Computer Science ›› 2026, Vol. 53 ›› Issue (1): 413-422.doi: 10.11896/jsjkx.241100040
• Information Security • Previous Articles Next Articles
ZHANG Xiaomin, ZHAO Junzhi, HE Hongjie
CLC Number:
| [1]GUAN H,HUANG Y,ZHANG S,et al.A Survey of Screen Shooting Resilient Image Watermarking Algorithms[C]//2023 International Conference on Culture-Oriented Science and Technology.IEEE,2023:12-17. [2]FANG H,ZHANG W,ZHOU H,et al.Screen-shooting resilient watermarking[J].IEEE Transactions on Information Forensics and Security,2018,14(6):1403-1418. [3]FANG H,ZHANG W,MA Z,et al.A camera shooting resilient watermarking scheme for underpainting documents[J].IEEE Transactions on Circuits and Systems for Video Technology,2019,30(11):4075-4089. [4]CHENG Y,JI X,WANG L,et al.{mID}:Tracing screen photos via {Moiré} patterns[C]//30th USENIX Security Symposium.2021:2969-2986. [5]GUGELMANN D,SOMMER D,LENDERS V,et al.Screen watermarking for data theft investigation and attribution[C]//2018 10th International Conference on Cyber Conflict.IEEE,2018:391-408. [6]WENGROWSKI E,DANA K.Light field messaging with deep photographic steganography[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:1515-1524. [7]TANCIK M,MILDENHALL B,NG R.Stegastamp:Invisiblehyperlinks in physical photographs[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:2117-2126. [8]FANG H,JIA Z,MA Z,et al.Pimog:An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network[C]//Proceedings of the 30th ACM International Conference on Multimedia.2022:2267-2275. [9]GE S,FEI J,XIA Z,et al.A screen-shooting resilient document image watermarking scheme using deep neural network[J].IET Image Processing,2023,17(2):323-336. [10]PENG W P,LIU J B,PING Y,et al.Model protection scheme for fusion of internal and external feature watermarks[J].Journal of Chongqing University of Posts and Telecommunication(Natural Science Edition),2024,36(4):765-774. [11]RONNEBERGER O,FISCHER P,BROX T.U-Net:Convolu-tional networks for biomedical image segmentation[C]//Medical Image Computing and Computer-Assisted Intervention(MICCAI 2015).Springer,2015:234-241. [12]YUAN S,TIMOFTE R,SLABAUGH G,et al.Aim 2019 challenge on image demoireing:Methods and results[C]//2019 IEEE/CVF International Conference on Computer Vision Workshop.IEEE,2019:3534-3545. [13]HE K,ZHANG X,REN S,et al.Deep residual learning forimage recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778. [14]CHEN Z,HE Z,LU Z M.DEA-Net:Single image dehazingbased on detail-enhanced convolution and content-guided attention[J].arXiv:2301.04805,2023. [15]DAI Y,GIESEKE F,OEHMCKE S,et al.Attentional featurefusion[C]//Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.2021:3560-3569. [16]JIA Z,FANG H,ZHANG W.Mbrs:Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression[C]//Proceedings of the 29th ACM International Conference on Multimedia.2021:41-49. [17]HU J,SHEN L,SUN G.Squeeze-and-excitation networks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:7132-7141. [18]WOO S,PARK J,LEE J Y,et al.Cbam:Convolutional block at-tention module[C]//Proceedings of the European Conference on Computer Vision.2018:3-19. [19]SHIN R,SONG D.Jpeg-resistant adversarial images[C]//NIPS 2017 Workshop on Machine Learning and Computer Security.2017:8. [20]ZHANG R,ISOLA P,EFROS A A,et al.The unreasonable effectiveness of deep features as a perceptual metric[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:586-595. [21]GE S,XIA Z,FEI J,et al.A robust document image watermar-king scheme using deep neural network[J].Multimedia Tools and Applications,2023,82(25):38589-38612. [22]KINGMA D P,BA J.Adam:A method for stochastic optimiza-tion[J].arXiv:1412.6980,2014. |
| [1] | GENG Sheng, DING Weiping, JU Hengrong, HUANG Jiashuang, JIANG Shu, WANG Haipeng. FDiff-Fusion:Medical Image Diffusion Fusion Network Segmentation Model Driven Based onFuzzy Logic [J]. Computer Science, 2025, 52(6): 274-285. |
|
||