{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:29:44Z","timestamp":1743060584105,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031189128"},{"type":"electronic","value":"9783031189135"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18913-5_58","type":"book-chapter","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:03:53Z","timestamp":1666825433000},"page":"758-772","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["JoinTW: A Joint Image-to-Image Translation and\u00a0Watermarking Method"],"prefix":"10.1007","author":[{"given":"Xiaohan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yunhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ruijie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuanfang","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,27]]},"reference":[{"issue":"5","key":"58_CR1","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MSP.2011.941841","volume":"28","author":"M Barni","year":"2011","unstructured":"Barni, M.: Steganography in digital media: principles, algorithms, and applications. IEEE Sig. Process. Mag. 28(5), 142\u2013144 (2011)","journal-title":"IEEE Sig. Process. Mag."},{"issue":"8","key":"58_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2001.940043","volume":"39","author":"M Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Cox, I.J., Hern\u00e1ndez, J., P\u00e9rez-Gonz\u00e1lez, F.: Digital watermarking for copyright protection: a communications perspective. IEEE Commun. Mag. 39(8), 90\u201391 (2001)","journal-title":"IEEE Commun. Mag."},{"key":"58_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, D., Kim, S., Vizier, G., Salzmann, M.: DUNIT: detection-based unsupervised image-to-image translation. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4786\u20134795 (2020)","DOI":"10.1109\/CVPR42600.2020.00484"},{"issue":"10","key":"58_CR4","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Trans. Sig. Process. 53(10), 3976\u20133987 (2005)","journal-title":"IEEE Trans. Sig. Process."},{"key":"58_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Y., Xu, X., Jia, J.: Domain adaptive image-to-image translation. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5273\u20135282 (2020)","DOI":"10.1109\/CVPR42600.2020.00532"},{"key":"58_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.neucom.2020.07.044","volume":"415","author":"H Dou","year":"2020","unstructured":"Dou, H., Chen, C., Hu, X., Jia, L., Peng, S.: Asymmetric CycleGAN for image-to-image translations with uneven complexities. Neurocomputing 415, 114\u2013122 (2020)","journal-title":"Neurocomputing"},{"issue":"4","key":"58_CR7","doi-asserted-by":"publisher","first-page":"1436","DOI":"10.1109\/TCSVT.2020.3009349","volume":"31","author":"H Fang","year":"2021","unstructured":"Fang, H., et al.: Deep template-based watermarking. IEEE Trans. Circ. Syst. Video Technol. 31(4), 1436\u20131451 (2021)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"Gao, Y., et al.: High-fidelity and arbitrary face editing. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 16115\u201316124 (2021)","DOI":"10.1109\/CVPR46437.2021.01585"},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Hamidi, M., Haziti, M.E., Cherifi, H., Aboutajdine, D.: A blind robust image watermarking approach exploiting the DFT magnitude. In: IEEE\/ACS International Conference of Computer Systems and Applications, pp. 1\u20136 (2015)","DOI":"10.1109\/AICCSA.2015.7507124"},{"key":"58_CR10","unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, pp. 1954\u20131963 (2017)"},{"key":"58_CR11","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, pp. 6626\u20136637 (2017)"},{"key":"58_CR12","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security, pp. 234\u2013239 (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"58_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J.J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1 (2014). https:\/\/doi.org\/10.1186\/1687-417X-2014-1","journal-title":"EURASIP J. Inf. Secur."},{"key":"58_CR14","doi-asserted-by":"crossref","unstructured":"Huang, X., Belongie, S.J.: Arbitrary style transfer in real-time with adaptive instance normalization. In: IEEE International Conference on Computer Vision, pp. 1510\u20131519 (2017)","DOI":"10.1109\/ICCV.2017.167"},{"key":"58_CR15","doi-asserted-by":"crossref","unstructured":"Iizuka, S., Simo-Serra, E., Ishikawa, H.: Let there be color!: Joint end-to-end learning of global and local image priors for automatic image colorization with simultaneous classification. ACM Trans. Graph. 