2022
DOI: 10.3390/jimaging8050132
|View full text |Cite
|
Sign up to set email alerts
|

Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?

Abstract: In the last decade, Social Networks (SNs) have deeply changed many aspects of society, and one of the most widespread behaviours is the sharing of pictures. However, malicious users often exploit shared pictures to create fake profiles, leading to the growth of cybercrime. Thus, keeping in mind this scenario, authorship attribution and verification through image watermarking techniques are becoming more and more important. In this paper, we firstly investigate how thirteen of the most popular SNs treat uploade… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 75 publications
0
5
0
Order By: Relevance
“…A photo response non-uniformitybased forgery detection method in image watermarking also proves their effectiveness in detecting forgeries of digital images [40]. User-unaware watermarks can be effectively used in detecting fake profiles of any social network, where the photo response non-uniformity method shows more effectiveness compared to the state-of-the-art methods [41]. In the future, we will work with generative adversarial networks, photo response non-uniformity, or user-unaware watermarks to enhance the robustness of our method.…”
Section: Discussionmentioning
confidence: 83%
“…A photo response non-uniformitybased forgery detection method in image watermarking also proves their effectiveness in detecting forgeries of digital images [40]. User-unaware watermarks can be effectively used in detecting fake profiles of any social network, where the photo response non-uniformity method shows more effectiveness compared to the state-of-the-art methods [41]. In the future, we will work with generative adversarial networks, photo response non-uniformity, or user-unaware watermarks to enhance the robustness of our method.…”
Section: Discussionmentioning
confidence: 83%
“…Note, the default image dimensions/size accepted by 13 prominent SNs, recently studied by Bertini et al. in [10], are given in Table 2. This table shows that all of these SNs are defaulted to accept an image with dimensions in the power of two.…”
Section: Methodsmentioning
confidence: 99%
“…Unfortunately, these platforms are also the primary source of information leaks, and according to Bertini et al. [10], only one out of 13 main SNs uses watermarking technology Before uploading an image of their work on a SN, artists can embed the electronic version of their art with a robust watermark. This means, if an artist comes across a stolen version of their work, they can alert the relevant SN, and prove the copyright of their work via the robust watermark.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous watermarking schemes for the protection of concealed information, content authentication, and IPR protection have been proposed in numerous studies, either in the spatial or transform domain [3]- [5]. This section presents a summary of such previously proposed watermarking strategies.…”
Section: Related Researchmentioning
confidence: 99%
“…In that regard, among the numerous methods adopted to protect CH data, digital watermarking has attracted considerable attention in the current scenario owing to its potential in certifying data authentication and validating ownership rights. Using this method, unrevealed data (called watermarks) are hidden inside digital data without threatening the confidentiality of the original data [3]. Digital watermarking methods can be typically categorized into two types: robust and fragile.…”
Section: Introductionmentioning
confidence: 99%