{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T13:07:22Z","timestamp":1776690442516,"version":"3.51.2"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T00:00:00Z","timestamp":1579737600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T00:00:00Z","timestamp":1579737600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1636201"],"award-info":[{"award-number":["U1636201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572452"],"award-info":[{"award-number":["61572452"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Anhui Initiative in Quantum Information Technologies","award":["AHY150400"],"award-info":[{"award-number":["AHY150400"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11554-020-00941-8","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T13:02:48Z","timestamp":1579784568000},"page":"631-641","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Real-time attacks on robust watermarking tools in the wild by CNN"],"prefix":"10.1007","volume":"17","author":[{"given":"Linfeng","family":"Geng","sequence":"first","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haozhe","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Han","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,23]]},"reference":[{"issue":"1","key":"941_CR1","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.commatsci.2018.08.040","volume":"55","author":"Q Zhou","year":"2018","unstructured":"Zhou, Q., Qiu, Y., Li, L., Lu, J., Yuan, W., Feng, X., Mao, X.: Steganography using reversible texture synthesis based on seeded region growing and LSB. Comput. Mater. Continua 55(1), 151 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"13","key":"941_CR2","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Mu, Y., Wu, Q.J.: Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 23(13), 4927 (2019)","journal-title":"Soft Comput."},{"issue":"6","key":"941_CR3","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/S0165-1684(01)00039-1","volume":"81","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling: towards a second generation watermarking benchmark. Signal Process. 81(6), 1177 (2001)","journal-title":"Signal Process."},{"key":"941_CR4","unstructured":"Su, J.K., Eggers, J.J., Girod, B.: Optimum attack on digital watermarks and its defense. In: IEEE Conference Record of the Thirty-fourth Asilomar Conference on Signals, Systems and Computers (Cat. No. 00CH37154), vol. 2, pp. 1836\u20131840 (2000)"},{"issue":"1","key":"941_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","volume":"12","author":"H Tao","year":"2014","unstructured":"Tao, H., Chongmin, L., Zain, J.M., Abdalla, A.N.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12(1), 122 (2014)","journal-title":"J. Appl. Res. Technol."},{"key":"941_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"SA Parah","year":"2016","unstructured":"Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 53, 11 (2016)","journal-title":"Digit. Signal Process."},{"issue":"6","key":"941_CR7","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TIFS.2018.2878541","volume":"14","author":"H Fang","year":"2019","unstructured":"Fang, H., Zhang, W., Zhou, H., Cui, H., Yu, N.: Screen-shooting resilient watermarking. IEEE Trans. Inf. Forensics Secur. 14(6), 1403 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"941_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2009.2039604","volume":"5","author":"X Kang","year":"2010","unstructured":"Kang, X., Huang, J., Zeng, W.: Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Trans. Inf. Forensics Secur. 5(1), 1 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"941_CR9","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.neucom.2015.03.039","volume":"166","author":"C Li","year":"2015","unstructured":"Li, C., Zhang, Z., Wang, Y., Ma, B., Huang, D.: Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing 166, 404 (2015)","journal-title":"Neurocomputing"},{"issue":"2","key":"941_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.commatsci.2018.01.008","volume":"55","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Ni, R., Zhao, Y., Xian, M.: Watermark embedding for direct binary searched halftone images by adopting visual cryptography. Comput. Mater. Continua 55(2), 255 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"8","key":"941_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun. Mag. 39(8), 118 (2001)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"941_CR12","first-page":"1","volume":"2008","author":"A D\u2019angelo","year":"2008","unstructured":"D\u2019angelo, A., Barni, M., Merhav, N.: Stochastic image warping for improved watermark desynchronization. Eur. J. Inf. Syst. 2008(1), 1 (2008)","journal-title":"Eur. J. Inf. Syst."},{"issue":"21","key":"941_CR13","doi-asserted-by":"publisher","first-page":"13451","DOI":"10.1007\/s11042-015-2831-y","volume":"75","author":"B Yan","year":"2016","unstructured":"Yan, B., Liu, X.F., Yang, H.M.: Structure compliant local warping of images with applications to watermarking attack. Multimed. Tools Appl. 75(21), 13451 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"941_CR14","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/LSP.2004.840872","volume":"12","author":"M Barni","year":"2005","unstructured":"Barni, M.: Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Process. Lett. 12(2), 158 (2005)","journal-title":"IEEE Signal Process. Lett."},{"key":"941_CR15","unstructured":"Pereira, S., Pun, T.: Fast robust template matching for affine resistant image watermarks. In: Int. workshop on Inf. Hiding. Springer, Berlin, Heidelberg, pp. 199\u2013210 (1999)."