目的近年来,基于深度学习的水印方法得到了广泛研究。现有方法通常对特征图的低频和高频部分同等对待,忽视了不同频率成分之间的重要差异,导致模型在处理多样化攻击时缺乏灵活性,难以同时实现水印的高保真性和强鲁棒性。为此,本文提出...目的近年来,基于深度学习的水印方法得到了广泛研究。现有方法通常对特征图的低频和高频部分同等对待,忽视了不同频率成分之间的重要差异,导致模型在处理多样化攻击时缺乏灵活性,难以同时实现水印的高保真性和强鲁棒性。为此,本文提出一种频率感知驱动的深度鲁棒图像水印技术(deep robust image watermarking driven by frequency awareness,RIWFP)。方法通过差异化机制处理低频和高频成分,提升水印性能。具体而言,低频成分通过小波卷积神经网络进行建模,利用宽感受野卷积在粗粒度层面高效学习全局结构和上下文信息;高频成分则采用深度可分离卷积和注意力机制组成的特征蒸馏块进行精炼,强化图像细节,在细粒度层面高效捕捉高频信息。此外,本文使用多频率小波损失函数,引导模型聚焦于不同频带的特征分布,进一步提升生成图像的质量。结果实验结果表明,提出的频率感知驱动的深度鲁棒图像水印技术在多个数据集上均表现出优越性能。在COCO(common objects in context)数据集上,RIWFP在随机丢弃攻击下的准确率达到91.4%;在椒盐噪声和中值滤波攻击下,RIWFP分别以100%和99.5%的准确率达到了最高水平,展现了其对高频信息的高效学习能力。在Ima⁃geNet数据集上,RIWFP在裁剪攻击下的准确率为93.4%;在JPEG压缩攻击下的准确率为99.6%,均显著优于其他对比方法。综合来看,RIWFP在COCO和ImageNet数据集上的平均准确率分别为96.7%和96.9%,均高于其他对比方法。结论本文所提方法通过频率感知的粗到细处理策略,显著增强了水印的不可见性和鲁棒性,在处理多种攻击时表现出优越性能。展开更多
为了解决模型版权保护和深度伪造检测中的图像真实性验证问题,提出高质量和高鲁棒性的面向扩散模型输出的水印方法DeWM(Decoder-driven WaterMarking for diffusion model)。首先,提出一种由解码器驱动的水印嵌入网络来实现编码器和解...为了解决模型版权保护和深度伪造检测中的图像真实性验证问题,提出高质量和高鲁棒性的面向扩散模型输出的水印方法DeWM(Decoder-driven WaterMarking for diffusion model)。首先,提出一种由解码器驱动的水印嵌入网络来实现编码器和解码器特征的直接共享,从而生成有高鲁棒性和不可见性的水印;其次,设计一种微调策略来对预训练扩散模型的解码器进行微调,并使生成的所有图像隐含特定水印,从而在不改变模型架构和扩散过程的前提下,实现简单且有效的水印嵌入。实验结果表明,在MS-COCO数据集上与潜在扩散模型水印方法Stable Signature相比,在水印位数提高至64位时,所提方法生成的水印图像的峰值信噪比(PSNR)与结构相似度(SSIM)分别增加了14.87%和9.41%,且所提方法针对裁剪、亮度调整和图像重建攻击的水印提取的位精度平均提升了3%,鲁棒性显著提高。展开更多
Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image dis...Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image distortion,inaccurate localization of the tampered regions,and difficulty in recovering content.Given these shortcomings,a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed.The multi-feature watermarking authentication code(AC)is constructed using texture feature of local binary patterns(LBP),direct coefficient of discrete cosine transform(DCT)and contrast feature of gray level co-occurrence matrix(GLCM)for detecting the tampered region,and the recovery code(RC)is designed according to the average grayscale value of pixels in image blocks for recovering the tampered content.Optimal pixel adjustment process(OPAP)and least significant bit(LSB)algorithms are used to embed the recovery code and authentication code into the image in a staggered manner.When detecting the integrity of the image,the authentication code comparison method and threshold judgment method are used to perform two rounds of tampering detection on the image and blindly recover the tampered content.Experimental results show that this algorithm has good transparency,strong and blind detection,and self-recovery performance against four types of malicious attacks and some conventional signal processing operations.When resisting copy-paste,text addition,cropping and vector quantization under the tampering rate(TR)10%,the average tampering detection rate is up to 94.09%,and the peak signal-to-noise ratio(PSNR)of the watermarked image and the recovered image are both greater than 41.47 and 40.31 dB,which demonstrates its excellent advantages compared with other related algorithms in recent years.展开更多
This paper proposes a tamper detection technique for semi-fragile watermarking using Quantizationbased Discrete Cosine Transform(DCT)for tamper localization.In this study,the proposed embedding strategy is investigate...This paper proposes a tamper detection technique for semi-fragile watermarking using Quantizationbased Discrete Cosine Transform(DCT)for tamper localization.In this study,the proposed embedding strategy is investigated by experimental tests over the diagonal order of the DCT coefficients.The cover image is divided into non-overlapping blocks of size 8×8 pixels.The DCT is applied to each block,and the