{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:22:02Z","timestamp":1767705722105,"version":"3.40.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100017700","name":"Henan Province Science and Technology Research Project","doi-asserted-by":"crossref","award":["222102320036"],"award-info":[{"award-number":["222102320036"]}],"id":[{"id":"10.13039\/501100017700","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shaanxi Provincial Department of Science and Technology Youth Project","award":["2021JQ-575"],"award-info":[{"award-number":["2021JQ-575"]}]},{"name":"Xi 'an Science and Technology Plan Project","award":["22GXFW0063"],"award-info":[{"award-number":["22GXFW0063"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11760-025-03867-5","type":"journal-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T23:03:06Z","timestamp":1739919786000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Anti-tampering method of QR code hidden information based on deep learning"],"prefix":"10.1007","volume":"19","author":[{"given":"Nan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lina","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Tengfei","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"key":"3867_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/J.ESWA.2023.122830","volume":"242","author":"A Divyanshu","year":"2024","unstructured":"Divyanshu, A., Anurag, T., Priyank, K., Vinay, K.S.: A comprehensive review on optimization-based image watermarking techniques for copyright protection. Expert Syst. Appl. 242, 122830 (2024). https:\/\/doi.org\/10.1016\/J.ESWA.2023.122830","journal-title":"Expert Syst. Appl."},{"key":"3867_CR2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1952\/2\/022049","author":"W Bo","year":"2024","unstructured":"Bo, W.: Reflections on the development path of copyright protection for digital products from the perspective of blockchain technology development. Inf. Knowl. Manag. (2024). https:\/\/doi.org\/10.1088\/1742-6596\/1952\/2\/022049","journal-title":"Inf. Knowl. Manag."},{"issue":"29","key":"3867_CR3","doi-asserted-by":"publisher","first-page":"45503","DOI":"10.1007\/S11042-023-15261-9","volume":"82","author":"F MingQuan","year":"2023","unstructured":"MingQuan, F.: Blind dual image watermarking for copyright protection, tamper proofing and self-recovery. Multimed. Tools Appl. 82(29), 45503\u201345518 (2023). https:\/\/doi.org\/10.1007\/S11042-023-15261-9","journal-title":"Multimed. Tools Appl."},{"key":"3867_CR4","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.cose.2016.11.016","volume":"65","author":"H Kandi","year":"2017","unstructured":"Kandi, H., Mishra, D., Gorthi, S.R.K.S.: Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Computers & Security 65, 247\u2013268 (2017). https:\/\/doi.org\/10.1016\/j.cose.2016.11.016","journal-title":"Computers & Security"},{"unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: Advances in Neural Information Processing Systems, vol. 30, pp. 1955\u20131965 (2017). arXiv:1703.00371","key":"3867_CR5"},{"unstructured":"A.Zhang, K., Cuesta-Infante, A., Xu, L., Veeramachaneni, K.: Steganogan: High capacity image steganography with gans. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), vol. abs\/1901.03892, pp. 2357\u20132366 (2019). arXiv:1901.03892","key":"3867_CR6"},{"doi-asserted-by":"publisher","unstructured":"Ahmadi, M., Norouzi, A., Karimi, N., Samavi, S., Emami, A.: Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 682\u2013697 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2019.113157","key":"3867_CR7","DOI":"10.1016\/j.eswa.2019.113157"},{"key":"3867_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157","volume":"146","author":"M Ahmadi","year":"2020","unstructured":"Ahmadi, M., Norouzi, A., Karimi, N., Samavi, S., Emami, A.: Redmark: Framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 146, 113157 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2019.113157","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"publisher","unstructured":"Luo, X., Zhan, R., Chang, H., Yang, F., Milanfar, P.: Distortion agnostic deep watermarking. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13545\u201313554. IEEE Computer Society, Los Alamitos, CA, USA (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.01356","key":"3867_CR9","DOI":"10.1109\/CVPR42600.2020.01356"},{"doi-asserted-by":"publisher","unstructured":"Liu, Y., Guo, M., Zhang, J., Zhu, Y., Xie, X.: A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 1509\u20131517. Association for Computing Machinery, Nice, France (2019). https:\/\/doi.org\/10.1145\/3343031.3351025","key":"3867_CR10","DOI":"10.1145\/3343031.3351025"},{"doi-asserted-by":"publisher","unstructured":"Zhang, C., Karjauv, A., Benz, P., Kweon, I.S.: Towards robust deep hiding under non-differentiable distortions for practical blind watermarking. In: Proceedings of the 29th ACM International Conference on Multimedia, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3474085.3475628","key":"3867_CR11","DOI":"10.1145\/3474085.3475628"},{"key":"3867_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10030320","author":"S Xie","year":"2021","unstructured":"Xie, S., Tan, H.-Z.: An anti-counterfeiting architecture for traceability system based on modified two-level quick response codes. Electronics (2021). https:\/\/doi.org\/10.3390\/electronics10030320","journal-title":"Electronics"},{"issue":"19","key":"3867_CR13","doi-asserted-by":"publisher","first-page":"22700","DOI":"10.1007\/s10489-023-04712-3","volume":"53","author":"VL Cu","year":"2023","unstructured":"Cu, V.L., Truong, X.V., Tran, H.V., Le, H.T., Nguyen, H.V.: Deep learning based-approach for quick response code verification. Appl. Intell. 53(19), 22700\u201322714 (2023). https:\/\/doi.org\/10.1007\/s10489-023-04712-3","journal-title":"Appl. Intell."},{"doi-asserted-by":"publisher","unstructured":"Lou, S., Shen, W., Shen, G., Cui, L., Yang, F., Deng, J., Lyu, S.: QR code anti-counterfeiting technique with lattice-based cryptography. In: Loskot, P., Niu, S. (eds.) International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), vol. 12718, pp. 43\u201350. SPIE, Nanjing, China (2023). https:\/\/doi.org\/10.1117\/12.2681559","key":"3867_CR14","DOI":"10.1117\/12.2681559"},{"issue":"6","key":"3867_CR15","doi-asserted-by":"publisher","first-page":"6367","DOI":"10.3934\/mbe.2019318","volume":"16","author":"S Wan","year":"2019","unstructured":"Wan, S., Yang, G., Qi, L., Li, L., Yan, X., Lu, Y.: Multiple security anti-counterfeit applications to qr code payment based on visual secret sharing and qr code. Math. Biosci. Eng. 16(6), 6367\u20136385 (2019). https:\/\/doi.org\/10.3934\/mbe.2019318","journal-title":"Math. Biosci. Eng."},{"issue":"05","key":"3867_CR16","doi-asserted-by":"publisher","first-page":"770","DOI":"10.13232\/j.cnki.jnju.2023.05.005","volume":"59","author":"Y Rongyu","year":"2023","unstructured":"Rongyu, Y., Wei, L., Yuming, C., Hong, H., Wenjie, W., Song, Y.: A siamese network-based image matching algorithm. J. Nanjing Uni. Natural Sci. 59(05), 770\u2013776 (2023). https:\/\/doi.org\/10.13232\/j.cnki.jnju.2023.05.005","journal-title":"J. Nanjing Uni. Natural Sci."},{"key":"3867_CR17","doi-asserted-by":"publisher","first-page":"2979","DOI":"10.1007\/s11042-023-15750-x","volume":"83","author":"HK Singh","year":"2024","unstructured":"Singh, H.K., Singh, A.K.: Digital image watermarking using deep learning. Multimed. Tools Appl. 83, 2979\u20132994 (2024). https:\/\/doi.org\/10.1007\/s11042-023-15750-x","journal-title":"Multimed. Tools Appl."},{"key":"3867_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119810","volume":"653","author":"SA Nawaz","year":"2024","unstructured":"Nawaz, S.A., Li, J., Bhatti, U.A., Shoukat, M.U., Li, D., Raza, M.A.: Hybrid watermarking algorithm for medical images based on digital transformation and mobilenetv2. Inf. Sci. 653, 119810 (2024). https:\/\/doi.org\/10.1016\/j.ins.2023.119810","journal-title":"Inf. Sci."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-03867-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-03867-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-03867-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T01:03:05Z","timestamp":1743555785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-03867-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,18]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["3867"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-03867-5","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,2,18]]},"assertion":[{"value":"12 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"303"}}