{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:42:29Z","timestamp":1761000149125,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535361"},{"type":"electronic","value":"9789819535378"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3537-8_30","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T10:43:29Z","timestamp":1760870609000},"page":"553-572","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["When There Is No Decoder: Removing Watermarks from\u00a0Stable Diffusion Models in\u00a0a\u00a0No-Box Setting"],"prefix":"10.1007","author":[{"given":"Xiaodong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Tianyi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Xiangman","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianbing","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"30_CR1","unstructured":"An, B., et al.: Benchmarking the robustness of image watermarks. arXiv preprint arXiv:2401.08573 (2024)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Chen, J., Jordan, M.I., Wainwright, M.J.: Hopskipjumpattack: a query-efficient decision-based attack. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1277\u20131294. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00045"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Fernandez, P., Couairon, G., J\u00e9gou, H., Douze, M., Furon, T.: The stable signature: rooting watermarks in latent diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22466\u201322477 (2023)","DOI":"10.1109\/ICCV51070.2023.02053"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Gao, W., Zhang, X., Yang, L., Liu, H.: An improved Sobel edge detection. In: 2010 3rd International Conference on Computer Science and Information Technology, vol.\u00a05, pp. 67\u201371. IEEE (2010)","DOI":"10.1109\/ICCSIT.2010.5563693"},{"issue":"3","key":"30_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.yjoc.2023.100065","volume":"33","author":"EE Guzik","year":"2023","unstructured":"Guzik, E.E., Byrge, C., Gilde, C.: The originality of machines: AI takes the torrance test. J. Creat. 33(3), 100065 (2023)","journal-title":"J. Creat."},{"key":"30_CR6","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"30_CR7","unstructured":"Hu, Y., Jiang, Z., Guo, M., Gong, N.: A transfer attack to image watermarks. arXiv preprint arXiv:2403.15365 (2024)"},{"key":"30_CR8","unstructured":"Jiang, Z., Guo, M., Hu, Y., Gong, N.Z.: Watermark-based detection and attribution of AI-generated content. arXiv preprint arXiv:2404.04254 (2024)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Guo, M., Hu, Y., Jia, J., Gong, N.Z.: Certifiably robust image watermark. In: European Conference on Computer Vision, pp. 427\u2013443. Springer (2024)","DOI":"10.1007\/978-3-031-72980-5_25"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Zhang, J., Gong, N.Z.: Evading watermark based detection of AI-generated content. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1168\u20131181 (2023)","DOI":"10.1145\/3576915.3623189"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Kassis, A., Hengartner, U.: Unmarker: a universal attack on defensive watermarking. arXiv preprint arXiv:2405.08363 (2024)","DOI":"10.1109\/SP61157.2025.00005"},{"key":"30_CR12","unstructured":"Koh, P.W., Liang, P.: Understanding black-box predictions via influence functions. In: International Conference on Machine Learning, pp. 1885\u20131894. PMLR (2017)"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Kong, L., Dong, J., Ge, J., Li, M., Pan, J.: Efficient frequency domain-based transformers for high-quality image deblurring. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5886\u20135895 (2023)","DOI":"10.1109\/CVPR52729.2023.00570"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Liu, H., Sun, Z., Mu, Y.: Countering personalized text-to-image generation with influence watermarks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12257\u201312267 (2024)","DOI":"10.1109\/CVPR52733.2024.01165"},{"key":"30_CR16","unstructured":"Liu, Y., Li, Z., Backes, M., Shen, Y., Zhang, Y.: Watermarking diffusion model. arXiv preprint arXiv:2305.12502 (2023)"},{"key":"30_CR17","unstructured":"Lukas, N., Diaa, A., Fenaux, L., Kerschbaum, F.: Leveraging optimization for adaptive attacks on image watermarks. arXiv preprint arXiv:2309.16952 (2023)"},{"key":"30_CR18","unstructured":"Ma, Y., Zhao, Z., He, X., Li, Z., Backes, M., Zhang, Y.: Generative watermarking against unauthorized subject-driven image synthesis. arXiv preprint arXiv:2306.07754 (2023)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Peng, S., Chen, Y., Wang, C., Jia, X.: Intellectual property protection of diffusion models via the watermark diffusion process. arXiv preprint arXiv:2306.03436 (2023)","DOI":"10.1007\/978-981-96-0567-5_21"},{"key":"30_CR20","unstructured":"Radford, A., et al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PmLR (2021)"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models (2021)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"30_CR23","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. In: Advances in Neural Information Processing Systems, vol. 29 (2016)"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2117\u20132126 (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"issue":"2","key":"30_CR26","first-page":"102","volume":"2","author":"X Wu","year":"2024","unstructured":"Wu, X., Duan, R., Ni, J.: Unveiling security, privacy, and ethical concerns of chatgpt. J. Inf. Intell. 2(2), 102\u2013115 (2024)","journal-title":"J. Inf. Intell."},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Xing, X., Zhou, H., Fang, Y., Yang, G.: Assessing the efficacy of invisible watermarks in AI-generated medical images. arXiv preprint arXiv:2402.03473 (2024)","DOI":"10.1109\/ISBI56570.2024.10635746"},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"Xiong, C., Qin, C., Feng, G., Zhang, X.: Flexible and secure watermarking for latent diffusion model. In: Proceedings of the 31st ACM International Conference on Multimedia, pp. 1668\u20131676 (2023)","DOI":"10.1145\/3581783.3612448"},{"key":"30_CR29","unstructured":"Zeng, Y., Zhou, M., Xue, Y., Patel, V.M.: Securing deep generative models with universal adversarial signature. arXiv preprint arXiv:2305.16310 (2023)"},{"key":"30_CR30","unstructured":"Zhao, X., Ananth, P., Li, L., Wang, Y.X.: Provable robust watermarking for AI-generated text. arXiv preprint arXiv:2306.17439 (2023)"},{"key":"30_CR31","unstructured":"Zhao, X., et al.: Invisible image watermarks are provably removable using generative AI (2023)"},{"key":"30_CR32","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657\u2013672 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3537-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:04:00Z","timestamp":1760997840000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3537-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535361","9789819535378"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3537-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}