35(4), 110:1\u2013110:11 (2016)","DOI":"10.1145\/2897824.2925974"},{"key":"58_CR16","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 5967\u20135976 (2017)","DOI":"10.1109\/CVPR.2017.632"},{"key":"58_CR17","doi-asserted-by":"crossref","unstructured":"Jeong, S., Kim, Y., Lee, E., Sohn, K.: Memory-guided unsupervised image-to-image translation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 6558\u20136567 (2021)","DOI":"10.1109\/CVPR46437.2021.00649"},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HiNet: deep image hiding by invertible network. In: IEEE\/CVF International Conference on Computer Vision, pp. 4713\u20134722 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"58_CR19","doi-asserted-by":"crossref","unstructured":"Kim, S., Jeong, Y., Kim, J., Kim, J., Lee, H.T., Seo, J.H.: IronMask: modular architecture for protecting deep face template. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 16125\u201316134 (2021)","DOI":"10.1109\/CVPR46437.2021.01586"},{"key":"58_CR20","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (2015)"},{"key":"58_CR21","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Image-to-image translation via hierarchical style disentanglement. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 8639\u20138648 (2021)","DOI":"10.1109\/CVPR46437.2021.00853"},{"key":"58_CR22","doi-asserted-by":"crossref","unstructured":"Lin, T., et al.: Drafting and revision: Laplacian pyramid network for fast high-quality artistic style transfer. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5141\u20135150 (2021)","DOI":"10.1109\/CVPR46437.2021.00510"},{"key":"58_CR23","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhan, R., Chang, H., Yang, F., Milanfar, P.: Distortion agnostic deep watermarking. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13545\u201313554 (2020)","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"58_CR24","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Verdoliva, L., Poggi, G.: Do GANs leave artificial fingerprints? In: IEEE Conference on Multimedia Information Processing and Retrieval, pp. 506\u2013511 (2019)","DOI":"10.1109\/MIPR.2019.00103"},{"issue":"12","key":"58_CR25","doi-asserted-by":"publisher","first-page":"4695","DOI":"10.1109\/TIP.2012.2214050","volume":"21","author":"A Mittal","year":"2012","unstructured":"Mittal, A., Moorthy, A.K., Bovik, A.C.: No-reference image quality assessment in the spatial domain. IEEE Trans. Image Process. 21(12), 4695\u20134708 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"58_CR26","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/LSP.2012.2227726","volume":"20","author":"A Mittal","year":"2013","unstructured":"Mittal, A., Soundararajan, R., Bovik, A.C.: Making a \u201ccompletely blind\u2019\u2019 image quality analyzer. IEEE Sig. Process. Lett. 20(3), 209\u2013212 (2013)","journal-title":"IEEE Sig. Process. Lett."},{"key":"58_CR27","doi-asserted-by":"crossref","unstructured":"Venkatanath, N., Praneeth, D., Bh, M.C., Channappayya, S.S., Medasani, S.S.: Blind image quality evaluation using perception based features. In: National Conference on Communications, pp. 1\u20136 (2015)","DOI":"10.1109\/NCC.2015.7084843"},{"key":"58_CR28","doi-asserted-by":"crossref","unstructured":"Park, T., Liu, M., Wang, T., Zhu, J.: Semantic image synthesis with spatially-adaptive normalization. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2337\u20132346 (2019)","DOI":"10.1109\/CVPR.2019.00244"},{"key":"58_CR29","doi-asserted-by":"crossref","unstructured":"Richardson, E., et al.: Encoding in style: a StyleGAN encoder for image-to-image translation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2287\u20132296 (2021)","DOI":"10.1109\/CVPR46437.2021.00232"},{"key":"58_CR30","doi-asserted-by":"crossref","unstructured":"Shafaei, A., Little, J.J., Schmidt, M.: AutoRetouch: automatic professional face retouching. In: IEEE Winter Conference on Applications of Computer Vision, pp. 989\u2013997 (2021)","DOI":"10.1109\/WACV48630.2021.00103"},{"key":"58_CR31","doi-asserted-by":"crossref","unstructured":"Shaham, T.R., Gharbi, M., Zhang, R., Shechtman, E., Michaeli, T.: Spatially-adaptive pixelwise networks for fast image translation. