{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:47:08Z","timestamp":1769755628015,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T00:00:00Z","timestamp":1676678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T00:00:00Z","timestamp":1676678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62166008"],"award-info":[{"award-number":["62166008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Government Guides Local Science and Technology Development Special Project","award":["QKZYD[2022]4054"],"award-info":[{"award-number":["QKZYD[2022]4054"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10044-023-01140-4","type":"journal-article","created":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T05:15:45Z","timestamp":1676783745000},"page":"861-874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Deep neural network watermarking based on a reversible image hiding network"],"prefix":"10.1007","volume":"26","author":[{"given":"Linna","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yunfei","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1715-3324","authenticated-orcid":false,"given":"Daoxun","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"1140_CR1","unstructured":"Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: Proceedings 1996 International Conference on Image Processing, Lausanne,Switzerland, pp. 219\u2013222"},{"issue":"2","key":"1140_CR2","first-page":"93","volume":"16","author":"VR Namuduri","year":"2007","unstructured":"Namuduri VR, Pandit SNN (2007) Multimedia digital rights protection using watermarking techniques. Inf Secur J A Glob Perspect 16(2):93\u201399","journal-title":"Inf Secur J A Glob Perspect"},{"key":"1140_CR3","doi-asserted-by":"crossref","unstructured":"Sharma S, Zou JJ, Fang G (2020) A novel signature watermarking scheme for identity protection. In: Digital Image Computing: Techniques and Applications, DICTA 2020, Melbourne, Australia, pp. 1\u20135","DOI":"10.1109\/DICTA51227.2020.9363396"},{"issue":"2","key":"1140_CR4","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10044-006-0039-5","volume":"9","author":"S-F Tu","year":"2006","unstructured":"Tu S-F, Hsu C-S (2006) A dct-based ownership identification method with gray-level and colorful signatures. Pattern Anal Appl 9(2):229\u2013242","journal-title":"Pattern Anal Appl"},{"issue":"1","key":"1140_CR5","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10044-021-01032-5","volume":"25","author":"AM Hilal","year":"2022","unstructured":"Hilal AM, Al-Wesabi FN, Hamza MA, Medani M, Mahmood K, Mahzari M (2022) Content authentication and tampering detection of arabic text: an approach based on zero-watermarking and natural language processing. Pattern Anal Appl 25(1):47\u201362","journal-title":"Pattern Anal Appl"},{"key":"1140_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2021.07.051","volume":"461","author":"Y Li","year":"2021","unstructured":"Li Y, Wang H, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171\u2013193","journal-title":"Neurocomputing"},{"key":"1140_CR7","doi-asserted-by":"crossref","unstructured":"Uchida Y, Nagai Y, Sakazawa S, Satoh S (2017) Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, ICMR 2017, Bucharest, Romania, pp. 269\u2013277","DOI":"10.1145\/3078971.3078974"},{"key":"1140_CR8","doi-asserted-by":"crossref","unstructured":"Wang T, Kerschbaum F (2019) Attacks on digital watermarks for deep neural networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing,ICASSP 2019, Brighton, United Kingdom, pp. 2622\u20132626","DOI":"10.1109\/ICASSP.2019.8682202"},{"key":"1140_CR9","unstructured":"Wang T, Florian K (2019) Robust and undetectable white-box watermarks for deep neural networks. CoRR arXiv:abs\/1910.14268"},{"key":"1140_CR10","doi-asserted-by":"crossref","unstructured":"Wang T, Florian K (2021) Riga: covert and robust white-box watermarking of deep neural networks. In: Proceedings of the Web Conference, pp. 993\u20131004","DOI":"10.1145\/3442381.3450000"},{"key":"1140_CR11","unstructured":"Kuribayashi M, Tanaka T, Funabiki N (2020) Deepwatermark: Embedding watermark into DNN model. In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2020, Auckland, New Zealand, pp. 1340\u20131346"},{"key":"1140_CR12","unstructured":"Rouhani BD, Chen H, Koushanfar F (2018) Deepsigns: a generic watermarking framework for IP protection of deep learning models. CoRR arXiv:abs\/1804.00750"},{"key":"1140_CR13","unstructured":"Adi Y, Baum C, Ciss\u00e9 M, Pinkas B, Keshet J (2018) Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, pp. 1615\u20131631"},{"key":"1140_CR14","doi-asserted-by":"crossref","unstructured":"Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy IM (2018) Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, pp. 159\u2013172","DOI":"10.1145\/3196494.3196550"},{"key":"1140_CR15","doi-asserted-by":"crossref","unstructured":"Chen H, Rouhani BD, Fu C, Zhao J, Koushanfar F (2019) Deepmarks: A secure fingerprinting framework for digital rights management of deep learning models. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval, ICMR 2019, Ottawa, ON, Canada, pp. 105\u2013113","DOI":"10.1145\/3323873.3325042"},{"key":"1140_CR16","doi-asserted-by":"crossref","unstructured":"Zhang J, Chen D, Liao J, Zhang W, Feng H, Hua G, Yu N (2021) Deep model intellectual property protection via deep watermarking. CoRR arXiv:abs\/2103.04980","DOI":"10.1109\/TPAMI.2021.3064850"},{"key":"1140_CR17","doi-asserted-by":"crossref","unstructured":"Hitaj D, Hitaj B, Mancini LV (2019) Evasion attacks against watermarking techniques found in mlaas systems. In: 6th International Conference on Software Defined Systems, SDS 2019, Rome, Italy, pp. 55\u201363","DOI":"10.1109\/SDS.2019.8768572"},{"key":"1140_CR18","doi-asserted-by":"crossref","unstructured":"Li Z, Hu C, Zhang Y, Guo S (2019) How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. In: Proceedings of the 35th Annual Computer Security Applications Conference,ACSAC 2019, San Juan, PR, USA, pp. 126\u2013137","DOI":"10.1145\/3359789.3359801"},{"key":"1140_CR19","unstructured":"Li Z (2019) Deepstego: Protecting intellectual property of deep neural networks by steganography. CoRR arXiv:abs\/1903.01743 Withdrawn"},{"key":"1140_CR20","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, Revised Selected Papers, vol. 6387, pp. 161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"1140_CR21","unstructured":"Volkhonskiy\u00a0D, Borisenko\u00a0B (2016) Generative adversarial networks for image steganography. ICLR 2016 Open Review"},{"key":"1140_CR22","doi-asserted-by":"crossref","unstructured":"Shi H, Dong J, Wang W, Qian Y, Zhang X (2017) SSGAN: secure steganography based on generative adversarial networks. In: Advances in Multimedia Information Processing - PCM 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, Revised Selected Papers, Part I, vol. 10735, pp. 534\u2013544","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"1140_CR23","unstructured":"Zhang KA, Cuesta-Infante A, Xu L, Veeramachaneni K (2019) Steganogan: high capacity image steganography with gans. CoRR arXiv:abs\/1901.03892"},{"key":"1140_CR24","doi-asserted-by":"crossref","unstructured":"Jing J, Deng X, Xu M, Wang J, Guan Z (2021) Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 4733\u20134742","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"1140_CR25","unstructured":"Cortes C, LeCun Y, Burges CJ (1998) The mnist database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"1140_CR26","unstructured":"Xiao H, Rasul K, Vollgraf R (2017) Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. CoRR arXiv:abs\/1708.07747"},{"key":"1140_CR27","unstructured":"Krizhevsky A (2009) Learning multiple layers of features from tiny images. J Comput Sci Dep, 32\u201333"},{"key":"1140_CR28","doi-asserted-by":"crossref","unstructured":"Kinnunen T, Kamarainen J, Lensu L, Lankinen J, K\u00e4lvi\u00e4inen H (2010) Making visual object categorization more challenging: Randomized caltech-101 data set. In: 20th International Conference on Pattern Recognition, ICPR 2010, Istanbul, Turkey, pp. 476\u2013479","DOI":"10.1109\/ICPR.2010.124"},{"key":"1140_CR29","doi-asserted-by":"crossref","unstructured":"Wang X, Yu K, Wu S (2018) ESRGAN: enhanced super-resolution generative adversarial networks. In: Computer Vision - ECCV 2018 Workshops - Munich, Germany, Proceedings, Part V, vol. 11133, pp. 63\u201379","DOI":"10.1007\/978-3-030-11021-5_5"},{"key":"1140_CR30","unstructured":"Kingma DP (2015) Ba J (2015) Adam: A method for stochastic optimization. In: Bengio Y, LeCun Y (eds) 3rd International Conference on Learning Representations, ICLR 2015. CA, USA, May, San Diego, pp 7\u20139"},{"issue":"11","key":"1140_CR31","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"1140_CR32","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, Conference Track Proceedings"},{"key":"1140_CR33","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1140_CR34","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. In: Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, Proceedings, Part IV, vol. 9908, pp. 630\u2013645","DOI":"10.1007\/978-3-319-46493-0_38"},{"issue":"3","key":"1140_CR35","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1214\/aoms\/1177729586","volume":"22","author":"H Robbins","year":"1951","unstructured":"Robbins H, Monro S (1951) A stochastic approximation method. Ann Math Stat 22(3):400\u2013407","journal-title":"Ann Math Stat"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-023-01140-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-023-01140-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-023-01140-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T14:02:29Z","timestamp":1690034549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-023-01140-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,18]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1140"],"URL":"https:\/\/doi.org\/10.1007\/s10044-023-01140-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,18]]},"assertion":[{"value":"5 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"This manuscript has not been published or presented elsewhere in part or in entirety and is not under consideration by another journal. We have read and understood your journal\u2019s policies, and we believe that neither the manuscript nor the study violates any of these. I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part. All the authors listed have approved the manuscript that is enclosed.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}