Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
A Principled Approach to Natural Language Watermarking
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2908–2916https://doi.org/10.1145/3664647.3681544Recently, there has been a surge in machine-generated natural language content being misused by unauthorized parties. Watermarking is a well-recognized technique to address the issue by tracing the provenance of the text. However, we found that most ...
- research-articleOctober 2024
V2A-Mark: Versatile Deep Visual-Audio Watermarking for Manipulation Localization and Copyright Protection
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 9818–9827https://doi.org/10.1145/3664647.3680904AI-generated video has revolutionized short video production, filmmaking, and personalized media, making video local editing an essential tool. However, this progress also blurs the line between reality and fiction, posing challenges in multimedia ...
- research-articleSeptember 2024
FaceSigns: Semi-fragile Watermarks for Media Authentication
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 11Article No.: 337, Pages 1–21https://doi.org/10.1145/3640466Manipulated media is becoming a prominent threat due to the recent advances in realistic image and video synthesis techniques. There have been several attempts at detecting synthetically tampered media using machine learning classifiers. However, such ...
- tutorialAugust 2024
Decoding the AI Pen: Techniques and Challenges in Detecting AI-Generated Text
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 6428–6436https://doi.org/10.1145/3637528.3671463Large Language Models (LLMs) have revolutionized the field of Natural Language Generation (NLG) by demonstrating an impressive ability to generate human-like text. However, their widespread usage introduces challenges that necessitate thoughtful ...
- short-paperJune 2024Honorable Mention
The Adobe Hidden Feature and its Impact on Sensor Attribution
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 143–148https://doi.org/10.1145/3658664.3659650If the extraction of sensor fingerprints represents nowadays an important forensic tool for sensor attribution, it has been shown recently in [2,3,12] that images coming from several sensors were more prone to generate False Positives (FP) by presenting ...
-
- research-articleJune 2024
Enhanced Watermarking for Paper-Based Digital Microfluidic Biochips
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 4Article No.: 64, Pages 1–27https://doi.org/10.1145/3661309Paper-based digital microfluidic biochip (PB-DMFB) technology provides a promising solution to many biochemical applications. However, the PB-DMFB manufacturing process may suffer from potential security threats. For example, a Trojan insertion attack may ...
- research-articleJanuary 2024
Data hiding using video steganography
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 16, Issue 1Pages 112–123https://doi.org/10.1504/ijesdf.2024.136018Video steganography aims to hide the presence of a communication from a hostile third party. One of the techniques recommended in this study is the hash-based least significant bit method for video steganography. The study conducts an in-depth analysis ...
- research-articleNovember 2023
Evading Watermark based Detection of AI-Generated Content
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1168–1181https://doi.org/10.1145/3576915.3623189A generative AI model can generate extremely realistic-looking content, posing growing challenges to the authenticity of information. To address the challenges, watermark has been leveraged to detect AI-generated content. Specifically, a watermark is ...
- research-articleOctober 2023
Flexible and Secure Watermarking for Latent Diffusion Model
MM '23: Proceedings of the 31st ACM International Conference on MultimediaPages 1668–1676https://doi.org/10.1145/3581783.3612448Since the significant advancements and open-source support of latent diffusion models (LDMs) in the field of image generation, numerous researchers and enterprises start fine-tuning the pre-trained models to generate specialized images for different ...
- research-articleOctober 2023
WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs
MM '23: Proceedings of the 31st ACM International Conference on MultimediaPages 7274–7282https://doi.org/10.1145/3581783.3612143Recently, print-resist watermarking has attracted much interest. Many watermarking schemes have been proposed to achieve robustness against printing and camera-capturing. Though these studies have shown promising results overall, they overlook the ...
- research-articleOctober 2023
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness
MM '23: Proceedings of the 31st ACM International Conference on MultimediaPages 7345–7353https://doi.org/10.1145/3581783.3612068Cross-channel (e.g. Screen-to-Camera) robustness is an urgent requirement for modern watermarking systems. To realize such robustness, training a network that can precisely simulate the cross-channel distortion as the noise layer for deep watermarking ...
