Counterfeiting in Depth Synthesis based on Digital Watermarking

Authors

  • Yu Liang
  • Yadong Yu
  • Yina Wang
  • Dunjun Li
  • Zejiong Zhou

DOI:

https://doi.org/10.54097/fcis.v5i3.13998

Keywords:

Deep Composition, Deep Forgery, Digital Watermarking, Authenticity, Integrity

Abstract

The purpose of this paper is to discuss and apply digital watermarking technology to solve the forgery problem in depth synthesis. With the rapid development of deep synthesis technology and its application in various fields, it is particularly important to protect the authenticity and integrity of digital content. Based on the understanding of digital watermarking, this paper explores an experimental design, which uses watermarking embedding and extraction algorithms and forgery detection technology to solve the problem of deep forgery, protect the copyright, integrity and anti-copy of digital products. In order to improve the robustness and reliability of the watermark, a suitable watermark embedding and extraction algorithm is designed by analyzing the characteristics of deep synthesis forged media in the experimental process. Then select the data set containing the original digital media and the deep synthetic forged samples, extract the features of the two, and find out the features that distinguish the differences between the two. Finally, the forgery detection technology is used to evaluate the performance of digital watermarking technology in depth forgery detection. In this paper, digital watermarking technology is used to provide an effective solution to the problem of forgery in depth synthesis, which can be applied to protect intellectual property rights, prevent tampering and forgery, and protect the authenticity and integrity of digital media content.

Downloads

Download data is not yet available.

References

ZHang Yu-zhi, Wang Rui-fang, Zhu Liang, et al.Survey of deep forgery generation and detection [J].Information Security Research, 2022,8 (03): 258-269.

Tan Hui. Digital Watermarking Technology and Its Application [J]. Information and Computer (Theory Edition), 2018 (13): 221-222 + 225.

Zhang Yang, Qing Shibo, He Xiaohai. Research on robust blind watermarking algorithm based on DWT-SVD [J].Intelligent Computers and Applications, 2022,12 (02): 44-48 + 53.

Li Min. Overview of the development of deep forgery face detection technology [J]. Television Technology, 2023,47 (09).

Xuan Lu. A Spatial Watermarking Algorithm Based on Relation [J]. Computer Programming Skills and Maintenance, 2022, (07).

Ye Shaopeng. Research on Digital Image Robust Watermarking Algorithm Based on Transform Domain [D]. Chongqing University of Posts and Telecommunications, 2022.

Wang Fei. A feature-based adaptive watermarking algorithm [J]. Modern Electronic Technology, 2012, 35 (14): 83-86.

Zhang Fengjuan. Research on Digital Image Watermarking Algorithm Based on Temporal Mixing [D]. Hebei University of Technology, 2015.

Sun Xun. Research on Reversible Watermarking Algorithm for Multimedia Data [D]. Nanjing University of Information Engineering, 2023.

Zhang Kun, Deng Mingxing. FPCB automatic defect detection algorithm based on traditional image processing combined with deep learning [J]. Intelligent Computer and Application, 2023,13 (07).

Wang Huilu. Research on Object Detection Method Based on Deep Learning [D]. Qingdao University of Science and Technology, 2023.

Tu Hang, Yan Zecheng. Research and Practice of Deep Learning Against Sample Attack and Defense Technology [J]. Data Communication, 2023, (05).

Schaefer G, Stich M. UCID: An uncompressed color image database[C]//Storage and retrieval methods and applications for multimedia 2004. SPIE, 2003, 5307: 472-480.

Sedighi V, Fridrich J, Cogranne R. Toss that bossbase, alice! [C]// IS&T intl symposium on Electronic Imaging. 2016.

Tralic D, Zupancic I, Grgic S, et al. CoMoFoD--New database for copy-move forgery detection[C]//Proceedings ELMAR-2013. IEEE, 2013: 49-54.

Beyer L, Hénaff O J, Kolesnikov A, et al. Are we done with imagenet? [J]. arXiv preprint arXiv:2006.07159, 2020.

Erwin S, Saputri W. Hybrid multilevel thresholding and improved harmony search algorithm for segmentation[J]. Int. J. Electr. Comput. Eng, 2018, 8(6): 4593-4602.

Steinebach M, Petitcolas F A P, Raynal F, et al. StirMark benchmark: audio watermarking attacks[C]//Proceedings international conference on information technology: coding and computing. IEEE, 2001: 49-54.

Liu Di. Research on Digital Watermarking Algorithm Based on Discrete Cosine Transform [J]. Computer Programming Skills and Maintenance, 2023 (09).

Peng Rongjie, Li Longzhen. Digital Watermarking Technology Based on Improved Discrete Wavelet Transform [J]. Intelligent Computer and Application, 2023,13 (07).

Downloads

Published

14-11-2023

Issue

Section

Articles

How to Cite

Liang, Y., Yu, Y., Wang, Y., Li, D., & Zhou, Z. (2023). Counterfeiting in Depth Synthesis based on Digital Watermarking. Frontiers in Computing and Intelligent Systems, 5(3), 100-106. https://doi.org/10.54097/fcis.v5i3.13998