Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking
and Steganography
- URL: http://arxiv.org/abs/2107.09287v3
- Date: Wed, 19 Apr 2023 05:09:08 GMT
- Title: Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking
and Steganography
- Authors: Zihan Wang, Olivia Byrnes, Hu Wang, Ruoxi Sun, Congbo Ma, Huaming
Chen, Qi Wu, Minhui Xue
- Abstract summary: Digital watermarking and steganography techniques can be used to protect sensitive intellectual property and enable confidential communication.
Future research directions that unite digital watermarking and steganography on software engineering to enhance security and mitigate risks are suggested and deliberated.
- Score: 33.12806297686689
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The advancement of secure communication and identity verification fields has
significantly increased through the use of deep learning techniques for data
hiding. By embedding information into a noise-tolerant signal such as audio,
video, or images, digital watermarking and steganography techniques can be used
to protect sensitive intellectual property and enable confidential
communication, ensuring that the information embedded is only accessible to
authorized parties. This survey provides an overview of recent developments in
deep learning techniques deployed for data hiding, categorized systematically
according to model architectures and noise injection methods. The objective
functions, evaluation metrics, and datasets used for training these data hiding
models are comprehensively summarised. Additionally, potential future research
directions that unite digital watermarking and steganography on software
engineering to enhance security and mitigate risks are suggested and
deliberated. This contribution furthers the creation of a more trustworthy
digital world and advances Responsible AI.
Related papers
- Understanding Audiovisual Deepfake Detection: Techniques, Challenges, Human Factors and Perceptual Insights [49.81915942821647]
Deep Learning has been successfully applied in diverse fields, and its impact on deepfake detection is no exception.
Deepfakes are fake yet realistic synthetic content that can be used deceitfully for political impersonation, phishing, slandering, or spreading misinformation.
This paper aims to improve the effectiveness of deepfake detection strategies and guide future research in cybersecurity and media integrity.
arXiv Detail & Related papers (2024-11-12T09:02:11Z) - Underwater Object Detection in the Era of Artificial Intelligence: Current, Challenge, and Future [119.88454942558485]
Underwater object detection (UOD) aims to identify and localise objects in underwater images or videos.
In recent years, artificial intelligence (AI) based methods, especially deep learning methods, have shown promising performance in UOD.
arXiv Detail & Related papers (2024-10-08T00:25:33Z) - Boosting Digital Safeguards: Blending Cryptography and Steganography [0.30783046172997025]
Steganography involves hiding data within another medium, thereby facilitating covert communication by making the message invisible.
This proposed approach takes advantage of the latest advancements in Artificial Intelligence (AI) and Deep Learning (DL), especially through the application of Generative Adversarial Networks (GANs)
The application of GANs enables a smart, secure system that utilizes the inherent sensitivity of neural networks to slight alterations in data.
arXiv Detail & Related papers (2024-04-09T03:36:39Z) - Deepfake Generation and Detection: A Benchmark and Survey [134.19054491600832]
Deepfake is a technology dedicated to creating highly realistic facial images and videos under specific conditions.
This survey comprehensively reviews the latest developments in deepfake generation and detection.
We focus on researching four representative deepfake fields: face swapping, face reenactment, talking face generation, and facial attribute editing.
arXiv Detail & Related papers (2024-03-26T17:12:34Z) - An advanced data fabric architecture leveraging homomorphic encryption
and federated learning [10.779491433438144]
This paper introduces a secure approach for medical image analysis using federated learning and partially homomorphic encryption within a distributed data fabric architecture.
The study demonstrates the method's effectiveness through a case study on pituitary tumor classification, achieving a significant level of accuracy.
arXiv Detail & Related papers (2024-02-15T08:50:36Z) - Deepfake Detection and the Impact of Limited Computing Capabilities [0.0]
This work aims to address the detection of deepfakes across various existing datasets in a scenario with limited computing resources.
The goal is to analyze the applicability of different deep learning techniques under these restrictions and explore possible approaches to enhance their efficiency.
arXiv Detail & Related papers (2024-02-08T11:04:34Z) - Enhancing Situational Awareness in Surveillance: Leveraging Data
Visualization Techniques for Machine Learning-based Video Analytics Outcomes [2.1374208474242815]
This study thoroughly examines data representation and visualization techniques tailored for AI surveillance data within current infrastructures.
It delves into essential data metrics, methods for situational awareness, and various visualization techniques.
The results emphasize the crucial impact of visualizing AI surveillance data on emergency handling, public health protocols, crowd control, resource distribution, predictive modeling, city planning, and informed decision-making.
arXiv Detail & Related papers (2023-12-09T18:32:44Z) - Privacy-Preserving Graph Machine Learning from Data to Computation: A
Survey [67.7834898542701]
We focus on reviewing privacy-preserving techniques of graph machine learning.
We first review methods for generating privacy-preserving graph data.
Then we describe methods for transmitting privacy-preserved information.
arXiv Detail & Related papers (2023-07-10T04:30:23Z) - A Brief Survey on Deep Learning Based Data Hiding, Steganography and
Watermarking [98.1953404873897]
We conduct a brief yet comprehensive review of existing literature and outline three meta-architectures.
Based on this, we summarize specific strategies for various applications of deep hiding, including steganography, light field messaging and watermarking.
arXiv Detail & Related papers (2021-03-02T10:01:03Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.