no code implementations • 9 Aug 2022 • Long Dai, Jiarong Mao, Xuefeng Fan, Xiaoyi Zhou
Specifically, a covert trigger set is established to realize the perception-free verification of the watermarking model, and a novel auxiliary network is designed to improve the robustness and security of the watermarking model.