1. Yossi Adi Carsten Baum Moustapha Cisse Benny Pinkas and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In { USENIX} Security Symposium ({ USENIX} Security 18). 1615–1631. Yossi Adi Carsten Baum Moustapha Cisse Benny Pinkas and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In { USENIX} Security Symposium ({ USENIX} Security 18). 1615–1631.
2. Blind reliable invisible watermarking method in wavelet domain for face image watermark
3. A Survey of Data Marketplaces and Their Business Models
4. Abdullah Bamatraf , Rosziati Ibrahim , and Mohd. Najib Mohd. Salleh. 2011. A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit. CoRR abs/1111.6727 ( 2011 ). arXiv:1111.6727http://arxiv.org/abs/1111.6727 Abdullah Bamatraf, Rosziati Ibrahim, and Mohd. Najib Mohd. Salleh. 2011. A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit. CoRR abs/1111.6727 (2011). arXiv:1111.6727http://arxiv.org/abs/1111.6727