{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:46:52Z","timestamp":1773319612160,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562084","type":"print"},{"value":"9789819562091","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6209-1_9","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:27:55Z","timestamp":1767320875000},"page":"159-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DNNKeyLock: Securing Deep Neural Network Intellectual Property with\u00a0Steganography and\u00a0Token Authentication"],"prefix":"10.1007","author":[{"given":"Mengdi","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Chuanyuan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"9_CR1","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1615\u20131631 (2018)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"An, S., et al.: Mirror: model inversion for deep learning network with high fidelity. In: Proceedings of the 29th Network and Distributed System Security Symposium (2022)","DOI":"10.14722\/ndss.2022.24335"},{"key":"9_CR3","unstructured":"Chang, Y., Jiang, H., Lin, C., Huang, X., Weng, J.: Towards understanding and enhancing security of proof-of-training for DNN model ownership verification. arXiv preprint arXiv:2410.04397 (2024)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chen, H., Rouhani, B.D., Fu, C., Zhao, J., Koushanfar, F.: Deepmarks: a secure fingerprinting framework for digital rights management of deep learning models. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval, pp. 105\u2013113 (2019)","DOI":"10.1145\/3323873.3325042"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1109\/TIFS.2021.3080522","volume":"16","author":"J Chen","year":"2021","unstructured":"Chen, J., Zhang, X., Zhang, R., Wang, C., Liu, L.: De-pois: an attack-agnostic defense against data poisoning attacks. IEEE Trans. Inf. Forensics Secur. 16, 3412\u20133425 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"9_CR6","doi-asserted-by":"publisher","first-page":"4967","DOI":"10.1109\/TDSC.2024.3365730","volume":"21","author":"J Chen","year":"2024","unstructured":"Chen, J., et al.: Edgepro: edge deep learning model protection via neuron authorization. IEEE Trans. Dependable Secure Comput. 21(5), 4967\u20134981 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Chen, J., Guo, Y., Chen, H., Gong, N.: Membership inference attack in face of data transformations. In: 2022 IEEE Conference on Communications and Network Security (CNS), pp. 299\u2013307. IEEE (2022)","DOI":"10.1109\/CNS56114.2022.9947254"},{"key":"9_CR8","unstructured":"Fan, L., Ng, K.W., Chan, C.S.: Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"9_CR9","volume":"89","author":"X Fan","year":"2025","unstructured":"Fan, X., Fu, D., Gui, H., Zhou, X.: PCPT and ACPT: copyright protection and traceability scheme for DNN models. J. Inf. Secur. Appl. 89, 103980 (2025)","journal-title":"J. Inf. Secur. Appl."},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Jambhale, T., Gaffar, H.A.: A deep learning approach to invisible watermarking for copyright protection. In: Ranganathan, G., Fernando, X., Shi, F. (eds.) Inventive Communication and Computational Technologies. LNNS, vol. 311, pp. 493\u2013503. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-5529-6_39","DOI":"10.1007\/978-981-16-5529-6_39"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HINet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Li, Z., Hu, C., Zhang, Y., Guo, S.: How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 126\u2013137 (2019)","DOI":"10.1145\/3359789.3359801"},{"issue":"7","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/TCAD.2020.3018403","volume":"40","author":"N Lin","year":"2020","unstructured":"Lin, N., Chen, X., Lu, H., Li, X.: Chaotic weights: a novel approach to protect intellectual property of deep neural networks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(7), 1327\u20131339 (2020)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"1560","DOI":"10.1109\/LSP.2021.3100307","volume":"28","author":"Y Luo","year":"2021","unstructured":"Luo, Y., Feng, G., Zhang, X.: Hierarchical authorization of convolutional neural networks for multi-user. IEEE Signal Process. Lett. 28, 1560\u20131564 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"9_CR15","unstructured":"Pan, Q., Dong, M., Ota, K., Wu, J.: Device-bind key-storageless hardware AI model IP protection: a PUF and permute-diffusion encryption-enabled approach. arXiv preprint arXiv:2212.11133 (2022)"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1007\/s11280-022-01113-3","volume":"26","author":"S Peng","year":"2023","unstructured":"Peng, S., Chen, Y., Xu, J., Chen, Z., Wang, C., Jia, X.: Intellectual property protection of DNN models. World Wide Web 26(4), 1877\u20131911 (2023)","journal-title":"World Wide Web"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Priyadharshini, A., Umamaheswari, R., Jayapandian, N., Priyananci, S.: Securing medical images using encryption and LSB steganography. In: 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp.\u00a01\u20135. IEEE (2021)","DOI":"10.1109\/ICAECT49130.2021.9392396"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10617-024-09287-x","volume":"28","author":"A Reda","year":"2024","unstructured":"Reda, A., Bouzid, A.A., Zghaibe, A., Dr\u00f3tos, D., J\u00f3zsef, V.: Model predictive-based DNN control model for automated steering deployed on FPGA using an automatic IP generator tool. Des. Autom. Embed. Syst. 28(2), 139\u2013153 (2024)","journal-title":"Des. Autom. Embed. Syst."