},{"key":"941_CR16","unstructured":"Deguillaume, F., Csurka, G., Pun, T.: Countermeasures for unintentional and intentional video watermarking attacks. In: Security and Watermarking of Multimedia Contents II. International Society for Optics and Photonics, vol. 3971, pp. 346\u2013357 (2000)."},{"key":"941_CR17","doi-asserted-by":"crossref","unstructured":"Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G.: Attacks on copyright marking systems. In: Int. workshop on Inf. Hiding. Springer, Berlin, Heidelberg, pp. 218\u2013238 (1998)","DOI":"10.1007\/3-540-49380-8_16"},{"key":"941_CR18","unstructured":"Langelaar, G.C., Lagendijk, R.L., Biemond, J.: Removing spatial spread spectrum watermarks by non-linear filtering. In: IEEE 9th European Signal Processing Conference. (EUSIPCO 1998), pp. 1\u20134 (1998)"},{"issue":"3","key":"941_CR19","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P Moulin","year":"2003","unstructured":"Moulin, P., O\u2019Sullivan, J.A.: Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49(3), 563 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"941_CR20","doi-asserted-by":"crossref","unstructured":"Hong, S., Wu, M., Li, H., Wu, Z.: Event2vec: Learning representations of events on temporal sequences. In: Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, pp. 33\u201347. Springer, (2017)","DOI":"10.1007\/978-3-319-63564-4_3"},{"issue":"5","key":"941_CR21","doi-asserted-by":"publisher","first-page":"054009","DOI":"10.1088\/1361-6579\/ab15a2","volume":"40","author":"S Hong","year":"2019","unstructured":"Hong, S., Zhou, Y., Wu, M., Shang, J., Wang, Q., Li, H., Xie, J.: Combining deep neural networks and engineered features for cardiac arrhythmia detection from ECG recordings. Physiol. Meas. 40(5), 054009 (2019)","journal-title":"Physiol. Meas."},{"key":"941_CR22","unstructured":"Jain, V., Seung, H.S.: Natural image denoising with convolutional networks. In: NIPS, pp. 769\u2013776 (2008)"},{"key":"941_CR23","doi-asserted-by":"crossref","unstructured":"Burger, H.C., Schuler, C.J., Harmeling, S.: Image denoising: can plain neural networks compete with BM3D? In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2392\u20132399 (2012)","DOI":"10.1109\/CVPR.2012.6247952"},{"issue":"6","key":"941_CR24","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1109\/TPAMI.2016.2596743","volume":"39","author":"Y Chen","year":"2017","unstructured":"Chen, Y., Pock, T.: Trainable nonlinear reaction diffusion: a flexible framework for fast and effective image restoration. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1256 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"941_CR25","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","volume":"26","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Zuo, W., Chen, Y., Meng, D., Zhang, L.: Beyond a gaussian denoiser: residual learning of deep cnn for image denoising. IEEE Trans. Image Process. 26(7), 3142 (2017)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"941_CR26","first-page":"313","volume":"56","author":"C Li","year":"2018","unstructured":"Li, C., Jiang, Y., Cheslyar, M.: Computers. Mater. Continua 56(2), 313 (2018)","journal-title":"Mater. Continua"},{"key":"941_CR27","doi-asserted-by":"crossref","unstructured":"Bae, W., Yoo, J., Chul\u00a0Ye, J.: Beyond deep residual learning for image restoration: Persistent homology-guided manifold simplification. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1141\u20131149 (2017)","DOI":"10.1109\/CVPRW.2017.152"},{"issue":"Nov","key":"941_CR28","first-page":"463","volume":"3","author":"PL Bartlett","year":"2002","unstructured":"Bartlett, P.L., Mendelson, S.: Rademacher and Gaussian complexities: risk bounds and structural results. J. Mach. Learn. Res. 3(Nov), 463 (2002)","journal-title":"J. Mach. Learn. Res."},{"key":"941_CR29","unstructured":"Telgarsky, M.: Benefits of depth in neural networks. arXiv preprint arXiv:1602.04485 (2016)"},{"key":"941_CR30","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015)"},{"key":"941_CR31","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks. In: International Conference on Artificial Intelligence and Statistics (AISTATS). pp. 315\u2013323 (2011)"},{"key":"941_CR32","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: The Ins and outs of organizing BOSS. In: Int. Workshop Inf. Hiding. Springer, Berlin, Heidelberg, pp.\u00a059\u201370 (2011)","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"941_CR33","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"941_CR34","unstructured":"Chollet, F. et\u00a0al.: Keras (2015). https:\/\/github.com\/fchollet\/keras"},{"key":"941_CR35","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., Kudlur, M., Levenberg, J., Monga, R., Moore, S., Murray, D.G., Steiner, B., Tucker, P., Vasudevan, V., Warden, P., Wicke, M., Yu, Y., Zheng, X., Brain, G.: TensorFlow: a system for large-scale machine learning. In: OSDI, pp. 265\u2013284 (2016)"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-020-00941-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-020-00941-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-020-00941-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T01:36:48Z","timestamp":1611279408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-020-00941-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,23]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["941"],"URL":"https:\/\/doi.org\/10.1007\/s11554-020-00941-8","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,23]]},"assertion":[{"value":"31 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}