- research-articleAugust 2023
NFT-Based Data Marketplace with Digital Watermarking
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 4756–4767https://doi.org/10.1145/3580305.3599876In today's digital world, enterprises and individuals are generating massive data that is potentially useful for many data consumers with data driven applications. The emergence of data marketplaces is a step toward helping the data owners to monetize ...
- keynoteJuly 2023
Model Stealing Attacks and Defenses: Where Are We Now?
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityPage 327https://doi.org/10.1145/3579856.3596441The success of deep learning in many application domains has been nothing short of dramatic. This has brought the spotlight onto security and privacy concerns with machine learning (ML). One such concern is the threat of model theft. I will discuss work ...
- research-articleSeptember 2023
Graph Database Watermarking Using Pseudo-Nodes
DEC '23: Proceedings of the Second ACM Data Economy WorkshopPages 14–20https://doi.org/10.1145/3600046.3600049Watermarking is used as proof of ownership for various data types such as images, videos, software, machine learning models, and databases. Datasets are crucial for data driven decision making using Machine Learning for tasks like prediction, ...
- Work in ProgressApril 2023
StandARone: Infrared-Watermarked Documents as Portable Containers of AR Interaction and Personalization
CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 260, Pages 1–7https://doi.org/10.1145/3544549.3585905Hybrid paper interfaces leverage augmented reality (AR) to combine the desired tangibility of paper documents with the affordances of interactive digital media. Typically, the instructions for how the virtual content should be generated are not an ...
- research-articleJanuary 2024
An enhanced digital image watermarking technique using DWT-HD-SVD and deep convolutional neural network
International Journal of Critical Computer-Based Systems (IJCCBS), Volume 10, Issue 4Pages 269–286https://doi.org/10.1504/ijccbs.2023.136317This paper proposes a novel image watermarking model, which combines discrete wavelet transform (DWT), Hessenberg decomposition (HD), singular value decomposition (SVD)-based deep convolutional neural networks (D-CNN) technique to explore the subjective ...
- research-articleJanuary 2023
DIP-QGA: a secure and robust watermarking technique based on direct image projection and quantum genetic algorithm
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 3-4Pages 221–247https://doi.org/10.1504/ijics.2023.128814This paper presents three novel methods for hiding and extracting a watermark. The strategy of the first method is to project pixels into a new image. The key is a combination of the rotation and distance related to the viewer. The new pixel positions ...
- research-articleJanuary 2023
A novel approach to secure biometric data using integer wavelet transform, chaotic sequences and improved logistic system-based watermarking
International Journal of Computer Applications in Technology (IJCAT), Volume 71, Issue 4Pages 340–351https://doi.org/10.1504/ijcat.2023.132407Watermarking can be used for security as no one carries files or documents around anymore. Digital watermarking is the technique of embedding information in available digital content used for authentication. In some watermarking schemes, there are cases ...
- research-articleJanuary 2023
A robust watermarking technique for biometric image authentication
International Journal of Biometrics (IJOB), Volume 15, Issue 5Pages 587–605https://doi.org/10.1504/ijbm.2023.133165Biometric authentication data is becoming a crucial challenge to ensure copyright protection of digital images. A person's biometric data is very sensitive; if exposed, it can pose a threat to a person's identity and system security. Due to advances in ...
- research-articleDecember 2022
Robust watermarking based on blur‐guided JND model for macrophotography images
International Journal of Intelligent Systems (IJIS), Volume 37, Issue 12Pages 12450–12471https://doi.org/10.1002/int.23093AbstractMacrophotography Images (MPIs) have recently emerged as an active topic due to the development of mobile phone camera technology. A large number of MPIs have been rapidly increasing in many rich visual services, such as smartphones or high‐...