{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:27:49Z","timestamp":1771871269232,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2024JC-YBMS-480"],"award-info":[{"award-number":["2024JC-YBMS-480"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2024JC-YBQN-0727"],"award-info":[{"award-number":["2024JC-YBQN-0727"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076200"],"award-info":[{"award-number":["62076200"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62273273"],"award-info":[{"award-number":["62273273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-YBGY-149"],"award-info":[{"award-number":["2023-YBGY-149"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10489-025-06496-0","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:45:56Z","timestamp":1744217156000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Toward imperceptible and robust image watermarking against screen-shooting with dense blocks and CBAM"],"prefix":"10.1007","volume":"55","author":[{"given":"Jiamin","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2537-639X","authenticated-orcid":false,"given":"Xiaobing","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Yalin","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"issue":"8","key":"6496_CR1","doi-asserted-by":"publisher","first-page":"3921","DOI":"10.1109\/TIP.2017.2706502","volume":"26","author":"CS Chang","year":"2017","unstructured":"Chang CS, Shen JJ (2017) Features classification forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921\u20133935","journal-title":"IEEE Trans Image Process"},{"key":"6496_CR2","unstructured":"Qian K, Lu Y, Yang Z et al. (2021) AIRCODE: Hidden Screen-Camera communication on an invisible and inaudible dual channel. 18th USENIX Symposium on Networked Systems Design and Implementation, pp 457\u2013470"},{"key":"6496_CR3","doi-asserted-by":"crossref","unstructured":"Guan H, Huang Y, Zhang S et al. (2023) A Survey of Screen Shooting Resilient Image Watermarking Algorithms. IEEE Int Conf Culture-Oriented Sci Technol pp 12\u201317","DOI":"10.1109\/CoST60524.2023.00012"},{"issue":"2","key":"6496_CR4","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","volume":"83","author":"P Aberna","year":"2024","unstructured":"Aberna P, Agilandeeswari L (2024) Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed Tools Appl 83(2):5531\u20135591","journal-title":"Multimed Tools Appl"},{"issue":"28","key":"6496_CR5","doi-asserted-by":"publisher","first-page":"43367","DOI":"10.1007\/s11042-023-15177-4","volume":"82","author":"L Agilandeeswari","year":"2023","unstructured":"Agilandeeswari L, Prabukumar M, Alenizi FA (2023) A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Multimed Tools Appl 82(28):43367\u201343419","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"6496_CR6","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","volume":"51","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang GX, Rabbani M, Boukela L, Jelodar H (2021) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51(3):1701\u20131732","journal-title":"Appl Intell"},{"key":"6496_CR7","doi-asserted-by":"publisher","first-page":"37757","DOI":"10.1109\/ACCESS.2024.3370411","volume":"12","author":"A Palani","year":"2024","unstructured":"Palani A, Agilandeeswari L (2024) Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization. IEEE Access 12:37757\u201337781","journal-title":"IEEE Access"},{"issue":"21","key":"6496_CR8","doi-asserted-by":"publisher","first-page":"25467","DOI":"10.1007\/s10489-023-04903-y","volume":"53","author":"PT Nha","year":"2023","unstructured":"Nha PT, Thanh TM, Phong NT (2023) An effective embedding algorithm for blind image watermarking technique based on Hessenberg decomposition. Appl Intell 53(21):25467\u201325489","journal-title":"Appl Intell"},{"issue":"2","key":"6496_CR9","doi-asserted-by":"publisher","first-page":"339","DOI":"10.37391\/ijeer.110214","volume":"11","author":"A Palani","year":"2023","unstructured":"Palani A, Agilandeeswari L (2023) Multi-image feature map-based watermarking techniques using transformer. Int J Electr Electr Res (IJEER) 11(2):339\u2013344","journal-title":"Int J Electr Electr Res (IJEER)"},{"key":"6496_CR10","doi-asserted-by":"publisher","first-page":"123715","DOI":"10.1016\/j.eswa.2024.123715","volume":"249","author":"K Hu","year":"2024","unstructured":"Hu K, Wang MP, Ma XH et al (2024) Learning-based image steganography and watermarking: A survey. Expert Syst Appl 249:123715","journal-title":"Expert Syst Appl"},{"issue":"6","key":"6496_CR11","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TIFS.2018.2878541","volume":"14","author":"H Fang","year":"2018","unstructured":"Fang H, Zhang W, Zhou H et al (2018) Screen-shooting