{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T04:09:44Z","timestamp":1764475784402,"version":"3.46.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Opening Project of Intelligent Policing Key Laboratory of Sichuan Province","award":["ZNJW2022KFZD002"],"award-info":[{"award-number":["ZNJW2022KFZD002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00034-025-03262-y","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T18:00:01Z","timestamp":1753725601000},"page":"9675-9693","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attacking the Digital Watermark of Watermarked Images Through Residual Learning and Self-supervised Training"],"prefix":"10.1007","volume":"44","author":[{"given":"Zigang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Deyang","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Zhenghao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Yuhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haihua","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"3262_CR1","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","volume":"83","author":"P Aberna","year":"2023","unstructured":"P. Aberna, L. Agilandeeswari, Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed. Tools Appl. 83, 5531\u20135591 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3262_CR2","doi-asserted-by":"crossref","unstructured":"A.\u00a0Bamatraf, R.\u00a0Ibrahim, M.N.B.M. Salleh. Digital watermarking algorithm using lsb. in 2010 International Conference on Computer Applications and Industrial Electronics. IEEE, pp. 155\u2013159 (2010)","DOI":"10.1109\/ICCAIE.2010.5735066"},{"key":"3262_CR3","doi-asserted-by":"crossref","unstructured":"J.\u00a0Deng, W.\u00a0Dong, R.\u00a0Socher, L.-J. Li, K.\u00a0Li, L.\u00a0Fei-Fei. Imagenet: a large-scale hierarchical image database. in 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"16","key":"3262_CR4","doi-asserted-by":"publisher","first-page":"5540","DOI":"10.3390\/s21165540","volume":"21","author":"N Hasan","year":"2021","unstructured":"N. Hasan, M.S. Islam, W. Chen, M.A. Kabir, S. Al-Ahmadi, Encryption based image watermarking algorithm in 2dwt-dct domains. Sensors 21(16), 5540 (2021)","journal-title":"Sensors"},{"key":"3262_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116019","volume":"90","author":"MW Hatoum","year":"2021","unstructured":"M.W. Hatoum, J.-F. Couchot, R. Couturier, R. Darazi, Using deep learning for image watermarking attack. Signal Process. Image Commun. 90, 116019 (2021)","journal-title":"Signal Process. Image Commun."},{"key":"3262_CR6","doi-asserted-by":"crossref","unstructured":"A.\u00a0Hore, D.\u00a0Ziou. Image quality metrics: Psnr vs. ssim. in 2010 20th International Conference on Pattern Recognition. IEEE, pp 2366\u20132369 (2010)","DOI":"10.1109\/ICPR.2010.579"},{"issue":"3","key":"3262_CR7","first-page":"23","volume":"11","author":"O Hosam","year":"2019","unstructured":"O. Hosam, Attacking image watermarking and steganography-a survey. Int. J. Inf. Tech. Comput. Sci. 11(3), 23\u201337 (2019)","journal-title":"Int. J. Inf. Tech. Comput. Sci."},{"key":"3262_CR8","doi-asserted-by":"publisher","first-page":"100662","DOI":"10.1016\/j.cosrev.2024.100662","volume":"53","author":"KM Hosny","year":"2024","unstructured":"K.M. Hosny, A. Magdi, O. ElKomy, H.M. Hamza, Digital image watermarking using deep learning: a survey. Comput. Sci. Rev. 53, 100662 (2024)","journal-title":"Comput. Sci. Rev."},{"key":"3262_CR9","doi-asserted-by":"crossref","unstructured":"T.\u00a0Huang, S.\u00a0Li, X.\u00a0Jia, H.\u00a0Lu, J.\u00a0Liu. Neighbor2neighbor: Self-supervised denoising from single noisy images. in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14781\u201314790 (2021)","DOI":"10.1109\/CVPR46437.2021.01454"},{"issue":"1","key":"3262_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1587\/transinf.2016MUI0001","volume":"100","author":"K Iwamura","year":"2017","unstructured":"K. Iwamura, M. Kawamura, M. Kuribayashi, M. Iwata, H. Kang, S. Gohshi, A. Nishimura, Information hiding and its criteria for evaluation. IEICE Trans. Inf. Syst. 100(1), 2\u201312 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"3","key":"3262_CR11","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s10586-020-03215-x","volume":"24","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A robust blind medical image watermarking approach for telemedicine applications. Clust. Comput. 