{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T01:17:22Z","timestamp":1771463842093,"version":"3.50.1"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031730238","type":"print"},{"value":"9783031730245","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73024-5_8","type":"book-chapter","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T16:41:20Z","timestamp":1732552880000},"page":"118-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["LaWa: Using Latent Space for\u00a0In-Generation Image Watermarking"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Rezaei","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Akbari","sequence":"additional","affiliation":[]},{"given":"Saeed Ranjbar","family":"Alvar","sequence":"additional","affiliation":[]},{"given":"Arezou","family":"Fatemi","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,24]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Akbari, M., Liang, J., Han, J., Tu, C.: Learned bi-resolution image coding using generalized octave convolutions. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 6592\u20136599 (2021)","DOI":"10.1609\/aaai.v35i8.16816"},{"key":"8_CR2","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein GAN. arXiv:1701.07875 (2017)"},{"key":"8_CR3","unstructured":"Ball\u00e9, J., Minnen, D., Singh, S., Hwang, S.J., Johnston, N.: Variational image compression with a scale hyperprior. arXiv:1802.01436 (2018)"},{"key":"8_CR4","unstructured":"Brown, T., et al.: Language models are few-shot learners. In: Advances in Neural Information Processing Systems, vol. 33, pp. 1877\u20131901 (2020)"},{"key":"8_CR5","unstructured":"Brundage, M., et\u00a0al.: The malicious use of artificial intelligence: forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228 (2018)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Bui, T., Agarwal, S., Yu, N., Collomosse, J.: Rosteals: robust steganography using autoencoder latent space. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 933\u2013942 (2023)","DOI":"10.1109\/CVPRW59228.2023.00100"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-58574-7_7","volume-title":"Computer Vision \u2013 ECCV 2020","author":"L Chai","year":"2020","unstructured":"Chai, L., Bau, D., Lim, S.-N., Isola, P.: What makes fake images detectable? understanding properties that generalize. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12371, pp. 103\u2013120. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58574-7_7"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Sun, H., Takeuchi, M., Katto, J.: Learned image compression with discretized gaussian mixture likelihoods and attention modules. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.00796"},{"key":"8_CR9","unstructured":"Chowdhery, A., et\u00a0al.: Palm: scaling language modeling with pathways. arXiv preprint arXiv:2204.02311 (2022)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Corvi, R., Cozzolino, D., Zingarini, G., Poggi, G., Nagano, K., Verdoliva, L.: On the detection of synthetic images generated by diffusion models. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann (2007)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Esser, P., Rombach, R., Ommer, B.: Taming transformers for high-resolution image synthesis. arXiv:2012.09841 (2021)","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Fernandez, P., Couairon, G., J\u00e9gou, H., Douze, M., Furon, T.: The stable signature: rooting watermarks in latent diffusion models. In: ICCV (2023)","DOI":"10.1109\/ICCV51070.2023.02053"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Fernandez, P., Sablayrolles, A., Furon, T., J\u00e9gou, H., Douze, M.: Watermarking images in self-supervised latent spaces. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3054\u20133058. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746058"},{"key":"8_CR15","unstructured":"Frank, J., Eisenhofer, T., Sch\u00f6nherr, L., Fischer, A., Kolossa, D., Holz, T.: Leveraging frequency analysis for deep fake image recognition. In: International Conference on Machine Learning, pp. 3247\u20133258. PMLR (2020)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Ghazanfari, K., Ghaemmaghami, S., Khosravi, S.R.: LSB++: an improvement to LSB+ steganography. In: TENCON 2011-2011 IEEE Region 10 Conference, pp. 364\u2013368. IEEE (2011)","DOI":"10.1109\/TENCON.2011.6129126"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Gragnaniello, D., Cozzolino, D., Marra, F., Poggi, G., Verdoliva, L.: Are GAN generated images easy to detect? a critical analysis of the state-of-the-art. In: 2021 IEEE international conference on multimedia and expo (ICME), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/ICME51207.2021.9428429"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Gu, S., et al.: Vector quantized diffusion model for text-to-image synthesis. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10696\u201310706 (2022)","DOI":"10.1109\/CVPR52688.2022.01043"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"8_CR20","unstructured":"Hertz, A., et al.: Prompt-to-prompt image editing with cross attention control. arXiv preprint arXiv:2208.01626 (2022)"},{"key":"8_CR21","unstructured":"Ho, J., et\u00a0al.: Imagen video: high definition video generation with diffusion models. arXiv preprint arXiv:2210.02303 (2022)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1\u201313 (2014). https:\/\/doi.org\/10.1186\/1687-417X-2014-1","journal-title":"EURASIP J. Inf. Secur."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Huiskes, M.J., Lew, M.S.: The MIR flickr retrieval evaluation. In: MIR \u201908: Proceedings of the 2008 ACM International Conference on Multimedia Information Retrieval. ACM, New York, NY, USA (2008)","DOI":"10.1145\/1460096.1460104"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Khachatryan, A.: Hidden (2019). https:\/\/github.com\/ando-khachatryan\/HiDDeN","DOI":"10.1287\/6a48fb54-dd58-4cde-8a68-b6d8d7ccedc2"},{"key":"8_CR26","unstructured":"Kishore, V., Chen, X., Wang, Y., Li, B., Weinberger, K.Q.: Fixed neural network steganography: train the images, not the network. In: International Conference on Learning Representations (2021)"},{"issue":"19","key":"8_CR27","doi-asserted-by":"publisher","first-page":"6854","DOI":"10.3390\/app10196854","volume":"10","author":"JE Lee","year":"2020","unstructured":"Lee, J.E., Seo, Y.H., Kim, D.W.: Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark. Appl. Sci. 10(19), 6854 (2020)","journal-title":"Appl. Sci."},{"key":"8_CR28","unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656 (2018)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Lin, C.H., et al.: Magic3D: high-resolution text-to-3D content creation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 300\u2013309 (2023)","DOI":"10.1109\/CVPR52729.2023.00037"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhan, R., Chang, H., Yang, F., Milanfar, P.: Distortion agnostic deep watermarking. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13548\u201313557 (2020)","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Marra, F., Gragnaniello, D., Verdoliva, L., Poggi, G.: Do GANs leave artificial fingerprints? In: 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 506\u2013511. IEEE (2019)","DOI":"10.1109\/MIPR.2019.00103"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Mokady, R., Hertz, A., Aberman, K., Pritch, Y., Cohen-Or, D.: Null-text inversion for editing real images using guided diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6038\u20136047 (2023)","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Navas, K., Ajay, M.C., Lekshmi, M., Archana, T.S., Sasikumar, M.: DWT-DCT-SVD based watermarking. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE\u201908), pp. 271\u2013274. IEEE (2008)","DOI":"10.1109\/COMSWA.2008.4554423"},{"key":"8_CR35","unstructured":"Nichol, A., et al.: Glide: towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021)"},{"key":"8_CR36","unstructured":"Nichol, A.Q., Dhariwal, P.: Improved denoising diffusion probabilistic models. In: International Conference on Machine Learning, pp. 8162\u20138171. PMLR (2021)"},{"key":"8_CR37","unstructured":"Poole, B., Jain, A., Barron, J.T., Mildenhall, B.: DreamFusion: text-to-3D using 2D diffusion. arXiv arXiv:2209.14988 (2022)"},{"key":"8_CR38","unstructured":"Ramesh, A., Dhariwal, P., Nichol, A., Chu, C., Chen, M.: Hierarchical text-conditional image generation with clip latents. arXiv preprint arXiv:2204.06125 (2022)"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"8_CR40","unstructured":"Saharia, C., et al.: Photorealistic text-to-image diffusion models with deep language understanding. In: Advances in Neural Information Processing Systems, vol. 35, pp. 36479\u201336494 (2022)"},{"key":"8_CR41","unstructured":"Santana, G.: Magicprompt (2022). https:\/\/huggingface.co\/Gustavosta\/MagicPrompt-Stable-Diffusion"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Sha, Z., Li, Z., Yu, N., Zhang, Y.: De-fake: detection and attribution of fake images generated by text-to-image diffusion models. arXiv preprint arXiv:2210.06998 (2022)","DOI":"10.1145\/3576915.3616588"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Shaham, T.R., Dekel, T., Michaeli, T.: SinGAN: learning a generative model from a single natural image. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4570\u20134580 (2019)","DOI":"10.1109\/ICCV.2019.00467"},{"key":"8_CR44","unstructured":"ShieldMnt: invisible-watermark (2021). https:\/\/github.com\/ShieldMnt\/invisible-watermark\/tree\/main"},{"key":"8_CR45","unstructured":"Singer, U., et\u00a0al.: Make-a-video: text-to-video generation without text-video data. arXiv preprint arXiv:2209.14792 (2022)"},{"issue":"18","key":"8_CR46","doi-asserted-by":"publisher","first-page":"25913","DOI":"10.1007\/s11042-022-12691-9","volume":"81","author":"MS Taha","year":"2022","unstructured":"Taha, M.S., Rahem, M.S.M., Hashim, M.M., Khalid, H.N.: High payload image steganography scheme with minimum distortion based on distinction grade value method. Multimedia Tools Appl. 81(18), 25913\u201325946 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"8_CR47","unstructured":"Toderici, G., et al.: Workshop and challenge on learned image compression (CLIC2020). In: CVPR (2020)"},{"key":"8_CR48","unstructured":"Touvron, H., et\u00a0al.: LLaMA: open and efficient foundation language models. arXiv preprint arXiv:2302.13971 (2023)"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., Satoh, S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, pp. 269\u2013277 (2017)","DOI":"10.1145\/3078971.3078974"},{"key":"8_CR50","unstructured":"Vincent, J.: An online propaganda campaign used AI-generated headshots to create fake journalists. Verge. com (2020)"},{"key":"8_CR51","doi-asserted-by":"crossref","unstructured":"Vukoti\u0107, V., Chappelier, V., Furon, T.: Are deep neural networks good for blind image watermarking? In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630768"},{"issue":"4","key":"8_CR52","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"8_CR53","unstructured":"Wen, Y., Kirchenbauer, J., Geiping, J., Goldstein, T.: Tree-ring watermarks: fingerprints for diffusion images that are invisible and robust. arXiv preprint arXiv:2305.20030 (2023)"},{"issue":"7","key":"8_CR54","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","volume":"31","author":"H Wu","year":"2020","unstructured":"Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2591\u20132601 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"8_CR55","doi-asserted-by":"crossref","unstructured":"Yu, N., Davis, L.S., Fritz, M.: Attributing fake images to GANs: learning and analyzing GAN fingerprints. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7556\u20137566 (2019)","DOI":"10.1109\/ICCV.2019.00765"},{"key":"8_CR56","doi-asserted-by":"crossref","unstructured":"Yu, N., Skripniuk, V., Abdelnabi, S., Fritz, M.: Artificial fingerprinting for generative models: rooting deepfake attribution in training data. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 14448\u201314457 (2021)","DOI":"10.1109\/ICCV48922.2021.01418"},{"key":"8_CR57","unstructured":"Yu, N., Skripniuk, V., Chen, D., Davis, L., Fritz, M.: Responsible disclosure of generative models using scalable fingerprinting. In: International Conference on Learning Representations (ICLR) (2022)"},{"key":"8_CR58","unstructured":"Zhang, C., Benz, P., Karjauv, A., Sun, G., Kweon, I.S.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Advances in Neural Information Processing Systems, vol. 33, pp. 10223\u201310234 (2020)"},{"key":"8_CR59","doi-asserted-by":"crossref","unstructured":"Zhang, C., Karjauv, A., Benz, P., Kweon, I.S.: Towards robust deep hiding under non-differentiable distortions for practical blind watermarking. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 5158\u20135166 (2021)","DOI":"10.1145\/3474085.3475628"},{"key":"8_CR60","unstructured":"Zhang, K.A., Xu, L., Cuesta-Infante, A., Veeramachaneni, K.: Robust invisible video watermarking with attention. arXiv preprint arXiv:1909.01285 (2019)"},{"key":"8_CR61","unstructured":"Zhang, L., Liu, X., Martin, A.V., Bearfield, C.X., Brun, Y., Guan, H.: Robust image watermarking using stable diffusion. arXiv preprint arXiv:2401.04247 (2024)"},{"key":"8_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, L., Rao, A., Agrawala, M.: Adding conditional control to text-to-image diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 3836\u20133847 (2023)","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"8_CR63","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586\u2013595 (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"8_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, X., Karaman, S., Chang, S.F.: Detecting and simulating artifacts in GAN fake images. In: 2019 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"8_CR65","unstructured":"Zhao, Y., Pang, T., Du, C., Yang, X., Cheung, N.M., Lin, M.: A recipe for watermarking diffusion models. arXiv preprint arXiv:2303.10137 (2023)"},{"key":"8_CR66","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657\u2013672 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"8_CR67","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1136\/jme-2023-108909","volume":"49","author":"H Zohny","year":"2023","unstructured":"Zohny, H., McMillan, J., King, M.: Ethics of generative AI. J. Med. Ethics 49, 79\u201380 (2023)","journal-title":"J. Med. Ethics"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73024-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T17:06:30Z","timestamp":1732554390000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73024-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,24]]},"ISBN":["9783031730238","9783031730245"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73024-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,24]]},"assertion":[{"value":"24 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}