期刊文献+
共找到8,429篇文章
< 1 2 250 >
每页显示 20 50 100
Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery
1
作者 Qiuling Wu Hao Li +1 位作者 Mingjian Li Ming Wang 《Computers, Materials & Continua》 2026年第1期759-778,共20页
Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image dis... Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image distortion,inaccurate localization of the tampered regions,and difficulty in recovering content.Given these shortcomings,a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed.The multi-feature watermarking authentication code(AC)is constructed using texture feature of local binary patterns(LBP),direct coefficient of discrete cosine transform(DCT)and contrast feature of gray level co-occurrence matrix(GLCM)for detecting the tampered region,and the recovery code(RC)is designed according to the average grayscale value of pixels in image blocks for recovering the tampered content.Optimal pixel adjustment process(OPAP)and least significant bit(LSB)algorithms are used to embed the recovery code and authentication code into the image in a staggered manner.When detecting the integrity of the image,the authentication code comparison method and threshold judgment method are used to perform two rounds of tampering detection on the image and blindly recover the tampered content.Experimental results show that this algorithm has good transparency,strong and blind detection,and self-recovery performance against four types of malicious attacks and some conventional signal processing operations.When resisting copy-paste,text addition,cropping and vector quantization under the tampering rate(TR)10%,the average tampering detection rate is up to 94.09%,and the peak signal-to-noise ratio(PSNR)of the watermarked image and the recovered image are both greater than 41.47 and 40.31 dB,which demonstrates its excellent advantages compared with other related algorithms in recent years. 展开更多
关键词 Fragile image watermark tampering blind-detection SELF-RECOVERY multi-feature
在线阅读 下载PDF
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
2
作者 Zhimao Lai Saad Arif +2 位作者 Cong Feng Guangjun Liao Chuntao Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期73-102,共30页
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed... With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics. 展开更多
关键词 Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques
在线阅读 下载PDF
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
3
作者 Balsam Dhyia Majeed Amir Hossein Taherinia +1 位作者 Hadi Sadoghi Yazdi Ahad Harati 《Computers, Materials & Continua》 SCIE EI 2025年第1期1027-1047,共21页
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi... Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values. 展开更多
关键词 Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS
在线阅读 下载PDF
Modified Watermarking Scheme Using Informed Embedding and Fuzzy c-Means–Based Informed Coding
4
作者 Jyun-Jie Wang Yin-Chen Lin Chi-Chun Chen 《Computers, Materials & Continua》 2025年第12期5595-5624,共30页
Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framewo... Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framework that integrates fuzzy c-means(FCM)clustering into the generation off block codewords for labeling trellis arcs.The system incorporates a parallel trellis structure,controllable embedding parameters,and a novel informed embedding algorithm with reduced complexity.Two types of embedding schemes—memoryless and memory-based—are designed to flexibly trade-off between imperceptibility and robustness.Experimental results demonstrate that the proposed method outperforms existing approaches in bit error rate(BER)and computational complexity under various attacks,including additive noise,filtering,JPEG compression,cropping,and rotation.The integration of FCM enhances robustness by increasing the codeword distance,while preserving perceptual quality.Overall,the proposed framework is suitable for real-time and secure watermarking applications. 展开更多
关键词 watermarkING informed embedding fuzzy c-means informed coding
在线阅读 下载PDF
Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics
5
作者 Ahmed El Maloufy Mohamed Amine Tahiri +2 位作者 Ahmed Bencherqui Hicham Karmouni Mhamed Sayyouri 《Computers, Materials & Continua》 2025年第12期5789-5822,共34页
In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creat... In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creativity and technical precision.They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format.This research suggests,for the first time,an innovative approach to copyright protection by embedding a double digital watermark to address this challenge.The solution relies on a synergistic fusion of several sophisticated methods:Krawtchouk Optimized Octonion Moments(OKOM),Quaternion Singular Value Decomposition(QSVD),and Discrete Waveform Transform(DWT).To improve watermark embedding,the biologically inspired algorithm Chaos-White Shark Optimization(CWSO)is used,which allows dynamically adapting essential parameters such as the scaling factor of the insertion.Thus,two watermarks are inserted at the same time:an institutional logo and a student image,encoded in the main image(the architectural plan)through octonionic projections.This allows minimizing the amount of data to be integrated while increasing resistance.The suggested approach guarantees a perfect balance between the discreetness of the watermark(validated by PSNR indices>47 dB and SSIM>0.99)and its resistance to different attacks(JPEG compression,noise,rotation,resizing,filtering,etc.),as proven by the normalized correlation values(NC>0.9)obtained following the extraction.Therefore,this method represents a notable progress for securing academic works in architecture,providing an effective,discreet and reversible digital protection,which does not harm the visual appearance of the original works. 展开更多
关键词 Double digital watermarks krawtchouk moments chaos-white shark OPTIMIZATION
在线阅读 下载PDF
Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence
6
作者 Fatima Abu Siryeh Hussein Alrammahi Abdullahi Abdu İbrahim 《Computers, Materials & Continua》 2025年第9期5021-5046,共26页
Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorp... Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication.The system was tested against NIST SD4 and Anguli fingerprint datasets,wherein 10,000 watermarked fingerprints were employed for training.The designed approach recorded a tamper detection rate of 98.3%,performing 3–6%better than current DCT,SVD,and DWT-based watermarking approaches.The false positive rate(≤1.2%)and false negative rate(≤1.5%)were much lower compared to previous research,which maintained high reliability for template change detection.The system showed real-time performance,averaging 12–18 ms processing time per template,and is thus suitable for real-world biometric authentication scenarios.Quality analysis of fingerprints indicated that NFIQ scores were enhanced from 2.07 to 1.81,reflecting improved minutiae clarity and ridge structure preservation.The approach also exhibited strong resistance to compression and noise distortions,with the improvements in PSNR being 2 dB(JPEG compression Q=80)and the SSIM values rising by 3%–5%under noise attacks.Comparative assessment demonstrated that training with NIST SD4 data greatly improved the ridge continuity and quality of fingerprints,resulting in better match scores(260–295)when tested against Bozorth3.Smaller batch sizes(batch=2)also resulted in improved ridge clarity,whereas larger batch sizes(batch=8)resulted in distortions.The DCNN-based tamper detection model supported real-time classification,which greatly minimized template exposure to adversarial attacks and synthetic fingerprint forgeries.Results demonstrate that fragile watermarking with AI indeed greatly enhances fingerprint security,providing privacy-preserving biometric authentication with high robustness,accuracy,and computational efficiency. 展开更多
关键词 Biometric template security fragile watermarking deep learning tamper detection discrete cosine transform(DCT) fingerprint authentication NFIQ score optimization AI-driven watermarking structural similarity index(SSIM)
在线阅读 下载PDF
Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform
7
作者 Maazen Alsabaan Zaid Bin Faheem +1 位作者 Yuanyuan Zhu Jehad Ali 《Computers, Materials & Continua》 2025年第7期491-512,共22页
Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embe... Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content.Image watermarking can also be used to verify the authenticity of digital media,such as images or videos,by ascertaining the watermark information.In this paper,a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform(DWT),chaotic map,and Laplacian operator.The DWT can be used to decompose the image into its frequency components,chaos is used to provide extra security defense by encrypting the watermark signal,and the Laplacian operator with optimization is applied to the mid-frequency bands to find the sharp areas in the image.These mid-frequency bands are used to embed the watermarks by modifying the coefficients in these bands.The mid-sub-band maintains the invisible property of the watermark,and chaos combined with the second-order derivative Laplacian is vulnerable to attacks.Comprehensive experiments demonstrate that this approach is effective for common signal processing attacks,i.e.,compression,noise addition,and filtering.Moreover,this approach also maintains image quality through peak signal-to-noise ratio(PSNR)and structural similarity index metrics(SSIM).The highest achieved PSNR and SSIM values are 55.4 dB and 1.In the same way,normalized correlation(NC)values are almost 10%–20%higher than comparative research.These results support assistance in copyright protection in multimedia content. 展开更多