resilient watermarking. IEEE Trans Inf Forensics Secur 14(6):1403\u20131418","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6496_CR12","doi-asserted-by":"crossref","unstructured":"Dong L, Chen J, Peng C et al. (2022) Watermark-preserving keypoint enhancement for screen-shooting resilient watermarking. IEEE Int Conf Multimed Expo, pp 1\u20136","DOI":"10.1109\/ICME52920.2022.9859950"},{"issue":"23","key":"6496_CR13","doi-asserted-by":"publisher","first-page":"32841","DOI":"10.1007\/s11042-022-12738-x","volume":"81","author":"B Deng","year":"2022","unstructured":"Deng B, Li S, Qian Z (2022) An SVD-based screen-shooting resilient watermarking scheme. Multimed Tools Appl 81(23):32841\u201332855","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"6496_CR14","doi-asserted-by":"publisher","first-page":"1730","DOI":"10.3390\/math11071730","volume":"11","author":"Y Bai","year":"2023","unstructured":"Bai Y, Li L, Zhang S et al (2023) Fast frequency domain screen-shooting watermarking algorithm based on ORB feature points. Mathematics 11(7):1730","journal-title":"Mathematics"},{"key":"6496_CR15","doi-asserted-by":"crossref","unstructured":"Gugelmann D, Sommer D, Lenders V et al. (2018) Screen watermarking for data theft investigation and attribution. 10th International Conference on Cyber Conflict, pp 391\u2013408","DOI":"10.23919\/CYCON.2018.8405027"},{"issue":"11","key":"6496_CR16","doi-asserted-by":"publisher","first-page":"4075","DOI":"10.1109\/TCSVT.2019.2953720","volume":"30","author":"H Fang","year":"2019","unstructured":"Fang H, Zhang W, Ma Z et al (2019) A camera shooting resilient watermarking scheme for underpainting documents. IEEE Trans Circuits Syst Video Technol 30(11):4075\u20134089","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6496_CR17","doi-asserted-by":"crossref","unstructured":"Zhu J, Kaplan R, Johnson J et al. (2018) Hidden: Hiding data with deep networks. Proceedings of the European Conference on Computer Vision (ECCV), pp 657\u2013672","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"6496_CR18","doi-asserted-by":"crossref","unstructured":"Wengrowski E, Dana K (2019) Light field messaging with deep photographic steganography. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) pp 1515\u20131524","DOI":"10.1109\/CVPR.2019.00161"},{"issue":"2","key":"6496_CR19","doi-asserted-by":"publisher","first-page":"288","DOI":"10.3390\/e25020288","volume":"25","author":"W Gu","year":"2023","unstructured":"Gu W, Chang CC, Bai Y et al (2023) Anti-screenshot watermarking algorithm for archival image based on deep learning model. Entropy 25(2):288","journal-title":"Entropy"},{"key":"6496_CR20","doi-asserted-by":"crossref","unstructured":"Liu Y, Guo M, Zhang J et al. (2019) A novel two-stage separable deep learning framework for practical blind watermarking. Proceedings of the 27th ACM International Conference on Multimedia pp 1509\u20131517","DOI":"10.1145\/3343031.3351025"},{"key":"6496_CR21","doi-asserted-by":"publisher","first-page":"103837","DOI":"10.1016\/j.jvcir.2023.103837","volume":"94","author":"F Cao","year":"2023","unstructured":"Cao F, Wang T, Guo D et al (2023) Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain. J Vis Commun Image Represent 94:103837","journal-title":"J Vis Commun Image Represent"},{"key":"6496_CR22","doi-asserted-by":"crossref","unstructured":"Tancik M, Mildenhall B, Ng R (2020) Stegastamp: Invisible hyperlinks in physical photographs. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) pp 2117\u20132126","DOI":"10.1109\/CVPR42600.2020.00219"},{"issue":"19","key":"6496_CR23","doi-asserted-by":"publisher","first-page":"9780","DOI":"10.3390\/app12199780","volume":"12","author":"R Bai","year":"2022","unstructured":"Bai R, Li L, Zhang S et al (2022) SSDeN: Framework for screen-shooting resilient watermarking via deep networks in the frequency domain. Appl Sci 12(19):9780","journal-title":"Appl Sci"},{"issue":"2","key":"6496_CR24","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1049\/ipr2.12653","volume":"17","author":"S Ge","year":"2023","unstructured":"Ge S, Fei J, Xia Z et al (2023) A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Proc 17(2):323\u2013336","journal-title":"IET Image Proc"},{"key":"6496_CR25","doi-asserted-by":"crossref","unstructured":"Fang H, Jia Z, Ma Z et al. (2022) PIMoG: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network. Proceedings of the 30th ACM International Conference on Multimedia, pp 2267\u20132275","DOI":"10.1145\/3503161.3548049"},{"key":"6496_CR26","first-page":"103547","volume":"76","author":"Z Tang","year":"2023","unstructured":"Tang Z, Chai X, Lu Y et al (2023) An end-to-end screen shooting resilient blind watermarking scheme for medical images. J