},{"key":"9_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2022.104212","volume":"80","author":"KS Rekha","year":"2023","unstructured":"Rekha, K.S., Amali, M.J., Swathy, M., Raghini, M., Darshini, B.P.: A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm. Biomed. Signal Process. Control 80, 104212 (2023)","journal-title":"Biomed. Signal Process. Control"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Ren, G., Li, G., Li, S., Chen, L., Ren, K.: Activedaemon: unconscious DNN dormancy and waking up via user-specific invisible token. In: NDSS (2024)","DOI":"10.14722\/ndss.2024.24588"},{"issue":"2","key":"9_CR21","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TDSC.2022.3222972","volume":"21","author":"G Ren","year":"2022","unstructured":"Ren, G., Wu, J., Li, G., Li, S., Guizani, M.: Protecting intellectual property with reliable availability of learning models in AI-based cybersecurity services. IEEE Trans. Dependable Secure Comput. 21(2), 600\u2013617 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9_CR22","unstructured":"Rouhani, B.D., Chen, H., Koushanfar, F.: Deepsigns: a generic watermarking framework for IP protection of deep learning models. arXiv preprint arXiv:1804.00750 (2018)"},{"key":"9_CR23","unstructured":"Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H., Zhao, B.Y.: Fawkes: protecting privacy against unauthorized deep learning models. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1589\u20131604 (2020)"},{"key":"9_CR24","unstructured":"Sun, S., Xue, M., Wang, J., Liu, W.: Protecting the intellectual properties of deep neural networks with an additional class and steganographic images. arXiv preprint arXiv:2104.09203 (2021)"},{"key":"9_CR25","unstructured":"Sun, Y., et al.: Deep intellectual property protection: a survey. arXiv preprint arXiv:2304.14613 (2023)"},{"key":"9_CR26","unstructured":"Szentannai, K., Al-Afandi, J., Horv\u00e1th, A.: MimosaNet: an unrobust neural network preventing model stealing. arXiv preprint arXiv:1907.01650 (2019)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2117\u20132126 (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Tang, R., Du, M., Hu, X.: Deep serial number: computational watermark for DNN intellectual property protection. In: De Francisci Morales, G., Perlich, C., Ruchansky, N., Kourtellis, N., Baralis, E., Bonchi, F. (eds.) ECML PKDD 2023. LNCS, vol. 14174, pp. 157\u2013173. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-43427-3_10","DOI":"10.1007\/978-3-031-43427-3_10"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Tekgul, B.G., Xia, Y., Marchal, S., Asokan, N.: Waffle: watermarking in federated learning. In: 2021 40th International Symposium on Reliable Distributed Systems (SRDS), pp. 310\u2013320. IEEE (2021)","DOI":"10.1109\/SRDS53918.2021.00038"},{"key":"9_CR30","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction $$\\{$$APIs$$\\}$$. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 601\u2013618 (2016)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., Satoh, S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, pp. 269\u2013277 (2017)","DOI":"10.1145\/3078971.3078974"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Wang, S., Xu, C., Zheng, Y., Chang, C.H.: A buyer-traceable DNN model IP protection method against piracy and misappropriation. In: 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS), pp. 308\u2013311. IEEE (2022)","DOI":"10.1109\/AICAS54282.2022.9869923"},{"issue":"7","key":"9_CR33","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","volume":"31","author":"H Wu","year":"2020","unstructured":"Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2591\u20132601 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Wu, Y., Xue, M., Gu, D., Zhang, Y., Liu, W.: Sample-specific backdoor based active intellectual property protection for deep neural networks. In: 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS), pp. 316\u2013319. IEEE (2022)","DOI":"10.1109\/AICAS54282.2022.9869927"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Xue, M., Wu, Z., He, C., Wang, J., Liu, W.: Active DNN IP protection: a novel user fingerprint management and DNN authorization control technique. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 975\u2013982. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00130"},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"74720","DOI":"10.1109\/ACCESS.2020.2987435","volume":"8","author":"M Xue","year":"2020","unstructured":"Xue, M., Yuan, C., Wu, H., Zhang, Y., Liu, W.: Machine learning security: threats, countermeasures, and evaluations. IEEE Access 8, 74720\u201374742 (2020)","journal-title":"IEEE Access"},{"issue":"6","key":"9_CR37","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/TAI.2021.3133824","volume":"3","author":"M Xue","year":"2021","unstructured":"Xue, M., Zhang, Y., Wang, J., Liu, W.: Intellectual property protection for deep learning models: taxonomy, methods, attacks, and evaluations. IEEE Trans. Artif. Intell. 3(6), 908\u2013923 (2021)","journal-title":"IEEE Trans. Artif. Intell."},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, Q., et al.: Play the imitation game: model extraction attack against autonomous driving localization. In: Proceedings of the 38th Annual Computer Security Applications Conference, pp. 56\u201370 (2022)","DOI":"10.1145\/3564625.3567977"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"213296","DOI":"10.1109\/ACCESS.2020.3039323","volume":"8","author":"YQ Zhang","year":"2020","unstructured":"Zhang, Y.Q., Jia, Y.R., Wang, X., Niu, Q., Chen, N.D.: Deeptrigger: a watermarking scheme of deep learning models based on chaotic automatic data annotation. IEEE Access 8, 213296\u2013213305 (2020)","journal-title":"IEEE Access"}],"updated-by":[{"DOI":"10.1007\/978-981-95-6209-1_24","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000}}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6209-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:43:58Z","timestamp":1773251038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6209-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562084","9789819562091"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6209-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"12 March 2026","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}