{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:06Z","timestamp":1775228706322,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Hwarang-Dae Research Institute of Korea Military Academy"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11042-021-11135-0","type":"journal-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T01:03:12Z","timestamp":1641517392000},"page":"6217-6234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["BlindNet backdoor: Attack on deep neural network using blind watermark"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1169-9892","authenticated-orcid":false,"given":"Hyun","family":"Kwon","sequence":"first","affiliation":[]},{"given":"Yongchul","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"11135_CR1","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075\u201321083","journal-title":"IEEE Access"},{"key":"11135_CR2","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M et al (2016) Tensorflow: A system for large-scale machine learning. In: OSDI, vol 16, pp 265\u2013283"},{"issue":"1","key":"11135_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"100","author":"N Ahmed","year":"1974","unstructured":"Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Trans Comput 100(1):90\u201393","journal-title":"IEEE Trans Comput"},{"issue":"8","key":"11135_CR4","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: Threat analysis and countermeasures. Proc IEEE 102(8):1229\u20131247","journal-title":"Proc IEEE"},{"key":"11135_CR5","volume-title":"The Fourier transform and its applications, vol 31999","author":"RN Bracewell","year":"1986","unstructured":"Bracewell RN, Bracewell RN (1986) The Fourier transform and its applications, vol 31999. McGraw-Hill, New York"},{"issue":"2","key":"11135_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno M, Nelson B, Joseph AD, Tygar J (2010) The security of machine learning. Mach Learn 81(2):121\u2013148","journal-title":"Mach Learn"},{"key":"11135_CR7","unstructured":"Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. In: Proceedings of the 29th international coference on international conference on machine learning. Omnipress, pp 1467\u20131474"},{"key":"11135_CR8","unstructured":"Chen P-Y, Sharma Y, Zhang H, Yi J, Hsieh C-J (2017) Ead: elastic-net attacks to deep neural networks via adversarial examples. arXiv:1709.04114"},{"issue":"90","key":"11135_CR9","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley JW, Tukey JW (1965) An algorithm for the machine calculation of complex fourier series. Math Comput 19(90):297\u2013301","journal-title":"Math Comput"},{"key":"11135_CR10","doi-asserted-by":"crossref","unstructured":"Clements J, Lao Y (2018) Hardware trojan attacks on neural networks. arXiv:1806.05768","DOI":"10.1109\/ISCAS.2019.8702493"},{"key":"11135_CR11","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"11135_CR12","doi-asserted-by":"crossref","unstructured":"Ding S, Tian Y, Xu F, Li Q, Zhong S (2019) Trojan attack on deep generative models in autonomous driving. In: International conference on security and privacy in communication systems. Springer, pp 299\u2013318","DOI":"10.1007\/978-3-030-37228-6_15"},{"key":"11135_CR13","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: A large-scale hierarchical image database. In: IEEE conference on computer vision and pattern recognition 2009, CVPR 2009. IEEE, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"11135_CR14","doi-asserted-by":"crossref","unstructured":"Golub GH, Reinsch C (1971) Singular value decomposition and least squares solutions. In: Linear algebra. Springer, pp 134\u2013151","DOI":"10.1007\/978-3-662-39778-7_10"},{"key":"11135_CR15","unstructured":"Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International conference on learning representations"},{"key":"11135_CR16","unstructured":"Gu T, Dolan-Gavitt B, Garg S (2017) Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733"},{"issue":"6","key":"11135_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton G, Deng L, Yu D, Dahl GE, Mohamed A-r, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath TN et al (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Sig Proc Mag 29(6):82\u201397","journal-title":"IEEE Sig Proc Mag"},{"key":"11135_CR18","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"1","key":"11135_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJHPCN.2019.099740","volume":"14","author":"H Ji","year":"2019","unstructured":"Ji H, Fu Z (2019) Coverless information hiding method based on the keyword. Int J High Perform Comput Netw 14(1):1\u20137","journal-title":"Int J High Perform Comput Netw"},{"issue":"3","key":"11135_CR20","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput (IJCAC) 9(3):22\u201336","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"11135_CR21","unstructured":"Krizhevsky A, Nair V, Hinton G (2014) The cifar-10 dataset. vol 55. online: http:\/\/www.cs.toronto.edu\/kriz\/cifar.html"},{"key":"11135_CR22","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow I, Bengio S. (2017) Adversarial examples in the physical world. In: ICLR workshop","DOI":"10.1201\/9781351251389-8"},{"key":"11135_CR23","doi-asserted-by":"crossref","unstructured":"Liu Y, Ma S, Aafer Y, Lee