{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:11:27Z","timestamp":1774937487634,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Jiangsu Basic Research Programs-Natural Science Foundation","award":["BK20181407"],"award-info":[{"award-number":["BK20181407"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122032"],"award-info":[{"award-number":["62122032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11042-023-15048-y","type":"journal-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T05:02:49Z","timestamp":1679547769000},"page":"38589-38612","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A robust document image watermarking scheme using deep neural network"],"prefix":"10.1007","volume":"82","author":[{"given":"Sulong","family":"Ge","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6860-647X","authenticated-orcid":false,"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,23]]},"reference":[{"key":"15048_CR1","doi-asserted-by":"publisher","first-page":"113157","DOI":"10.1016\/j.eswa.2019.113157","volume":"146","author":"M Ahmadi","year":"2020","unstructured":"Ahmadi M, Norouzi A, Karimi N, Samavi S, Emami A (2020) Redmark: framework for residual diffusion watermarking based on deep networks. Expert Syst Appl 146:113157","journal-title":"Expert Syst Appl"},{"key":"15048_CR2","doi-asserted-by":"crossref","unstructured":"Al-Haj A, Barouqa H (2017) Copyright protection of e-government document images using digital watermarking. In: 2017 3rd international conference on information management (ICIM). IEEE, pp 441\u2013446","DOI":"10.1109\/INFOMAN.2017.7950424"},{"key":"15048_CR3","doi-asserted-by":"crossref","unstructured":"Amano T, Misaki D (1999) A feature calibration method for watermarking of document images. In: Proceedings of the fifth international conference on document analysis and recognition. ICDAR\u201999 (Cat. No. PR00318). IEEE, pp 91\u201394","DOI":"10.1109\/ICDAR.1999.791732"},{"key":"15048_CR4","doi-asserted-by":"crossref","unstructured":"Barouqa H, Al-Haj A (2021) Watermarking e-government document images using the discrete wavelets transform and schur decomposition. In: 2021 7th international conference on information management (ICIM). IEEE, pp 102\u2013106","DOI":"10.1109\/ICIM52229.2021.9417146"},{"key":"15048_CR5","doi-asserted-by":"crossref","unstructured":"Brassil J, Low S, Maxemchuk N, O\u2019Gorman L (1994) Electronic marking and identification techniques to discourage document copying. In: Proceedings of INFOCOM\u201994 conference on computer communications. IEEE, pp 1278\u20131287","DOI":"10.1109\/INFCOM.1994.337544"},{"issue":"7","key":"15048_CR6","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/5.771071","volume":"87","author":"J Brassil","year":"1999","unstructured":"Brassil J, Low S, Maxemchuk N (1999) Copyright protection for the electronic distribution of text documents. Proc IEEE 87(7):1181\u20131196","journal-title":"Proc IEEE"},{"key":"15048_CR7","unstructured":"China national knowledge infrastructure (2021) [Online]. Accessed: April 4. Available: https:\/\/www.cnki.net\/"},{"key":"15048_CR8","first-page":"13","volume":"24","author":"KR Chetan","year":"2015","unstructured":"Chetan KR, Nirmala S (2015) An efficient and secure robust watermarking scheme for document images using integer wavelets and block coding of binary watermarks. J Inf Secur Appl 24:13\u201324","journal-title":"J Inf Secur Appl"},{"key":"15048_CR9","volume-title":"Digital watermarking and steganography","author":"I Cox","year":"2007","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan kaufmann, San Mateo"},{"key":"15048_CR10","doi-asserted-by":"crossref","unstructured":"Dang QB, Louisa K, Coustaty M, Luqman MM, Ogier J-M (2019) A blind document image watermarking approach based on discrete wavelet transform and qr code embedding. In: 2019 International conference on document analysis and recognition workshops (ICDARW), vol 8. IEEE, pp 1\u20136","DOI":"10.1109\/ICDARW.2019.70133"},{"issue":"11","key":"15048_CR11","doi-asserted-by":"publisher","first-page":"4075","DOI":"10.1109\/TCSVT.2019.2953720","volume":"30","author":"H Fang","year":"2019","unstructured":"Fang H, Zhang W, Ma Z, Zhou H, Sun S, Cui H, Nenghai Y (2019) A camera shooting resilient watermarking scheme for underpainting documents. IEEE Trans Circuits Syst Video Technol 30(11):4075\u20134089","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"15048_CR12","doi-asserted-by":"crossref","unstructured":"Guan Z, Jing J, Deng X, Xu M, Jiang L, Zhang Z, Li Y (2022) Deepmih: deep invertible network for multiple image hiding. IEEE Trans Pattern Anal Mach Intell","DOI":"10.1109\/TPAMI.2022.3141725"},{"issue":"12","key":"15048_CR13","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/76.974678","volume":"11","author":"D Huang","year":"2001","unstructured":"Huang D, Yan H (2001) Interword distance changes represented by sine waves for watermarking text images. IEEE Trans Circuits Syst Video Technol 11 (12):1237\u20131245","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"15048_CR14","unstructured":"Ieee\/iet electronic library (2021) [Online]. Accessed: April 4. Available: https:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp"},{"key":"15048_CR15","doi-asserted-by":"crossref","unstructured":"Jing J, Deng X, Xu M, Wang J, Guan Z (2021) Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE\/cvf international conference on computer vision, pp 4733\u20134742","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"15048_CR16","doi-asserted-by":"publisher","first-page":"8011","DOI":"10.1109\/ACCESS.2018.2796585","volume":"6","author":"NS Kamaruddin","year":"2018","unstructured":"Kamaruddin