This paper investigates invisible blind watermark approaches as a security mechanism to track ownership in online digital collection of ancient coin images. Recent deep-based architectures are compared in addition to traditional transformation-domain approaches. Besides evaluating watermarking for the task-specific images, this analysis takes into account challenging attacks obtained by combining both geometric or photometric attacks to test the actual effectiveness of compared methods for practical purposes. Moreover, the sequential application of pair of watermarking methods is considered with the intention of increasing the robustness of the joint watermarking and as an additional form of attack. Experimental evaluation shows that deep-based watermarking is robust to most of the base attacks and that sequential joint watermarking can improve upon the robustness of the original methods. Finally, although the strength of recent approaches to common attacks is sufficient, complex combined attacks remain still a challenge.
Bellavia, F., Sole, L. (2026). Exploring Image Watermarking in Digital Collections of Ancient Coins. In E. Rodolà, F. Galasso, I. Masi (a cura di), Image Analysis and Processing - ICIAP 2025 Workshops : 23rd International Conference, Rome, Italy, September 15–19, 2025, Proceedings, Part I (pp. 545-556). Springer Science and Business Media Deutschland GmbH [10.1007/978-3-032-11317-7_44].
Exploring Image Watermarking in Digital Collections of Ancient Coins
Bellavia F.
;Sole L.
2026-01-02
Abstract
This paper investigates invisible blind watermark approaches as a security mechanism to track ownership in online digital collection of ancient coin images. Recent deep-based architectures are compared in addition to traditional transformation-domain approaches. Besides evaluating watermarking for the task-specific images, this analysis takes into account challenging attacks obtained by combining both geometric or photometric attacks to test the actual effectiveness of compared methods for practical purposes. Moreover, the sequential application of pair of watermarking methods is considered with the intention of increasing the robustness of the joint watermarking and as an additional form of attack. Experimental evaluation shows that deep-based watermarking is robust to most of the base attacks and that sequential joint watermarking can improve upon the robustness of the original methods. Finally, although the strength of recent approaches to common attacks is sufficient, complex combined attacks remain still a challenge.| File | Dimensione | Formato | |
|---|---|---|---|
|
2026. Bellavia Sole.pdf
Solo gestori archvio
Descrizione: Articolo principale
Tipologia:
Versione Editoriale
Dimensione
656.57 kB
Formato
Adobe PDF
|
656.57 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