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14882\u201314891 (2021)","DOI":"10.1109\/CVPR46437.2021.01464"},{"issue":"4","key":"58_CR32","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TPAMI.2016.2572683","volume":"39","author":"E Shelhamer","year":"2017","unstructured":"Shelhamer, E., Long, J., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 640\u2013651 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"9","key":"58_CR33","first-page":"165","volume":"2","author":"P Singh","year":"2013","unstructured":"Singh, P., Chadha, R.S.: A survey of digital watermarking techniques, applications and attacks. Int. J. Eng. Innov. Technol. 2(9), 165\u2013175 (2013)","journal-title":"Int. J. Eng. Innov. Technol."},{"key":"58_CR34","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: StegaStamp: invisible hyperlinks in physical photographs. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2114\u20132123 (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"58_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-642-40602-7_39","volume-title":"Pattern Recognition","author":"R Tyle\u010dek","year":"2013","unstructured":"Tyle\u010dek, R., \u0160\u00e1ra, R.: Spatial pattern templates for recognition of objects with regular structure. In: Weickert, J., Hein, M., Schiele, B. (eds.) GCPR 2013. LNCS, vol. 8142, pp. 364\u2013374. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40602-7_39"},{"key":"58_CR36","doi-asserted-by":"crossref","unstructured":"Wang, T., Liu, M., Zhu, J., Tao, A., Kautz, J., Catanzaro, B.: High-resolution image synthesis and semantic manipulation with conditional GANs. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 8798\u20138807 (2018)","DOI":"10.1109\/CVPR.2018.00917"},{"key":"58_CR37","unstructured":"Wang, T., et al.: Video-to-video synthesis. In: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems, pp. 1152\u20131164 (2018)"},{"issue":"4","key":"58_CR38","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"58_CR39","doi-asserted-by":"crossref","unstructured":"Xie, S., Tu, Z.: Holistically-nested edge detection. In: IEEE International Conference on Computer Vision, pp. 1395\u20131403 (2015)","DOI":"10.1109\/ICCV.2015.164"},{"key":"58_CR40","doi-asserted-by":"crossref","unstructured":"Yu, N., Davis, L., Fritz, M.: Attributing fake images to GANs: learning and analyzing GAN fingerprints. In: IEEE\/CVF International Conference on Computer Vision, pp. 7555\u20137565 (2019)","DOI":"10.1109\/ICCV.2019.00765"},{"key":"58_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1007\/978-3-030-58545-7_46","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Zhao","year":"2020","unstructured":"Zhao, Y., Wu, R., Dong, H.: Unpaired image-to-image translation using adversarial consistency loss. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12354, pp. 800\u2013815. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58545-7_46"},{"key":"58_CR42","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","volume":"23","author":"X Zhong","year":"2021","unstructured":"Zhong, X., Huang, P., Mastorakis, S., Shih, F.Y.: An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans. Multim. 23, 1951\u20131961 (2021)","journal-title":"IEEE Trans. Multim."},{"key":"58_CR43","doi-asserted-by":"crossref","unstructured":"Zhu, J., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: IEEE International Conference on Computer Vision, pp. 2242\u20132251 (2017)","DOI":"10.1109\/ICCV.2017.244"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18913-5_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:30:46Z","timestamp":1666827046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18913-5_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031189128","9783031189135"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18913-5_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/en.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"564","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"233","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.03","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.35","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}