coefficients are arranged using a zig-zag pattern within the block.In this study,the low-frequency coefficients are selected to examine the impact of the imperceptibility score and tamper detection accuracy.High accuracy of tamper detection can be achieved by checking the surrounding blocks to determine whether the corresponding block has been tampered with.The proposed tamper detection is tested under various malicious,incidental,and hybrid attacks(both incidental and malicious attacks).The experimental results demonstrate that the proposed technique achieves a Peak-Signal-to-Noise Ratio(PSNR)value of 41.2318 dB,an average Structural Similarity Index Measure(SSIM)value of 0.9768.The proposed scheme is also evaluated against malicious attacks such as copy-move,object deletion,object manipulation,and collage attacks.The proposed scheme can detect the malicious attack localization under various tampering rates.In addition,the proposed scheme can still detect tampered pixels under a hybrid attack,such as a combination ofmalicious and incidental attacks,with an average accuracy of 96.44%.展开更多
The rapid advancement of large language models(LLMs)has driven the pervasive adoption of AI-generated content(AIGC),while also raising concerns about misinformation,academic misconduct,biased or harmful content,and ot...The rapid advancement of large language models(LLMs)has driven the pervasive adoption of AI-generated content(AIGC),while also raising concerns about misinformation,academic misconduct,biased or harmful content,and other risks.Detecting AI-generated text has thus become essential to safeguard the authenticity and reliability of digital information.This survey reviews recent progress in detection methods,categorizing approaches into passive and active categories based on their reliance on intrinsic textual features or embedded signals.Passive detection is further divided into surface linguistic feature-based and language model-based methods,whereas active detection encompasses watermarking-based and semantic retrieval-based approaches.This taxonomy enables systematic comparison of methodological differences in model dependency,applicability,and robustness.A key challenge for AI-generated text detection is that existing detectors are highly vulnerable to adversarial attacks,particularly paraphrasing,which substantially compromises their effectiveness.Addressing this gap highlights the need for future research on enhancing robustness and cross-domain generalization.By synthesizing current advances and limitations,this survey provides a structured reference for the field and outlines pathways toward more reliable and scalable detection solutions.展开更多
文摘目的近年来,基于深度学习的水印方法得到了广泛研究。现有方法通常对特征图的低频和高频部分同等对待,忽视了不同频率成分之间的重要差异,导致模型在处理多样化攻击时缺乏灵活性,难以同时实现水印的高保真性和强鲁棒性。为此,本文提出一种频率感知驱动的深度鲁棒图像水印技术(deep robust image watermarking driven by frequency awareness,RIWFP)。方法通过差异化机制处理低频和高频成分,提升水印性能。具体而言,低频成分通过小波卷积神经网络进行建模,利用宽感受野卷积在粗粒度层面高效学习全局结构和上下文信息;高频成分则采用深度可分离卷积和注意力机制组成的特征蒸馏块进行精炼,强化图像细节,在细粒度层面高效捕捉高频信息。此外,本文使用多频率小波损失函数,引导模型聚焦于不同频带的特征分布,进一步提升生成图像的质量。结果实验结果表明,提出的频率感知驱动的深度鲁棒图像水印技术在多个数据集上均表现出优越性能。在COCO(common objects in context)数据集上,RIWFP在随机丢弃攻击下的准确率达到91.4%;在椒盐噪声和中值滤波攻击下,RIWFP分别以100%和99.5%的准确率达到了最高水平,展现了其对高频信息的高效学习能力。在Ima⁃geNet数据集上,RIWFP在裁剪攻击下的准确率为93.4%;在JPEG压缩攻击下的准确率为99.6%,均显著优于其他对比方法。综合来看,RIWFP在COCO和ImageNet数据集上的平均准确率分别为96.7%和96.9%,均高于其他对比方法。结论本文所提方法通过频率感知的粗到细处理策略,显著增强了水印的不可见性和鲁棒性,在处理多种攻击时表现出优越性能。
基金supported by Postgraduate Research&Practice Innovation Program of Jiangsu Province,China(Grant No.SJCX24_1332)Jiangsu Province Education Science Planning Project in 2024(Grant No.B-b/2024/01/122)High-Level Talent Scientific Research Foundation of Jinling Institute of Technology,China(Grant No.jit-b-201918).