关键词 Discrete wavelet transform LAPLACIAN image watermarking CHAOS multimedia security
在线阅读 下载PDF
Joint Watermarking and Encryption for Social Image Sharing
8
作者 Conghuan Ye Shenglong Tan +3 位作者 Shi Li Jun Wang Qiankun Zuo Bing Xiong 《Computers, Materials & Continua》 2025年第5期2927-2946,共20页
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social... With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured. 展开更多
关键词 Multimedia security digital watermarking image encryption image sharing privacy protection
在线阅读 下载PDF
Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking
9
作者 Shu-Chuan Chu Libin Fu +2 位作者 Jeng-Shyang Pan Xingsi Xue Min Liu 《Computers, Materials & Continua》 2025年第5期3135-3163,共29页
Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programm... Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems.This paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human intervention.Partial modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update formula.The Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the CSO.To validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark suite.Furthermore,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking process.The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency. 展开更多
关键词 Cat swarm algorithm genetic programming digital watermarking update mode mode generation framework
在线阅读 下载PDF
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
10
作者 Mohamed Medani Yahia Said +4 位作者 Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman 《Computer Modeling in Engineering & Sciences》 2025年第4期1049-1070,共22页
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be... Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks. 展开更多
关键词 DNA sequence TD-ERCS chaoticmap henon chaoticmap duffing chaotic system SHA-512 encryption technique watermark embedding
在线阅读 下载PDF
A Robust Image Watermarking Based on DWT and RDWT Combined with Mobius Transformations
11
作者 Atheer Alrammahi Hedieh Sajedi 《Computers, Materials & Continua》 2025年第7期887-918,共32页
Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that... Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform(DWT),Redundant Discrete Wavelet Transform(RDWT),and Möbius Transformations(MT),with optimization of transformation parameters achieved via a Genetic Algorithm(GA).By combining frequency and spatial domain techniques,the proposed method significantly enhances both the imper-ceptibility and robustness of watermark embedding.The approach leverages DWT and RDWT for multi-resolution decomposition,enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks.RDWT,in particular,offers shift-invariance,which improves performance under geometric transformations.Möbius transformations are employed for spatial manipulation,providing conformal mapping and spatial dispersion that fortify watermark resilience against rotation,scaling,and translation.The GA dynamically optimizes the Möbius parameters,selecting configurations that maximize robustness metrics such as Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM),Bit Error Rate(BER),and Normalized Cross-Correlation(NCC).Extensive experiments conducted on medical and standard benchmark images demonstrate the efficacy of the proposed RDWT-MT