Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Nematollahi, C. Vorakulpipat, Hamurabi Rosales (2017)
Semifragile Speech Watermarking Based on Least Significant Bit Replacement of Line Spectral FrequenciesMathematical Problems in Engineering, 2017
Moad Sayah, K. Redouane, Khaldi Amine (2022)
A wavelet based medical image watermarking scheme for secure transmission in telemedicine applicationsMicroprocessors and Microsystems
Ting Zhu, Wen Qu, Wenliang Cao (2021)
An optimized image watermarking algorithm based on SVD and IWTThe Journal of Supercomputing, 78
Maciej Kaczyński, Z. Piotrowski (2022)
High-Quality Video Watermarking Based on Deep Neural Networks and Adjustable Subsquares Properties AlgorithmSensors (Basel, Switzerland), 22
C. McCool, S. Marcel, A. Hadid, M. Pietikäinen, P. Matejka, J. Černocký, N. Poh, J. Kittler, A. Larcher, C. Lévy, D. Matrouf, J. Bonastre, P. Tresadern, Tim Cootes (2012)
Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data2012 IEEE International Conference on Multimedia and Expo Workshops
Marta Bistroń, Z. Piotrowski (2023)
Efficient Video Watermarking Algorithm Based on Convolutional Neural Networks with Entropy-Based Information MapperEntropy, 25
Ertugrul Gul (2022)
A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark imageConcurrency and Computation: Practice and Experience, 34
R. Woo, A. Park, Timothy Hazen (2006)
The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments2006 IEEE Odyssey - The Speaker and Language Recognition Workshop
Md. Asikuzzaman, Hannes Mareen, Nour Moustafa, K. Choo, M. Pickering (2022)
Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD DomainIEEE Access, 10
Qingtang Su, Xueting Zhang, Huanying Wang (2021)
A blind color image watermarking algorithm combined spatial domain and SVDInternational Journal of Intelligent Systems, 37
M. Nematollahi, M. Akhaee, S. Al-Haddad, Hamurabi Rosales (2015)
Semi-fragile digital speech watermarking for online speaker recognitionEURASIP Journal on Audio, Speech, and Music Processing, 2015
Kosta Pavlovic, Slavko Kovacevic, I. Djurović, Adam Wojciechowski (2021)
Robust speech watermarking by a jointly trained embedder and detector using a DNNDigit. Signal Process., 122
M. Nematollahi, S. Al-Haddad, S. Doraisamy, H. Gamboa-Rosales (2016)
Speaker Frame Selection for Digital Speech WatermarkingNational Academy Science Letters, 39
M. Nematollahi, C. Vorakulpipat, Hamurabi Rosales (2017)
Optimization of a Blind Speech Watermarking Technique against Amplitude ScalingSecur. Commun. Networks, 2017
Faezeh Heydari, Saber Sheybani, Ali Yoonessi (2022)
Iranian emotional face database: Acquisition and validation of a stimulus set of basic facial expressionsBehavior Research Methods, 55
M. Nematollahi, C. Vorakulpipat, H. Gamboa-Rosales, F. Martínez-Ruiz, J. Rosa-Vargas (2017)
Digital Speech Watermarking Based on Linear Predictive Analysis and Singular Value DecompositionProceedings of the National Academy of Sciences, India Section A: Physical Sciences, 87
C. Lopes, F. Perdigão (2012)
Phone Recognition on the TIMIT Database
Yifei Wang, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang (2022)
A DTCWT-SVD Based Video Watermarking Resistant to Frame Rate Conversion2022 International Conference on Culture-Oriented Science and Technology (CoST)
Z. Faheem, Mubashir Ali, M. Raza, Farrukh Arslan, Jehad Ali, Mehedi Masud, Mohammad Shorfuzzaman (2022)
Image Watermarking Scheme Using LSB and Image GradientApplied Sciences
M. Nematollahi, S. Al-Haddad (2013)
An overview of digital speech watermarkingInternational Journal of Speech Technology, 16
A. Daoui, M. Yamni, H. Karmouni, M. Sayyouri, H. Qjidaa, Saad Motahhir, Ouazzani Jamil, W. El-shafai, A. Algarni, N. Soliman, M. Aly (2022)
Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) ApplicationsElectronics
Swapnil Takale, D. Mulani (2022)
DWT-PCA based Video WatermarkingJournal of Electronics,Computer Networking and Applied Mathematics
Elhameh Farri, P. Ayubi (2022)
