no code implementations • 2 Nov 2023 • Tianyi Wang, Mengxiao Huang, Harry Cheng, Bin Ma, Yinglong Wang
Falsification and source tracing are accomplished by justifying the consistency between the content-matched identity perceptual watermark and the recovered robust watermark from the image.