scheme.Results show that PSNR exceeds 68 dB,SSIM approaches 1.0,and BER remains at 0.0000,indicating excellent imperceptibility and perfect watermark recovery.Moreover,the method exhibits exceptional resilience to a wide range of image processing attacks,including Gaussian noise,JPEG compression,histogram equalization,and cropping,achieving NCC values close to or equal to 1.0.Comparative evaluations with state-of-the-art watermarking techniques highlight the superiority of the proposed method in terms of robustness,fidelity,and computational efficiency.The hybrid framework ensures secure,adaptive watermark embedding,making it highly suitable for applications in digital rights management,content authentication,and medical image protection.The integration of spatial and frequency domain features with evolutionary optimization presents a promising direction for future watermarking technologies. 展开更多
关键词 Digital watermarking Möbius transforms discrete wavelet transform redundant discrete wavelet transform genetic algorithm ROBUSTNESS geometric attacks
在线阅读 下载PDF
频率感知驱动的深度鲁棒图像水印
12
作者 张国富 李鑫 +2 位作者 苏兆品 方涵 廉晨思 《中国图象图形学报》 北大核心 2026年第1期197-211,共15页
目的近年来,基于深度学习的水印方法得到了广泛研究。现有方法通常对特征图的低频和高频部分同等对待,忽视了不同频率成分之间的重要差异,导致模型在处理多样化攻击时缺乏灵活性,难以同时实现水印的高保真性和强鲁棒性。为此,本文提出... 目的近年来,基于深度学习的水印方法得到了广泛研究。现有方法通常对特征图的低频和高频部分同等对待,忽视了不同频率成分之间的重要差异,导致模型在处理多样化攻击时缺乏灵活性,难以同时实现水印的高保真性和强鲁棒性。为此,本文提出一种频率感知驱动的深度鲁棒图像水印技术(deep robust image watermarking driven by frequency awareness,RIWFP)。方法通过差异化机制处理低频和高频成分,提升水印性能。具体而言,低频成分通过小波卷积神经网络进行建模,利用宽感受野卷积在粗粒度层面高效学习全局结构和上下文信息;高频成分则采用深度可分离卷积和注意力机制组成的特征蒸馏块进行精炼,强化图像细节,在细粒度层面高效捕捉高频信息。此外,本文使用多频率小波损失函数,引导模型聚焦于不同频带的特征分布,进一步提升生成图像的质量。结果实验结果表明,提出的频率感知驱动的深度鲁棒图像水印技术在多个数据集上均表现出优越性能。在COCO(common objects in context)数据集上,RIWFP在随机丢弃攻击下的准确率达到91.4%;在椒盐噪声和中值滤波攻击下,RIWFP分别以100%和99.5%的准确率达到了最高水平,展现了其对高频信息的高效学习能力。在Ima⁃geNet数据集上,RIWFP在裁剪攻击下的准确率为93.4%;在JPEG压缩攻击下的准确率为99.6%,均显著优于其他对比方法。综合来看,RIWFP在COCO和ImageNet数据集上的平均准确率分别为96.7%和96.9%,均高于其他对比方法。结论本文所提方法通过频率感知的粗到细处理策略,显著增强了水印的不可见性和鲁棒性,在处理多种攻击时表现出优越性能。 展开更多
关键词 鲁棒图像水印 小波卷积神经网络 深度可分离卷积 注意力机制 多频率小波损失
原文传递
Contourlet watermarking algorithm based on Arnold scrambling and singular value decomposition 被引量:3
13
作者 陈立全 孙晓燕 +1 位作者 卢苗 邵辰 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期386-391,共6页
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and... A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured. 展开更多
关键词 digital watermarking contourlet transform Arnold scrambling singular value decomposition (SVD)
在线阅读 下载PDF
Digital watermarking algorithm based on neural network in multiwavelet domain 被引量:2
14
作者 王振飞 宋胜利 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期211-215,共5页
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ... A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image. 展开更多
关键词 digital watermarking neural networks multiwavelet transform
在线阅读 下载PDF
基于所有者身份识别的自然语言处理模型水印算法
15
作者 方静 宋考 +2 位作者 蔡娟娟 金彪 熊金波 《福建师范大学学报(自然科学版)》 北大核心 2026年第2期1-10,共10页
为了确保模型开发者和数据提供者能够有效地保护其知识资产,提出一种基于所有者身份识别的自然语言处理模型水印框架OIRW,以应对模型版权保护的安全性、鲁棒性等方面的挑战。具体地,在模型训练阶段,通过用户版权信息和密钥生成数字签名... 为了确保模型开发者和数据提供者能够有效地保护其知识资产,提出一种基于所有者身份识别的自然语言处理模型水印框架OIRW,以应对模型版权保护的安全性、鲁棒性等方面的挑战。具体地,在模型训练阶段,通过用户版权信息和密钥生成数字签名用于链接触发器,将触发器插入数据集用于训练水印模型。在模型验证阶段,首先利用数字签名、版权信息等验证所有者身份,随后将插入触发器后的测试数据输入远程模型以得到水印验证结果。为评估水印的性能,在AgNews和SST-2数据集上对3种常见的语言模型嵌入水印信息。实验结果表明,水印验证的准确率接近100%,对模型微调、剪枝和复写等攻击情景下的水印表现出较强的鲁棒性。 展开更多
