alerts
|

An Authorship Protection Technology for Electronic Documents Based on Image Watermarking

Abstract: In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems, including smart systems. This paper proposes a technology for protecting electronic documents containing digital images. The main idea is that the electronic document authorship can be protected by embedding digital watermarks in the images tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…47(6) DOI: 10.18287/2412-6179-CO-1328 first one is a classic convolutional neural network, it consists of successive convolutions with a kernel (3,3) and ReLU activation and a subsequent MaxPooling to reduce the resolution. The second one consists of a series of transposed convolutional layers with a kernel (2, 2), a concatenation with the corresponding tensor from the first part of the network, and two subsequent convolutions with a kernel (3,3) and ReLU activation. The output layer for the segmentation problem is convolution with kernel (1, 1) and SoftMax activation.…”
Section: An Approach To Improving the Accuracy Of Determining The Scr...mentioning
confidence: 99%
See 1 more Smart Citation
“…47(6) DOI: 10.18287/2412-6179-CO-1328 first one is a classic convolutional neural network, it consists of successive convolutions with a kernel (3,3) and ReLU activation and a subsequent MaxPooling to reduce the resolution. The second one consists of a series of transposed convolutional layers with a kernel (2, 2), a concatenation with the corresponding tensor from the first part of the network, and two subsequent convolutions with a kernel (3,3) and ReLU activation. The output layer for the segmentation problem is convolution with kernel (1, 1) and SoftMax activation.…”
Section: An Approach To Improving the Accuracy Of Determining The Scr...mentioning
confidence: 99%
“…Watermarks can be used both to protect the rights to a digital object [3,4] and to store additional information, for example, links to product information in promotional materials [5,6]. If the watermark is used to imperceptibly store additional information in a video stream, the ex-pected user's scenario for obtaining such information is as follows:…”
Section: Introductionmentioning
confidence: 99%