GIFMarking: The robust watermarking for animated GIF based deep learning

[1]  Chin-Chen Chang,et al.  A Color Image Authentication Method Using Partitioned Palette and Morphological Operations , 2008, IEICE Trans. Inf. Syst..

[2]  Hazem Munawer Al-Otum Secure and robust host-adapted color image watermarking using inter-layered wavelet-packets , 2020, J. Vis. Commun. Image Represent..

[3]  Bin Li,et al.  A New Payload Partition Strategy in Color Image Steganography , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Guo-Jun Qi,et al.  Loss-Sensitive Generative Adversarial Networks on Lipschitz Densities , 2017, International Journal of Computer Vision.

[5]  Cai Man-chun Valid Digital Watermarking of Palette-based Image , 2004 .

[6]  Jianyu Wang,et al.  A method of processing color image watermarking based on the Haar wavelet , 2019, J. Vis. Commun. Image Represent..

[7]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[8]  Ling-Yuan Hsu,et al.  Robust blind image watermarking using crisscross inter-block prediction in the DCT domain , 2017, J. Vis. Commun. Image Represent..

[9]  Ross B. Girshick,et al.  Mask R-CNN , 2017, 1703.06870.

[10]  Ippei HAMAMOTO,et al.  Neural Watermarking Method Including an Attack Simulator against Rotation and Compression Attacks , 2020, IEICE Trans. Inf. Syst..

[11]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[12]  Junxue Yang,et al.  An embedding strategy on fusing multiple image features for data hiding in multiple images , 2020, J. Vis. Commun. Image Represent..

[13]  Yi Zhou,et al.  Impulsive noise suppression in the case of frequency estimation by exploring signal sparsity , 2016, Digit. Signal Process..

[14]  Zheng Qin,et al.  Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features , 2022, IEEE Transactions on Dependable and Secure Computing.

[15]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[16]  Alan C. Bovik,et al.  Image information and visual quality , 2006, IEEE Trans. Image Process..

[17]  Nader Karimi,et al.  ReDMark: Framework for residual diffusion watermarking based on deep networks , 2018, Expert Syst. Appl..

[18]  Wen-Hsiang Tsai,et al.  A combined approach to integrity protection and verification of palette images using fragile watermarks and digital signatures , 2004 .

[19]  Jianyi Liu,et al.  Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.