Novel Imperceptible Watermarking Attack Method Based on Residual Learning

被引:0
|
作者
Li, Qi [1 ,2 ]
Wang, Chun-Peng [1 ,2 ]
Wang, Xiao-Yu [1 ,2 ]
Li, Jian [1 ,2 ]
Xia, Zhi-Qiu [1 ,2 ]
Gao, Suo [3 ]
Ma, Bin [1 ,2 ]
机构
[1] School of Cyber Security, Qilu University of Technology, Shandong Academy of Sciences, Jinan,250353, China
[2] Shandong Computer Science Center (National Supercomputing Center in Jinan), Qilu University of Technology, Shandong Academy of Sciences, Jinan,250353, China
[3] Faculty of Computing, Harbin Institute of Technology, Harbin,150001, China
来源
Ruan Jian Xue Bao/Journal of Software | 2023年 / 34卷 / 09期
关键词
Extraction;
D O I
10.13328/j.cnki.jos.006661
中图分类号
学科分类号
摘要
引用
收藏
页码:4351 / 4361
相关论文
共 50 条
  • [1] Backdoor Attack Defense Method for Federated Learning Based on Model Watermarking
    Guo, Jing-Jing
    Liu, Jiu-Zun
    Ma, Yong
    Liu, Zhi-Quan
    Xiong, Yu-Peng
    Miao, Ke
    Li, Jia-Xing
    Ma, Jian-Feng
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 662 - 676
  • [2] RD-IWAN: Residual Dense Based Imperceptible Watermark Attack Network
    Wang, Chunpeng
    Hao, Qixian
    Xu, Shujiang
    Ma, Bin
    Xia, Zhiqiu
    Li, Qi
    Li, Jian
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (11) : 7460 - 7472
  • [3] WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing
    Xu, Leiyang
    Zheng, Xiaolong
    Li, Xiangyuan
    Zhang, Yucheng
    Liu, Liang
    Ma, Huadong
    [J]. 2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2022, : 10 - 18
  • [4] A Novel Method to Reduce Collusion Attack Possibility on Watermarking
    Boroujerdizadeh, A.
    Ghobadi, A. R.
    Yaribakht, A. H.
    Bin Abdoullah, M. Shahidan
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1066 - 1071
  • [5] The imperceptible video watermarking based on the model of entropy
    Li, Zhi
    Chen, Xiaowei
    [J]. 2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 480 - 484
  • [6] PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking
    Khan, Ahmed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) : 7515 - 7527
  • [7] PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking
    Ahmed Khan
    [J]. Multimedia Tools and Applications, 2021, 80 : 7515 - 7527
  • [8] A novel image watermarking scheme based on amplitude attack
    Hsieh, Chaur-Heh
    Liao, Chi-Jen
    [J]. PATTERN RECOGNITION, 2007, 40 (04) : 1342 - 1354
  • [9] A DCT based imperceptible color image watermarking scheme
    [J]. Abraham, Jobin (jnabpc@gmail.com), 1600, Science and Engineering Research Support Society (09):
  • [10] Imperceptible visible watermarking based on postcamera histogram operation
    Lin, Pei-Yu
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 95 : 194 - 208