关键词 自然语言处理模型 版权保护 模型水印 鲁棒性
在线阅读 下载PDF
数据要素流通全流程隐私关键技术:现状、挑战与展望
16
作者 刘立伟 傅超豪 +3 位作者 孙泽堃 周耘 阮娜 蒋昌俊 《软件学报》 北大核心 2026年第1期301-325,共25页
近年来以大语言模型为代表的一系列数据驱动型AIGC应用深刻地改变了人们的生活范式,引起国家对数据流通、数据隐私等问题的高度重视.健全数据市场规范,完善数据要素流通机制成为数字经济时代下又一重大研究课题.但是现有数据隐私研究普... 近年来以大语言模型为代表的一系列数据驱动型AIGC应用深刻地改变了人们的生活范式,引起国家对数据流通、数据隐私等问题的高度重视.健全数据市场规范,完善数据要素流通机制成为数字经济时代下又一重大研究课题.但是现有数据隐私研究普遍聚焦于数据流通中的单一环节,并未展现数据流通的全貌,技术研究相对孤立,存在不兼容性等问题.因此数据服务提供商在实际生产活动中往往需要投入额外人力成本以进行全方位的数据隐私保护.聚焦数据流通问题,依据数据生命周期将流通全过程划分为3个阶段,对各阶段的隐私关键技术建立系统的分类体系,并对各领域的最新进展、未来挑战等问题进行深入剖析.以数据流通为载体,隐私技术为目标,涵盖数据流通全过程,有助于研究者快速建立对数据流通全流程隐私技术的系统认识,为后续研究建立完备的全流程数据流通隐私保护范式奠定基础. 展开更多
关键词 数据流通 数字水印 联邦学习 区块链 忘却学习
在线阅读 下载PDF
基于重复模式的盲水印数字图像矫正算法
17
作者 徐佳宁 席绍阳 +4 位作者 徐鑫 王琅 周越浦 朱晓强 曾丹 《工业控制计算机》 2026年第1期65-66,109,共3页
为了增强盲水印算法的鲁棒性,提出了一种基于ResNet34网络架构的盲水印图像校正方法,旨在纠正单张输入图像中的透视变形。该方法首先通过稀疏差分调制图像,微调特定像素以嵌入水印信息,形成重复模式;其次,利用ResNet34网络架构,结合大... 为了增强盲水印算法的鲁棒性,提出了一种基于ResNet34网络架构的盲水印图像校正方法,旨在纠正单张输入图像中的透视变形。该方法首先通过稀疏差分调制图像,微调特定像素以嵌入水印信息,形成重复模式;其次,利用ResNet34网络架构,结合大量合成的透视失真数据集进行训练,以预测透视图像与校正图像之间的角点偏移。实验结果表明,该算法在泛化能力、深度、精度和收敛速度方面均表现出色,并且能够有效抵御随机裁剪、高斯模糊、颜色抖动、颜色偏移和颜色压缩等攻击手段。 展开更多
关键词 盲水印 透视矫正 角点偏移
在线阅读 下载PDF
面向扩散模型输出的水印方法
18
作者 贾源 袁得嵛 +1 位作者 潘语泉 王安然 《计算机应用》 北大核心 2026年第1期161-168,共8页
为了解决模型版权保护和深度伪造检测中的图像真实性验证问题,提出高质量和高鲁棒性的面向扩散模型输出的水印方法DeWM(Decoder-driven WaterMarking for diffusion model)。首先,提出一种由解码器驱动的水印嵌入网络来实现编码器和解... 为了解决模型版权保护和深度伪造检测中的图像真实性验证问题,提出高质量和高鲁棒性的面向扩散模型输出的水印方法DeWM(Decoder-driven WaterMarking for diffusion model)。首先,提出一种由解码器驱动的水印嵌入网络来实现编码器和解码器特征的直接共享,从而生成有高鲁棒性和不可见性的水印;其次,设计一种微调策略来对预训练扩散模型的解码器进行微调,并使生成的所有图像隐含特定水印,从而在不改变模型架构和扩散过程的前提下,实现简单且有效的水印嵌入。实验结果表明,在MS-COCO数据集上与潜在扩散模型水印方法Stable Signature相比,在水印位数提高至64位时,所提方法生成的水印图像的峰值信噪比(PSNR)与结构相似度(SSIM)分别增加了14.87%和9.41%,且所提方法针对裁剪、亮度调整和图像重建攻击的水印提取的位精度平均提升了3%,鲁棒性显著提高。 展开更多
关键词 主动检测 图像水印 扩散模型 人工智能生成内容
在线阅读 下载PDF
基于注意力机制的文档图像屏摄鲁棒水印方法
19
作者 张小敏 赵军智 和红杰 《计算机科学》 北大核心 2026年第1期413-422,共10页
屏摄鲁棒的水印算法在版权保护、追踪溯源等领域具有重要意义。现有的抗屏摄鲁棒水印算法大多关注于自然图像,忽视了对文档图像的研究。文档载体本身的冗余信息较少,水印的鲁棒性和不可感知性很难得到平衡。为解决这一问题,提出了一种... 屏摄鲁棒的水印算法在版权保护、追踪溯源等领域具有重要意义。现有的抗屏摄鲁棒水印算法大多关注于自然图像,忽视了对文档图像的研究。文档载体本身的冗余信息较少,水印的鲁棒性和不可感知性很难得到平衡。为解决这一问题,提出了一种基于注意力机制的文档图像屏摄鲁棒水印方法。为提升水印的不可感知性,在编码器网络中引入注意力特征融合模块,实现浅层特征和深层特征的自适应聚合。为提高算法的鲁棒提取能力,在解码器网络中设计了自适应通道与空间注意力模块,突出通道和空间维度中与水印信息高度相关的特征。同时,在屏摄噪声模拟过程中设计了摩尔纹失真层,以提高算法抵抗真实摩尔纹干扰的鲁棒性能。实验结果显示,所提方法的平均PSNR为33.4 dB,SSIM为0.9885,RMSE为5.48,在多种屏摄场景的平均提取准确率可达99.49%。在图像质量和水印鲁棒性方面,均优于现有同类方法。 展开更多
关键词 屏摄鲁棒水印 文档图像 注意力特征融合 自适应通道与空间注意力 摩尔纹失真
在线阅读 下载PDF
基于鲁棒分区水印的深度学习模型保护方法
20
作者 吕正浩 咸鹤群 《计算机科学》 北大核心 2026年第1期423-429,共7页
机器学习涉及到昂贵的数据收集和训练成本,模型所有者可能会担心自己的模型遭到未授权的复制或使用,损害到模型所有者的知识产权。因此,如何有效保护这些模型的知识产权成为一个亟待解决的问题。为此,研究人员提出了模型水印的概念。类... 机器学习涉及到昂贵的数据收集和训练成本,模型所有者可能会担心自己的模型遭到未授权的复制或使用,损害到模型所有者的知识产权。因此,如何有效保护这些模型的知识产权成为一个亟待解决的问题。为此,研究人员提出了模型水印的概念。类似于数字水印技术将水印嵌入图像的方式,模型水印通过将特定的标识嵌入机器学习模型中,以达到版权确认的目的。然而,现有的水印方案在实际应用中存在一些局限性。首先,水印的嵌入不可避免地会对模型性能产生一定影响;其次,水印可能会通过微调等技术手段被移除。针对此类问题,提出一种新型的神经网络水印方案,采用区域化和分阶段的嵌入方式。这种方法不仅旨在最大限度地减少对模型性能的影响,还力图提升水印本身的鲁棒性。在MNIST,CIFAR-10和CIFAR-100数据集上的实验验证了该方案的有效性。实验结果表明,该水印方案在保持水印存活率的同时,对模型性能的影响极小,相较于现有的基线水印方案,模型性能提升幅度最高可达18个百分点。此外,所提出的方案对微调等攻击手段表现出较强的鲁棒性,并且不受模型剪枝操作的影响。即便攻击者试图完全移除水印,也必须以显著降低模型性能为代价。 展开更多
关键词 深度神经网络 模型水印 版权验证 人工智能安全 水印鲁棒性 模型性能
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部