A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protectionJournal of Ambient Intelligence and Humanized Computing, 14
M. Schuurmans (2002)
Digital watermarkingProceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design
Abdulmawla Najih, S. Al-Haddad, A. Ramli, S. Hashim, M. Nematollahi (2017)
Digital image watermarking based on angle quantization in discrete contourlet transformJ. King Saud Univ. Comput. Inf. Sci., 29
Ling Yang, Hongxia Wang, Fei Zhang, Dekai Liu (2022)
Robust Video Watermarking Based on Residual Synchronization in the DCT Domain2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)
S. Bhalerao, I. Ansari, Anil Kumar (2022)
Reversible ECG Watermarking for Ownership Detection, Tamper Localization, and RecoveryCircuits, Systems, and Signal Processing, 41
Edo Liberty, Zohar Karnin, Bing Xiang, Laurence Rouesnel, Baris Coskun, Ramesh Nallapati, Julio Delgado, Amir Sadoughi, Yury Astashonok, Piali Das, Can Balioglu, Saswata Chakravarty, Madhav Jha, P. Gautier, D. Arpin, Tim Januschowski, Valentin Flunkert, Bernie Wang, Jan Gasthaus, Lorenzo Stella, Syama Rangapuram, David Salinas, Sebastian Schelter, Alex Smola (2020)
Elastic Machine Learning Algorithms in Amazon SageMakerProceedings of the 2020 ACM SIGMOD International Conference on Management of Data
Hwai-Tsu Hu, Hsien-Hsin Chou, Tung-Tsun Lee (2021)
Robust Blind Speech Watermarking via FFT-Based Perceptual Vector Norm Modulation With Frame Self-SynchronizationIEEE Access, 9
M. Nematollahi, S. Al-Haddad, F. Zarafshan (2015)
Blind digital speech watermarking based on Eigen-value quantization in DWTJ. King Saud Univ. Comput. Inf. Sci., 27
2022. A Screen ‐ shooting Resilient Document Image Watermarking Scheme Using Deep Neural Network
Xinlin Huang, Xiaomin Ma, Fei Hu (2017)
Editorial: Machine Learning and Intelligent CommunicationsMobile Networks and Applications, 23
Li Wang, Lele Cheng, Xin Liu, Di Shen (2017)
Machine Learning and Intelligent Communications, 227
Recently, machine learning (ML) has been applying in almost all scientific fields to model and simulate the behaviour of complex systems. At the same time, the number of the proposed watermarking techniques have been increasing every year. Although most of the researchers in the watermarking and data hiding field put all their effort to compete each other to develop more efficient algorithm, the selection of the most efficient one is almost impossible for industries or software developers. In other words, comparison among all the watermarking techniques in order to select one watermarking technique would be cumbersome task. Moreover, the computer security is becoming more advanced which a single watermark technique cannot fulfil all the required criteria and there is a chance that an anti-watermarking is developed to remove the embedded watermark from the host data. This gap of knowledge to use the watermarking technology for a highly secure application is a real nightmare for the information security engineers and software designers. In this paper, two new approaches are proposed to train deep learning and shallow learning models based on the state-of-the-arts watermarking techniques. For these proposed approaches, several ML algorithms are applied to model various watermarked data, which are watermarked by different watermarking techniques in various spectrums and domains. An experimental setup is constructed based on several speeches, audios, images and videos beside the Amazon Sagemaker as ML modelling to implement the proposed approach. The experimental results show that apart from an overall effectiveness of the model, it would resolve some ambiguities by applying the proposed ML approach as a general watermarking workflow.
Australian Journal of Multi-Disciplinary Engineering – Taylor & Francis
Published: Dec 31, 2023
Keywords: Digital watermarking; machine learning; data hiding; artificial intelligence; computer security
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.