24(3), 2069\u20132082 (2021)","journal-title":"Clust. Comput."},{"key":"3262_CR12","first-page":"864","volume":"34","author":"K Kim","year":"2021","unstructured":"K. Kim, J.C. Ye, Noise2score: tweedie\u2019s approach to self-supervised image denoising without clean images. Adv. Neural. Inf. Process. Syst. 34, 864\u2013874 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"3262_CR13","doi-asserted-by":"crossref","unstructured":"A.\u00a0Krull, T.-O. Buchholz, F.\u00a0Jug. Noise2void-learning denoising from single noisy images. in Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2129\u20132137 (2019)","DOI":"10.1109\/CVPR.2019.00223"},{"issue":"9","key":"3262_CR14","doi-asserted-by":"publisher","first-page":"2983","DOI":"10.1109\/LCOMM.2021.3091800","volume":"25","author":"W-H Lee","year":"2021","unstructured":"W.-H. Lee, M. Ozger, U. Challita, K.W. Sung, Noise learning-based denoising autoencoder. IEEE Commun. Lett. 25(9), 2983\u20132987 (2021)","journal-title":"IEEE Commun. Lett."},{"key":"3262_CR15","unstructured":"J.\u00a0Lehtinen, J.\u00a0Munkberg, J.\u00a0Hasselgren, S.\u00a0Laine, T.\u00a0Karras, M.\u00a0Aittala, T.\u00a0Aila. Noise2noise: learning image restoration without clean data. arXiv:1803.04189 (2018)"},{"key":"3262_CR16","first-page":"4351","volume":"34","author":"Q Li","year":"2022","unstructured":"Q. Li, C. Wang, C.Y. Wang, J. Li, Z. Xia, S. Gao, B. Ma, Novel imperceptible watermarking attack method based on residual learning. J. Softw. 34, 4351\u20134361 (2022)","journal-title":"J. Softw."},{"issue":"5","key":"3262_CR17","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1007\/s00530-023-01127-5","volume":"29","author":"Z Liu","year":"2023","unstructured":"Z. Liu, Z. Li, G. Wang, Y. Tian, L. Zheng, Robust zero-watermarking algorithm for diffusion-weighted images based on multiscale feature fusion. Multimed. Syst. 29(5), 2791\u20132807 (2023)","journal-title":"Multimed. Syst."},{"key":"3262_CR18","doi-asserted-by":"crossref","unstructured":"D.\u00a0Martin, C.\u00a0Fowlkes, D.\u00a0Tal, J.\u00a0Malik. A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. in Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001, vol.\u00a02, pp. 416\u2013423 (2001)","DOI":"10.1109\/ICCV.2001.937655"},{"key":"3262_CR19","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MMUL.2022.3213004","volume":"30","author":"C Qin","year":"2022","unstructured":"C. Qin, S. Gao, X. Zhang, G. Feng, Cadw: Cgan-based attack on deep robust image watermarking. IEEE MultiMed. 30, 28\u201335 (2022)","journal-title":"IEEE MultiMed."},{"key":"3262_CR20","doi-asserted-by":"crossref","unstructured":"O.\u00a0Ronneberger, P.\u00a0Fischer, T.\u00a0Brox. U-net: convolutional networks for biomedical image segmentation. in Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18, pp. 234\u2013241. Springer (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"6","key":"3262_CR21","doi-asserted-by":"publisher","first-page":"8423","DOI":"10.1007\/s11042-020-10035-z","volume":"80","author":"D Setiadi","year":"2021","unstructured":"D. Setiadi, Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimed. Tools Appl. 80(6), 8423\u20138444 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"3262_CR22","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.future.2022.12.015","volume":"141","author":"R Singh","year":"2023","unstructured":"R. Singh, M. Saraswat, A. Ashok, H. Mittal, A. Tripathi, A.C. Pandey, R. Pal, From classical to soft computing based watermarking techniques: a comprehensive review. Futur. Gener. Comput. Syst. 141, 738\u2013754 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3262_CR23","doi-asserted-by":"crossref","unstructured":"C.\u00a0Song, S.\u00a0Sudirman, M.\u00a0Merabti, D.