Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing
Abstract
References
Index Terms
- Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing
Recommendations
Cryptanalysis on majority-voting based self-recovery watermarking scheme
In 2007, Wang-Chen proposed a majority-voting based self-recovery watermarking scheme, in which the additional authentication watermark of each block was embedded in the less significant bits and used to examine the authenticity of the same block. In ...
Nonlinear scrambling-based reversible watermarking for 2D-vector maps
The reversible watermarking technique is suitable for vector maps due to its reversibility after watermark extraction. In this paper, a novel reversible watermarking scheme based on the idea of nonlinear scrambling is proposed. It begins with feature ...
Ambiguity attack against text-to-image diffusion model watermarking
Highlights- The proposed scheme is the first work for ambiguity attack of SDM watermarking.
- The implementation of the scheme only requires a small cost.
- Our method does not need the original training data.
- The proposed method is effective ...
AbstractIn recent years, the text-to-image diffusion models have achieved excellent performance. Among them, stable diffusion models (SDMs) have become one of the most widely used models because of their excellent performance. Scholars have proposed many ...
Comments
Information & Contributors
Information
Published In

- General Chair:
- Fernando Pérez-González,
- Program Chairs:
- Pedro Comesaña-Alfaro,
- Christian Krätzer,
- Hong Vicky Zhao
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 111Total Downloads
- Downloads (Last 12 months)111
- Downloads (Last 6 weeks)29
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in