2022
DOI: 10.1109/tcyb.2020.3037208
|View full text |Cite
|
Sign up to set email alerts
|

RIHOOP: Robust Invisible Hyperlinks in Offline and Online Photographs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(21 citation statements)
references
References 57 publications
0
21
0
Order By: Relevance
“…On this basis, Jia et al. [17] proposed a scheme using differentiable 3D rendering and just noticeable difference (JND) loss. This method introduces a distortion network (DN) using differentiable 3D rendering to augment the encoded images, in which almost all distortions in print‐camera process are simulated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On this basis, Jia et al. [17] proposed a scheme using differentiable 3D rendering and just noticeable difference (JND) loss. This method introduces a distortion network (DN) using differentiable 3D rendering to augment the encoded images, in which almost all distortions in print‐camera process are simulated.…”
Section: Related Workmentioning
confidence: 99%
“…One is template-additive based methods [10][11][12]. The other two are transformed invariant domain-based methods [13][14][15] which is developed from PSR watermarking scheme, the last one methods are based on the deep neural network (DNN-based) [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned in the Introduction, DVMark [9] used a pre-trained 3D-CNN to mimic video compression. Jia [13] combined StegaStamp [4] and light model [19], and RIVA-GAN [11] used a differentiable noise layer of DCT to simulate video compression. Essentially, these methods let the model learn the feature of 3D-CNN or differential distortion layer but real video compression.…”
Section: Compressionmentioning
confidence: 99%
“…Most of the existing end-to-end steganography algorithms are based on images, for example, Baluja's model [2], Hayes' model [3], SteganoGan [4], compression. To resist distortion of camera photographing and video compression, Jia [13] built a distortion network combined StegaStamp [14] and a 3D light model [19] All in all, there are many challenges to design an end-to-end video steganography network. First, it requires the steganography algorithm to have a high extraction rate, a large embedding capacity and good visual quality, which strongly depends on an excellent encoding and decoding deep learning network design.…”
Section: Introductionmentioning
confidence: 99%
“…Zhong et al [22] proposed a watermarking system based on Deep Neural Networks(DNN) using an unsupervised structure and a new loss calculation method, which is capable of extracting watermarks in camera captured images as well, with good practicality and robustness. Jia et al [23] proposed a new method for embedding hyperlinks into ordinary images that can detect watermarks by cameraequipped mobile devices. Incorporation of a distortion network which employs distinguishable 3D rendering operations among encoder and decoder can emulate distortion caused by the introduction of camera imaging and is somewhat robust to camera photography.…”
Section: Introductionmentioning
confidence: 99%