\u00a0Llewellyn-Jones. Analysis of digital image watermark attacks. in 2010 7th IEEE Consumer Communications and Networking Conference, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/CCNC.2010.5421631"},{"key":"3262_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2023.103875","volume":"95","author":"C Wang","year":"2023","unstructured":"C. Wang, F. Sun, Z. Xia, Q. Li, J. Li, B. Han, B. Ma, Wavelet-fcwan: fast and covert watermarking attack network in wavelet domain. J. Vis. Commun. Image Represent. 95, 103875 (2023)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"3262_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2024.109840","volume":"230","author":"C Wang","year":"2025","unstructured":"C. Wang, P. Tian, Z. Xia, Q. Li, J. Li, Z. Wei, T. Luo, B. Ma, Highly applicable and imperceptible watermark attack network. Signal Process. 230, 109840 (2025)","journal-title":"Signal Process."},{"issue":"3","key":"3262_CR26","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R-Z Wang","year":"2001","unstructured":"R.-Z. Wang, C.-F. Lin, J.-C. Lin, Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recogn. 34(3), 671\u2013683 (2001)","journal-title":"Pattern Recogn."},{"key":"3262_CR27","doi-asserted-by":"publisher","first-page":"5262","DOI":"10.1007\/s00034-024-02707-0","volume":"43","author":"D Wei","year":"2024","unstructured":"D. Wei, Y. Deng, An optimized iwt-dct watermarking scheme based on multiple matrix decomposition and mowoa2. Circuits Syst. Signal Process 43, 5262\u20135287 (2024)","journal-title":"Circuits Syst. Signal Process"},{"issue":"7","key":"3262_CR28","doi-asserted-by":"publisher","first-page":"3965","DOI":"10.1109\/TGRS.2017.2685945","volume":"55","author":"G-S Xia","year":"2017","unstructured":"G.-S. Xia, J. Hu, F. Hu, B. Shi, X. Bai, Y. Zhong, L. Zhang, X. Lu, Aid: a benchmark data set for performance evaluation of aerial scene classification. IEEE Trans. Geosci. Remote Sens. 55(7), 3965\u20133981 (2017)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"3262_CR29","doi-asserted-by":"crossref","unstructured":"Z. Yuan, L. Li, Z. Wang, J. Jiang, X. Zhang, Watermark removal attack against text-to-image generative model watermarking. IEEE Signal Process. Lett. 32, 1470\u20131474 (2025)","DOI":"10.1109\/LSP.2025.3554514"},{"key":"3262_CR30","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on dwt, dct and svd for application in medicine. Multimed. Tools Appl. 77, 4863\u20134882 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"3262_CR31","doi-asserted-by":"crossref","unstructured":"R.\u00a0Zeyde, M.\u00a0Elad, M.\u00a0Protter. On single image scale-up using sparse-representations. in Curves and Surfaces: 7th International Conference, Avignon, France, June 24\u201330, 2010, Revised Selected Papers 7, pp. 711\u2013730. Springer (2012)","DOI":"10.1007\/978-3-642-27413-8_47"},{"issue":"10","key":"3262_CR32","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.3390\/electronics13101884","volume":"13","author":"C Zhan","year":"2024","unstructured":"C. Zhan, L. Leng, C.-C. Chang, J.-H. Horng, Reversible image fragile watermarking with dual tampering detection. Electronics 13(10), 1884 (2024)","journal-title":"Electronics"},{"key":"3262_CR33","doi-asserted-by":"crossref","unstructured":"Y. Zhang, X. Wang, G. Shi, Z. Peng, L. Chen, F. An, Anti-aliasing and anti-color-artifact demosaicing for high-resolution cmos image sensor (Regular Papers, IEEE Transactions on Circuits and Systems I, 2023)","DOI":"10.1109\/TCSI.2023.3290157"},{"key":"3262_CR34","unstructured":"M. Zhussip, S. Soltanayev, S. Y. Chun, Extending stein\u2019s unbiased risk estimator to train deep denoisers with correlated pairs of noisy images. Adv. Neural Inf. Process. Syst. arXiv:1902.02452"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03262-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03262-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03262-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T03:28:53Z","timestamp":1764473333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03262-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,28]]},"references-count":34,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["3262"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03262-y","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2025,7,28]]},"assertion":[{"value":"27 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}