W-C, Zhai J, Wang W, Zhang X (2018) Trojaning attack on neural networks. NDSS","DOI":"10.14722\/ndss.2018.23291"},{"key":"11135_CR24","unstructured":"Li S, Zhao BZH, Yu J, Xue M, Kaafar D, Zhu H (2019) Invisible backdoor attacks against deep neural networks. arXiv:1909.02742"},{"key":"11135_CR25","unstructured":"LeCun Y, Cortes C, Burges CJ (2010) Mnist handwritten digit database. vol 2. AT&T Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist"},{"issue":"6","key":"11135_CR26","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/JBHI.2014.2344095","volume":"19","author":"M Mozaffari-Kermani","year":"2015","unstructured":"Mozaffari-Kermani M, Sur-Kolay S, Raghunathan A, Jha NK (2015) Systematic poisoning attacks on and defenses for machine learning in healthcare. IEEE J Biomed Health Inform 19(6):1893\u20131905","journal-title":"IEEE J Biomed Health Inform"},{"key":"11135_CR27","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: Proc IEEE conference computer vision and pattern recognition, pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"11135_CR28","doi-asserted-by":"crossref","unstructured":"Nuding F, Mayer R (2020) Poisoning attacks in federated learning: An evaluation on traffic sign classification. In: Inproceedings of the tenth ACM conference on data and application security and privacy, pp 168\u2013170","DOI":"10.1145\/3374664.3379534"},{"key":"11135_CR29","doi-asserted-by":"crossref","unstructured":"Nussbaumer HJ (1981) The fast fourier transform. In: Fast fourier transform and convolution algorithms. Springer, pp 80\u2013111","DOI":"10.1007\/978-3-662-00551-4_4"},{"key":"11135_CR30","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE european symposium on security and privacy (EuroS&P). IEEE, pp 372\u2013387","DOI":"10.1109\/EuroSP.2016.36"},{"key":"11135_CR31","doi-asserted-by":"crossref","unstructured":"Rehman H, Ekelhart A, Mayer R (2019) Backdoor attacks in neural networks\u2013a systematic evaluation on multiple traffic sign datasets. In: International cross-domain conference for machine learning and knowledge extraction. Springer, pp 285\u2013300","DOI":"10.1007\/978-3-030-29726-8_18"},{"key":"11135_CR32","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.patrec.2017.10.024","volume":"124","author":"A Rozsa","year":"2019","unstructured":"Rozsa A, G\u00fcnther M., Rudd EM, Boult TE (2019) Facial attributes: Accuracy and adversarial robustness. Pattern Recogn Lett 124:100\u2013108","journal-title":"Pattern Recogn Lett"},{"issue":"10","key":"11135_CR33","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1109\/78.157290","volume":"40","author":"MJ Shensa","year":"1992","unstructured":"Shensa MJ (1992) The discrete wavelet transform: wedding the a trous and mallat algorithms. IEEE Trans Sig Process 40(10):2464\u20132482","journal-title":"IEEE Trans Sig Process"},{"key":"11135_CR34","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber J (2015) Deep learning in neural networks: An overview. Neural Netw 61:85\u2013117","journal-title":"Neural Netw"},{"key":"11135_CR35","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: International conference on learning representations"},{"issue":"7587","key":"11135_CR36","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver D, Huang A, Maddison CJ, Guez A, Sifre L, Van Den Driessche G, Schrittwieser J, Antonoglou I, Panneershelvam V, Lanctot M et al (2016) Mastering the game of go with deep neural networks and tree search. Nature 529(7587):484\u2013489","journal-title":"Nature"},{"key":"11135_CR37","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. In: International conference on learning representations"},{"key":"11135_CR38","doi-asserted-by":"crossref","unstructured":"Wang B, Yao Y, Shan S, Li H, Viswanath B, Zheng H, Zhao BY (2019) Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 707\u2013723","DOI":"10.1109\/SP.2019.00031"},{"issue":"3","key":"11135_CR39","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1504\/IJHPCN.2019.102126","volume":"14","author":"B Wang","year":"2019","unstructured":"Wang B, Ding Q, Gu X (2019) A secure reversible chaining watermark scheme with hidden group delimiter for wsns. Int J High Perform Comput Netw 14(3):265\u2013273","journal-title":"Int J High Perform Comput Netw"},{"key":"11135_CR40","unstructured":"Yang C, Wu Q, Li H, Chen Y (2017) Generative poisoning attack method against neural networks. arXiv:1703.01340"},{"issue":"7","key":"11135_CR41","doi-asserted-by":"publisher","first-page":"7965","DOI":"10.1007\/s11042-018-6444-0","volume":"78","author":"L Zou","year":"2019","unstructured":"Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965\u20137980","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11135-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11135-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11135-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T08:13:29Z","timestamp":1645604009000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11135-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["11135"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11135-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,7]]},"assertion":[{"value":"20 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}