2022
DOI: 10.1016/j.comcom.2022.02.023
|View full text |Cite
|
Sign up to set email alerts
|

Survey on watermarking methods in the artificial intelligence domain and beyond

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 48 publications
(17 citation statements)
references
References 56 publications
0
17
0
Order By: Relevance
“…Furthermore, once data are decrypted, several security questions arise. Watermarking is a popular solution to handling the security issue of any encryption scheme [ 7 ]. It involves embedding a secret mark in the host media as a form of identification [ 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, once data are decrypted, several security questions arise. Watermarking is a popular solution to handling the security issue of any encryption scheme [ 7 ]. It involves embedding a secret mark in the host media as a form of identification [ 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%
“… [ 2 ] Blind watermarking targets the recovery of the watermark when the host is not available during the detection stage Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), Contourlet Transform (CT), Laplacian distribution Host images of size 512 × 512: Baboon, Barbara, Clock, Cameraman, Pepper, Boat Peak signal to noise ratio (PSNR), Structural similarity index measurement (SSIM), Root mean square error (RMSE) The DST-based embedding provides a good imperceptibility and an improved payload, and the results demonstrate superior robustness against common image processing manipulations compared to DWT and CT [ 3 ] To get high robustness against noise addition attacks Discrete cosine transform (DCT), Discrete wavelet transform (DWT), Arnold cat map Host image of size 512 × 512: Barbara, Baboon, Pepper; Watermark logo: 32 × 32 binary image Mean absolute error (MAE), Peak Signal to noise ratio (PSNR) Salt and pepper noises, Cropping, JPEG compression, Gaussian low pass filter, Scaling The proposed method has high imperceptibility and robustness against different types of attacks. [ 4 ] This paper proposed a survey on watermarking methods in the artificial intelligence domain and beyond. [ 5 ] Dual Watermarking for Security of COVID-19 Patient Record.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the classical watermarking schemes, deep-learning-based methods have been widely studied in recent years, achieving an outstanding performance compared with classical methods. 1,10,11 The key advantages to consider when selecting deep learning for watermarking are 1,12 (a) watermark generation for robust watermarking, (b) finding the ideal embedding position in the cover media, (c) identifying the best embedding strength that efficiently offers a balanced trade-off between quality and robustness, (d) offering attack simulation for efficient watermark extraction, and (e) reducing errors and denoising for obtained watermarks. However, the deep-learning model also faces the challenges of model security and privacy.…”
Section: Introductionmentioning
confidence: 99%
“…In the last few years, various papers containing the survey on digital media protection, devices, and artificial model protection using watermarking techniques have been published. 1,10,14,15 In Ref. 1, the authors summarized the roles and usage of deep-learning models in the different phases of the watermarking techniques.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation