2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020
DOI: 10.1109/cvpr42600.2020.00219
|View full text |Cite
|
Sign up to set email alerts
|

StegaStamp: Invisible Hyperlinks in Physical Photographs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
155
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 222 publications
(175 citation statements)
references
References 30 publications
0
155
0
Order By: Relevance
“…However, none of these methods account for the localization problem of encoded messages in input images. Recently, Stegastamp [Tancik et al 2020] starts to include perspective warp to the perturbation pipeline. However, their detection method presents a degraded performance in the real experiments due to the separate architecture of the segmentation network.…”
Section: Related Workmentioning
confidence: 99%
“…However, none of these methods account for the localization problem of encoded messages in input images. Recently, Stegastamp [Tancik et al 2020] starts to include perspective warp to the perturbation pipeline. However, their detection method presents a degraded performance in the real experiments due to the separate architecture of the segmentation network.…”
Section: Related Workmentioning
confidence: 99%
“…Various methods have been proposed for image watermarking that are mostly robust to conventional image attacks [ 1 , 2 , 3 ] but are vulnerable to multiple attacks. These schemes are not typically designed to work for screen-capture photos, but in recent years, print-to-scan [ 4 , 5 ], print-to-capture [ 6 , 7 ], and screenshot [ 8 ] scenarios have been studied extensively. However, screen-shooting requires more sophisticated and new attacks, such as moiré, different scale display, lens distortion, and light source distortion.…”
Section: Introductionmentioning
confidence: 99%
“…Fueled by the powerful learning ability of Deep Neural Networks (DNN), researchers have applied it to watermarking and achieved excellent performance [18][19][20]. However, these methods usually suffer from the following problems: 1) Single model is often not universal for different image resolutions or various embedding capacities [18,20]. 2) These models often do not consider the robustness against various attacks and the applicability is not satisfactory [19].…”
Section: Introductionmentioning
confidence: 99%