文摘Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image distortion,inaccurate localization of the tampered regions,and difficulty in recovering content.Given these shortcomings,a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed.The multi-feature watermarking authentication code(AC)is constructed using texture feature of local binary patterns(LBP),direct coefficient of discrete cosine transform(DCT)and contrast feature of gray level co-occurrence matrix(GLCM)for detecting the tampered region,and the recovery code(RC)is designed according to the average grayscale value of pixels in image blocks for recovering the tampered content.Optimal pixel adjustment process(OPAP)and least significant bit(LSB)algorithms are used to embed the recovery code and authentication code into the image in a staggered manner.When detecting the integrity of the image,the authentication code comparison method and threshold judgment method are used to perform two rounds of tampering detection on the image and blindly recover the tampered content.Experimental results show that this algorithm has good transparency,strong and blind detection,and self-recovery performance against four types of malicious attacks and some conventional signal processing operations.When resisting copy-paste,text addition,cropping and vector quantization under the tampering rate(TR)10%,the average tampering detection rate is up to 94.09%,and the peak signal-to-noise ratio(PSNR)of the watermarked image and the recovered image are both greater than 41.47 and 40.31 dB,which demonstrates its excellent advantages compared with other related algorithms in recent years.
基金funded by Ministry of Higher Education Malaysia through Universiti Malaysia Pahang Al-Sultan Abdullah under Internal Research Grant(RDU233003).
文摘This paper proposes a tamper detection technique for semi-fragile watermarking using Quantizationbased Discrete Cosine Transform(DCT)for tamper localization.In this study,the proposed embedding strategy is investigated by experimental tests over the diagonal order of the DCT coefficients.The cover image is divided into non-overlapping blocks of size 8×8 pixels.The DCT is applied to each block,and the coefficients are arranged using a zig-zag pattern within the block.In this study,the low-frequency coefficients are selected to examine the impact of the imperceptibility score and tamper detection accuracy.High accuracy of tamper detection can be achieved by checking the surrounding blocks to determine whether the corresponding block has been tampered with.The proposed tamper detection is tested under various malicious,incidental,and hybrid attacks(both incidental and malicious attacks).The experimental results demonstrate that the proposed technique achieves a Peak-Signal-to-Noise Ratio(PSNR)value of 41.2318 dB,an average Structural Similarity Index Measure(SSIM)value of 0.9768.The proposed scheme is also evaluated against malicious attacks such as copy-move,object deletion,object manipulation,and collage attacks.The proposed scheme can detect the malicious attack localization under various tampering rates.In addition,the proposed scheme can still detect tampered pixels under a hybrid attack,such as a combination ofmalicious and incidental attacks,with an average accuracy of 96.44%.
基金supported in part by the Science and Technology Innovation Program of Hunan Province under Grant 2025RC3166the National Natural Science Foundation of China under Grant 62572176the National Key R&D Program of China under Grant 2024YFF0618800.
文摘The rapid advancement of large language models(LLMs)has driven the pervasive adoption of AI-generated content(AIGC),while also raising concerns about misinformation,academic misconduct,biased or harmful content,and other risks.Detecting AI-generated text has thus become essential to safeguard the authenticity and reliability of digital information.This survey reviews recent progress in detection methods,categorizing approaches into passive and active categories based on their reliance on intrinsic textual features or embedded signals.Passive detection is further divided into surface linguistic feature-based and language model-based methods,whereas active detection encompasses watermarking-based and semantic retrieval-based approaches.This taxonomy enables systematic comparison of methodological differences in model dependency,applicability,and robustness.A key challenge for AI-generated text detection is that existing detectors are highly vulnerable to adversarial attacks,particularly paraphrasing,which substantially compromises their effectiveness.Addressing this gap highlights the need for future research on enhancing robustness and cross-domain generalization.By synthesizing current advances and limitations,this survey provides a structured reference for the field and outlines pathways toward more reliable and scalable detection solutions.
文摘深度神经网络(Deep Neural Network,DNN)迅速发展,知识产权保护问题成为研究热点。经典黑盒水印是在干净样本的空间域中嵌入水印来构造触发样本,此类水印方案未考虑样本的隐秘性、样本及模型的鲁棒性,且主要集中于嵌入零位水印。提出了一种基于频域算法的深度学习多用户水印方案(Frequency-Domain based deep learning Multi-User watermarking scheme,FDMU)。水印生成阶段,利用二维离散小波算法提取原数据集以外的干净样本的LL频带,再对该频带进行奇异值分解,将用户信息以0、1字符串形式嵌入到S矩阵中生成水印样本。水印嵌入阶段,利用对抗样本白盒攻击为水印样本定向生成触发样本及特定错误标签,训练模型实现水印目的。水印验证阶段,使用黑盒水印验证方式,输入多组特定触发器触发DNN特定行为,利用逆变换频率算法提取用户信息,实现模型所有权的验证。实验结果表明:使用基于频域的FDMU水印方案,在嵌入用户信息的前提下,模型具有高隐秘性、高保真性和高稳定性,能够抵御模型微调和模型剪枝攻击。