NS, Kamsin A, Por LY, Rahman H (2018) A review of text watermarking: theory, methods, and applications. IEEE Access 6:8011\u20138028","journal-title":"IEEE Access"},{"issue":"11","key":"15048_CR17","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1016\/j.patrec.2004.04.002","volume":"25","author":"Y-W Kim","year":"2004","unstructured":"Kim Y-W, Oh I-S (2004) Watermarking text document images using edge direction histograms. Pattern Recogn Lett 25(11):1243\u20131251","journal-title":"Pattern Recogn Lett"},{"key":"15048_CR18","unstructured":"Kim Y-W, Moon K-A, Oh I-S (2003) A text watermarking algorithm based on word classification and inter-word space statistics. In: ICDAR. Citeseer, pp 775\u2013779"},{"key":"15048_CR19","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980"},{"key":"15048_CR20","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25:1097\u20131105","journal-title":"Advances in neural information processing systems"},{"key":"15048_CR21","doi-asserted-by":"crossref","unstructured":"Liu Y, Guo M, Zhang J, Zhu Y, Xie X (2019) A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM international conference on multimedia, pp 1509\u20131517","DOI":"10.1145\/3343031.3351025"},{"key":"15048_CR22","doi-asserted-by":"crossref","unstructured":"Loc CV, Burie J-C, Ogier J-M (2018) Document images watermarking for security issue using fully convolutional networks. In: 2018 24th International conference on pattern recognition (ICPR). IEEE, pp 1091\u20131096","DOI":"10.1109\/ICPR.2018.8546035"},{"key":"15048_CR23","unstructured":"Lu H, Shi X, Shi YQ, Kot AC, Chen L (2002) Watermark embedding in dc components of dct for binary images. In: 2002 IEEE workshop on multimedia signal processing. IEEE, pp 300\u2013303"},{"key":"15048_CR24","doi-asserted-by":"crossref","unstructured":"Luo X, Talebi H, Yang F, Elad M, Milanfar P (2021) The rate-distortion-accuracy tradeoff: jpeg case study. In: 2021 Data compression conference (DCC), pp 354\u2013354","DOI":"10.1109\/DCC50243.2021.00049"},{"key":"15048_CR25","doi-asserted-by":"crossref","unstructured":"Luo X, Zhan R, Chang H, Yang F, Milanfar P (2020) Distortion agnostic deep watermarking. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 13548\u201313557","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"15048_CR26","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","volume":"337","author":"Seung-Min Mun","year":"2019","unstructured":"Mun Seung-Min, Nam Seung-Hun, Jang H, Kim D, Lee Heung-Kyu (2019) Finding robust domain from attacks: a learning framework for blind watermarking. Neurocomputing 337:191\u2013202","journal-title":"Neurocomputing"},{"issue":"3","key":"15048_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D Rosiyadi","year":"2011","unstructured":"Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2011) Copyright protection for e-government document images. IEEE Multimed 19(3):62\u201373","journal-title":"IEEE Multimed"},{"key":"15048_CR28","unstructured":"Shin R, Song D (2017) Jpeg-resistant adversarial images. In: NIPS 2017 workshop on machine learning and computer security, vol 1"},{"key":"15048_CR29","unstructured":"Tan L, Sun X, Sun G (2012) Print-scan resilient text image watermarking based on stroke direction modulation for chinese document authentication. Radioengineering 21(1)"},{"key":"15048_CR30","doi-asserted-by":"crossref","unstructured":"Tancik M, Mildenhall B, Ng R (2020) Stegastamp: invisible hyperlinks in physical photographs. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2117\u20132126","DOI":"10.1109\/CVPR42600.2020.00219"},{"issue":"4","key":"15048_CR31","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"15048_CR32","doi-asserted-by":"crossref","unstructured":"Zhang R, Isola P, A Efros A, Shechtman E, Wang O (2018) The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 586\u2013595","DOI":"10.1109\/CVPR.2018.00068"},{"issue":"1","key":"15048_CR33","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TCI.2016.2644865","volume":"3","author":"H Zhao","year":"2016","unstructured":"Zhao H, Gallo O, Frosio I, Kautz J (2016) Loss functions for image restoration with neural networks. IEEE Transactions on computational imaging 3 (1):47\u201357","journal-title":"IEEE Transactions on computational imaging"},{"key":"15048_CR34","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","volume":"23","author":"X Zhong","year":"2021","unstructured":"Zhong X, Huang Pei-Chi, Mastorakis S, Shih F (2021) An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans Multimed 23:1951\u20131961","journal-title":"IEEE Trans Multimed"},{"key":"15048_CR35","doi-asserted-by":"crossref","unstructured":"Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: hiding data with deep networks. In: Proceedings of the European conference on computer vision (ECCV), pp 657\u2013672","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15048-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15048-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15048-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T10:13:25Z","timestamp":1696932805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15048-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,23]]},"references-count":35,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["15048"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15048-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,23]]},"assertion":[{"value":"22 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no potential conflicts of interest in this work, and no human participants or animals are involved.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}