Inf Sec Appl 76:103547","journal-title":"J Inf Sec Appl"},{"issue":"12","key":"6496_CR27","doi-asserted-by":"publisher","first-page":"3713","DOI":"10.11834\/jig.221141","volume":"28","author":"JY Wu","year":"2023","unstructured":"Wu JY, Li XM, Qin C (2023) Screen-shooting robust watermarking with end-to-end neural network. J Image Graph 28(12):3713\u20133730","journal-title":"J Image Graph"},{"issue":"3","key":"6496_CR28","first-page":"135","volume":"9","author":"XM Li","year":"2023","unstructured":"Li XM, Guo DD, Zhuo XF et al (2023) Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition. Chin J Netw Inf Sec 9(3):135\u2013149","journal-title":"Chin J Netw Inf Sec"},{"issue":"02","key":"6496_CR29","first-page":"343","volume":"51","author":"CX Huang","year":"2024","unstructured":"Huang CX, Zhao CX, Jiang XT et al (2024) Screen-shooting resilient DCT domain watermarking method based on deep learning. Comput Sci 51(02):343\u2013351","journal-title":"Comput Sci"},{"key":"6496_CR30","doi-asserted-by":"publisher","first-page":"122062","DOI":"10.1016\/j.eswa.2023.122062","volume":"238","author":"F Cao","year":"2024","unstructured":"Cao F, Guo D, Wang T et al (2024) Universal screen-shooting robust image watermarking with channel-attention in DCT domain. Expert Syst Appl 238:122062","journal-title":"Expert Syst Appl"},{"key":"6496_CR31","doi-asserted-by":"publisher","first-page":"123159","DOI":"10.1016\/j.eswa.2024.123159","volume":"246","author":"D Guo","year":"2024","unstructured":"Guo D, Zhu X, Li F et al (2024) DoBMark: A double-branch network for screen-shooting resilient image watermarking. Expert Syst Appl 246:123159","journal-title":"Expert Syst Appl"},{"issue":"02","key":"6496_CR32","doi-asserted-by":"publisher","first-page":"0408","DOI":"10.11834\/jig.220811","volume":"29","author":"JW Song","year":"2024","unstructured":"Song JW, Liu CX, Zhang XY (2024) LDH: least dependent hiding for screen-shooting resilient watermarking. J Image Graph 29(02):0408\u20130418","journal-title":"J Image Graph"},{"key":"6496_CR33","first-page":"1","volume":"72","author":"J Huang","year":"2023","unstructured":"Huang J, Luo T, Li L, Yang G, Xu H, Chang C-C (2023) ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN. IEEE Trans Instrum Meas 72:1\u201317","journal-title":"IEEE Trans Instrum Meas"},{"key":"6496_CR34","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der Maaten L et al. (2017) Densely connected convolutional networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"6496_CR35","first-page":"171","volume":"2","author":"G Rizzolatti","year":"1998","unstructured":"Rizzolatti G, Craighero L (1998) Spatial attention: Mechanisms and theories. Adv Psychol Sci 2:171\u2013198","journal-title":"Adv Psychol Sci"},{"key":"6496_CR36","doi-asserted-by":"crossref","unstructured":"Bastidas AA, Tang H (2019) Channel attention networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPR) pp 881\u2013888","DOI":"10.1109\/CVPRW.2019.00117"},{"key":"6496_CR37","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee JY et al. (2018) Cbam: Convolutional block attention module. Proceedings of the European Conference on Computer Vision (ECCV), pp 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"6496_CR38","doi-asserted-by":"crossref","unstructured":"Tsai PH, Chuang YY (2013) Target-driven moire pattern synthesis by phase modulation. Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp 1912\u20131919","DOI":"10.1109\/ICCV.2013.240"},{"key":"6496_CR39","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S et al. (2014) Microsoft COCO: Common objects in context. Proceedings of the European Conference on Computer Vision (ECCV) pp 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"6496_CR40","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R et al. (2009) Imagenet: A large-scale hierarchical image database. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"6496_CR41","unstructured":"Weber A (2018) Technical Report USC-SIPI-432. The USC-SIPI Image Database: Version 6, available: http:\/\/sipi.usc.edu\/database\/"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06496-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06496-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06496-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:38:38Z","timestamp":1758310718000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06496-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,9]]},"references-count":41,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["6496"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06496-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,9]]},"assertion":[{"value":"19 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"645"}}