{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:48Z","timestamp":1773512628046,"version":"3.50.1"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031729799","type":"print"},{"value":"9783031729805","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-72980-5_25","type":"book-chapter","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T09:15:43Z","timestamp":1730106943000},"page":"427-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Certifiably Robust Image Watermark"],"prefix":"10.1007","author":[{"given":"Zhengyuan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Moyang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yuepeng","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jinyuan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,29]]},"reference":[{"key":"25_CR1","unstructured":"Midjourney (2022). https:\/\/www.midjourney.com"},{"key":"25_CR2","unstructured":"Stable diffusion (2022). https:\/\/github.com\/CompVis\/stable-diffusion"},{"key":"25_CR3","unstructured":"Dall-e 2 dataset (2023). https:\/\/dalle2.gallery"},{"key":"25_CR4","unstructured":"Dall-e 3 (2023). https:\/\/openai.com\/index\/dall-e-3"},{"key":"25_CR5","unstructured":"An, B., et\u00a0al.: Benchmarking the robustness of image watermarks. arXiv preprint arXiv:2401.08573 (2024)"},{"key":"25_CR6","unstructured":"Bansal, A., et al.: Certified neural network watermarks with randomized smoothing. In: International Conference on Machine Learning, pp. 1450\u20131465 (2022)"},{"key":"25_CR7","unstructured":"Bonferroni, C.: Teoria statistica delle classi e calcolo delle probabilita. Pubblicazioni del R Istituto Superiore di Scienze Economiche e Commericiali di Firenze (1936)"},{"key":"25_CR8","unstructured":"Chiang, P.Y., Curry, M., Abdelkader, A., Kumar, A., Dickerson, J., Goldstein, T.: Detection as regression: certified object detection with median smoothing. In: Conference on Neural Information Processing Systems, vol. 33, pp. 1275\u20131286 (2020)"},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1093\/biomet\/26.4.404","volume":"26","author":"CJ Clopper","year":"1934","unstructured":"Clopper, C.J., Pearson, E.S.: The use of confidence or fiducial limits illustrated in the case of the binomial. Biometrika 26(4), 404\u2013431 (1934)","journal-title":"Biometrika"},{"key":"25_CR10","unstructured":"Cohen, J., Rosenfeld, E., Kolter, Z.: Certified adversarial robustness via randomized smoothing. In: International Conference on Machine Learning, pp. 1310\u20131320 (2019)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255(2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"25_CR12","unstructured":"Esser, P.: Stable diffusion invisible watermark (2022). https:\/\/github.com\/CompVis\/stable-diffusion\/blob\/main\/scripts\/tests\/test_watermark.py"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Fang, H., et al.: Denol: a few-shot-sample-based decoupling noise layer for cross-channel watermarking robustness. In: ACM Multimedia (2023)","DOI":"10.1145\/3581783.3612068"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Fernandez, P., Couairon, G., J\u00e9gou, H., Douze, M., Furon, T.: The stable signature: rooting watermarks in latent diffusion models. In: International Conference on Computer Vision, pp. 22466\u201322477 (2023)","DOI":"10.1109\/ICCV51070.2023.02053"},{"key":"25_CR15","unstructured":"Gowal, S., Kohli, P.: Identifying AI-generated images with synthid (2023). https:\/\/deepmind.google\/discover\/blog\/identifying-ai-generated-images-with-synthid"},{"key":"25_CR16","unstructured":"Hu, Y., Jiang, Z., Guo, M., Gong, N.: Stable signature is unstable: removing image watermark from diffusion models. arXiv preprint arXiv:2405.07145 (2024)"},{"key":"25_CR17","unstructured":"Hu, Y., Jiang, Z., Guo, M., Gong, N.: A transfer attack to image watermarks. arXiv preprint arXiv:2403.15365 (2024)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Jia, J., Cao, X., Wang, B., Gong, N.Z.: Certified robustness for top-k predictions against adversarial perturbations via randomized smoothing. In: International Conference on Learning Representations (2019)","DOI":"10.1145\/3366423.3380029"},{"key":"25_CR19","unstructured":"Jia, J., Qu, W., Gong, N.: Multiguard: provably robust multi-label classification against adversarial examples. In: Conference on Neural Information Processing Systems (2022)"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Fang, M., Gong, N.Z.: Ipcert: provably robust intellectual property protection for machine learning. In: International Conference on Computer Vision Workshop (2023)","DOI":"10.1109\/ICCVW60793.2023.00389"},{"key":"25_CR21","unstructured":"Jiang, Z., Guo, M., Hu, Y., Gong, N.Z.: Watermark-based detection and attribution of AI-generated content. arXiv preprint arXiv:2404.04254 (2024)"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Zhang, J., Gong, N.Z.: Evading watermark based detection of AI-generated content. In: ACM Conference on Computer and Communications Security (CCS) (2023)","DOI":"10.1145\/3576915.3623189"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., et al.: Microsoft coco: common objects in context. In: European Conference on Computer Vision (2014)","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"25_CR24","unstructured":"Lukas, N., Diaa, A., Fenaux, L., Kerschbaum, F.: Leveraging optimization for adaptive attacks on image watermarks. In: International Conference on Learning Representations (2024)"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhan, R., Chang, H., Yang, F., Milanfar, P.: Distortion agnostic deep watermarking. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"25_CR26","unstructured":"Nie, W., Guo, B., Huang, Y., Xiao, C., Vahdat, A., Anandkumar, A.: Diffusion models for adversarial purification. In: International Conference on Machine Learning (2022)"},{"key":"25_CR27","unstructured":"OpenAI: C2pa in dall-e 3 (2024). https:\/\/help.openai.com\/en\/articles\/8912793-c2pa-in-dall-e-3"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. (2000)","DOI":"10.1007\/10719724_15"},{"key":"25_CR29","unstructured":"Saberi, M., et al.: Robustness of AI-image detectors: fundamental limits and practical attacks. arXiv preprint arXiv:2310.00076 (2023)"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Sharma, P., Ding, N., Goodman, S., Soricut, R.: Conceptual captions: a cleaned, hypernymed, image alt-text dataset for automatic image captioning. In: Annual Meeting of the Association for Computational Linguistics (2018)","DOI":"10.18653\/v1\/P18-1238"},{"key":"25_CR31","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: invisible hyperlinks in physical photographs. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"25_CR32","unstructured":"THE WHITE HOUSE: Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (2023). https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2023\/10\/30\/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence"},{"key":"25_CR33","unstructured":"Turc, I., Nemade, G.: Midjourney user prompts & generated images (250k)(2022). https:\/\/www.kaggle.com\/ds\/2349267"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Wang, R., Lin, C., Zhao, Q., Zhu, F.: Watermark faker: towards forgery of digital image watermarking. In: IEEE International Conference on Multimedia and Expo (2021)","DOI":"10.1109\/ICME51207.2021.9428410"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Wang, Z.J., Montoya, E., Munechika, D., Yang, H., Hoover, B., Chau, D.H.: DiffusionDB: a large-scale prompt gallery dataset for text-to-image generative models. In: Annual Meeting of the Association for Computational Linguistics (2023)","DOI":"10.18653\/v1\/2023.acl-long.51"},{"key":"25_CR36","unstructured":"Wen, Y., Kirchenbauer, J., Geiping, J., Goldstein, T.: Tree-rings watermarks: invisible fingerprints for diffusion images. In: Conference on Neural Information Processing Systems (2023)"},{"key":"25_CR37","doi-asserted-by":"crossref","unstructured":"Yoo, I., Chang, H., Luo, X., Stava, O., Liu, C., Milanfar, P., Yang, F.: Deep 3d-to-2d watermarking: embedding messages in 3d meshes and extracting them from 2d renderings. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2022)","DOI":"10.1109\/CVPR52688.2022.00979"},{"key":"25_CR38","unstructured":"Zhang, C., Benz, P., Karjauv, A., Sun, G., Kweon, I.S.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Conference on Neural Information Processing Systems (2020)"},{"key":"25_CR39","unstructured":"Zhao, X., Wang, Y.X., Li, L.: Protecting language generation models via invisible watermarking. In: International Conference on Machine Learning (2023)"},{"key":"25_CR40","unstructured":"Zhao, X., et al.: Invisible image watermarks are provably removable using generative AI. arXiv preprint arXiv:2306.01953 (2023)"},{"key":"25_CR41","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: hiding data with deep networks. In: European Conference on Computer Vision (2018)","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72980-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T09:24:10Z","timestamp":1730107450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72980-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031729799","9783031729805"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72980-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}