2023
DOI: 10.1007/978-3-031-25115-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 23 publications
0
1
0
Order By: Relevance
“…Bellafqira et al . [ 32 ] developed a watermarking method to ensure the security of genetic data in the context of GWAS, with the main focus on identifying the origin of the attack. Öksüz et al .…”
Section: Software-based Solutionsmentioning
confidence: 99%
“…Bellafqira et al . [ 32 ] developed a watermarking method to ensure the security of genetic data in the context of GWAS, with the main focus on identifying the origin of the attack. Öksüz et al .…”
Section: Software-based Solutionsmentioning
confidence: 99%
“…In principle, this type of attack is referred as illegal steganography and involves modifying more or less imperceptibly images to hide some piece of data into the image pixels directly. Notice that, as defined, steganography focuses on secret communication and differs from watermarking whose aim is to hide a message into host data to support various security services such as integrity [6] , traceability [7] , fight against information leaks and so on [8][9][10][11][12] . With watermarking, everyone knows there is a message or, equivalently, a watermark embedded to protect the host data.…”
Section: Introductionmentioning
confidence: 99%
“…Pruning Attack: Setting the less useful weights of the model to zero. [15,[59][60][61][62][63][64][64][65][66][67][68][69][70][71] and Black-Box [65,[72][73][74][75][76][77][78][79][80][81][82][83][84][85] watermarking. Each technique is defined by the type of access to the model parameters during the verification process.…”
mentioning
confidence: 99%
“…In the White-Box setting, we assume that the owner will have full access to the model (architecture, parameters, activation maps...). In this way, to insert a watermark into a DNN, the owner will hide a piece of information b in the form of a binary string or an image (e.g., Quick Response code) into the model's parameters [15,71,86], activation maps [65,67,68] or by adding a passport layer [66,87]. As formulated in [68], a White-Box watermarking scheme is defined as follows:…”
mentioning
confidence: 99%