Image steganography is the art of concealing secret information in image...
Existing methods for Salient Object Detection in Optical Remote Sensing
...
Backdoor attack aims to compromise a model, which returns an adversary-w...
RAW files are the initial measurement of scene radiance widely used in m...
The widespread use of face retouching filters on short-video platforms h...
With the widespread applications of the deep neural network (DNN), how t...
In modern social networks, existing style transfer methods suffer from a...
Protecting deep neural networks (DNNs) against intellectual property (IP...
Typically, foundation models are hosted on cloud servers to meet the hig...
Generative steganography (GS) is a new data hiding manner, featuring dir...
Generative steganography (GS) is an emerging technique that generates st...
Transmitting images for communication on social networks has become rout...
The easy sharing of multimedia content on social media has caused a rapi...
Steganography is a technique for covert communication between two partie...
Recently, relying on convolutional neural networks (CNNs), many methods ...
Wild images on the web are vulnerable to backdoor (also called trojan)
p...
Face manipulation detection has been receiving a lot of attention for th...
Digital images are vulnerable to nefarious tampering attacks such as con...
Semantic segmentation is important for scene understanding. To address t...
Data hiding with deep neural networks (DNNs) has experienced impressive
...
Intellectual property protection of deep neural networks is receiving
at...
3D mesh steganographic algorithms based on geometric modification are
vu...
Considering the prospects of public key embedding (PKE) mechanism in act...
Deep neural networks are vulnerable to malicious fine-tuning attacks suc...
Recently, more and more attention has been focused on the intellectual
p...
Steganography usually modifies cover media to embed secret data. A new
s...
Online social networks have stimulated communications over the Internet ...
Videos are prone to tampering attacks that alter the meaning and deceive...
Image cropping is an inexpensive and effective operation of maliciously
...
Videos can be easily tampered, copied and redistributed by attackers for...
Multimodal fake news detection has attracted many research interests in
...
Steganography conceals the secret message into the cover media, generati...
Backdoor attacks are rapidly emerging threats to deep neural networks (D...
Linguistic steganography (LS) aims to embed secret information into a hi...
Deep learning has achieved enormous success in various industrial
applic...
We introduce Imuge, an image tamper resilient generative scheme for imag...
Adversarial example generation has been a hot spot in recent years becau...
Face anonymization with generative models have become increasingly preva...
The existing image embedding networks are basically vulnerable to malici...
Recent advances in linguistic steganalysis have successively applied CNN...
In order to protect the intellectual property (IP) of deep neural networ...
Data hiding is referred to as the art of hiding secret data into a digit...
Deep Convolutional Neural Networks (DCNNs) are capable of obtaining powe...
In this paper, a novel perceptual image hashing scheme for color images ...
Many learning tasks require us to deal with graph data which contains ri...
Visual noise is often regarded as a disturbance in image quality, wherea...
Reversible data hiding in encrypted domain (RDH-ED) schemes based on
sym...
This paper proposes an idea of data computing in the covert domain (DCCD...
JPEG is the most popular image format, which is widely used in our daily...
In this paper, we propose a high capacity lossless data hiding (LDH) sch...