{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T18:09:39Z","timestamp":1778782179991,"version":"3.51.4"},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.engappai.2026.114503","type":"journal-article","created":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:26:25Z","timestamp":1774873585000},"page":"114503","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A secure deep image watermarking model using patch-based embedding and conditional mechanism"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9320-8398","authenticated-orcid":false,"given":"Ako","family":"Bartani","sequence":"first","affiliation":[]},{"given":"Sahar","family":"Karimi","sequence":"additional","affiliation":[]},{"given":"Hoshang","family":"Qasim Awla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0300-9233","authenticated-orcid":false,"given":"Fardin","family":"Akhlaghian Tab","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2026.114503_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2019.113157","article-title":"ReDMark: Framework for residual diffusion watermarking based on deep networks","volume":"146","author":"Ahmadi","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.engappai.2026.114503_b2","doi-asserted-by":"crossref","first-page":"155","DOI":"10.3390\/jimaging8060155","article-title":"Digital watermarking as an adversarial attack on medical image analysis with deep learning","volume":"8","author":"Apostolidis","year":"2022","journal-title":"J. Imaging"},{"key":"10.1016\/j.engappai.2026.114503_b3","first-page":"1","article-title":"Robust deep image-watermarking method by a modified Siamese network","author":"Bartani","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.engappai.2026.114503_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.169319","article-title":"Robust and reversible color image watermarking based on DFT in the spatial domain","volume":"262","author":"Cao","year":"2022","journal-title":"Optik"},{"key":"10.1016\/j.engappai.2026.114503_b5","doi-asserted-by":"crossref","unstructured":"Cao, X., Jia, J., Gong, N.Z., 2021. IPGuard: Protecting intellectual property of deep neural networks via fingerprinting the classification boundary. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. pp. 14\u201325.","DOI":"10.1145\/3433210.3437526"},{"key":"10.1016\/j.engappai.2026.114503_b6","article-title":"High-frequency matters: Attack and defense for image-processing model watermarking","author":"Chen","year":"2024","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.engappai.2026.114503_b7","series-title":"Next Generation Internet Things: Proceedings ICNGIoT 2022","first-page":"455","article-title":"Digital image watermarking techniques using machine learning\u2014A comprehensive survey","author":"Das","year":"2022"},{"key":"10.1016\/j.engappai.2026.114503_b8","first-page":"1","article-title":"A recent survey on image watermarking using scaling factor techniques for copyright protection","author":"Ernawan","year":"2023","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.engappai.2026.114503_b9","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","article-title":"The pascal visual object classes (voc) challenge","volume":"88","author":"Everingham","year":"2010","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.engappai.2026.114503_b10","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TCSVT.2020.3009349","article-title":"Deep template-based watermarking","volume":"31","author":"Fang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.engappai.2026.114503_b11","series-title":"2022 IEEE International Workshop on Information Forensics and Security","first-page":"1","article-title":"Supervised gan watermarking for intellectual property protection","author":"Fei","year":"2022"},{"key":"10.1016\/j.engappai.2026.114503_b12","series-title":"2019 7th International Workshop on Biometrics and Forensics","first-page":"1","article-title":"A robust image zero-watermarking using convolutional neural networks","author":"Fierro-Radilla","year":"2019"},{"key":"10.1016\/j.engappai.2026.114503_b13","doi-asserted-by":"crossref","first-page":"38589","DOI":"10.1007\/s11042-023-15048-y","article-title":"A robust document image watermarking scheme using deep neural network","volume":"82","author":"Ge","year":"2023","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.engappai.2026.114503_b14","series-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"10.1016\/j.engappai.2026.114503_b15","series-title":"Axial attention in multidimensional transformers","author":"Ho","year":"2019"},{"key":"10.1016\/j.engappai.2026.114503_b16","article-title":"ARWGAN: Attention-guided robust image watermarking model based on GAN","author":"Huang","year":"2023","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10.1016\/j.engappai.2026.114503_b17","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J.-Y., Zhou, T., Efros, A.A., 2017. Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 1125\u20131134.","DOI":"10.1109\/CVPR.2017.632"},{"key":"10.1016\/j.engappai.2026.114503_b18","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1016\/j.cell.2018.02.010","article-title":"Identifying medical diagnoses and treatable diseases by image-based deep learning","volume":"172","author":"Kermany","year":"2018","journal-title":"Cell"},{"key":"10.1016\/j.engappai.2026.114503_b19","doi-asserted-by":"crossref","first-page":"5427","DOI":"10.3390\/s20185427","article-title":"Convolutional neural network architecture for recovering watermark synchronization","volume":"20","author":"Kim","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2026.114503_b20","doi-asserted-by":"crossref","first-page":"6854","DOI":"10.3390\/app10196854","article-title":"Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark","volume":"10","author":"Lee","year":"2020","journal-title":"Appl. Sci."},{"key":"10.1016\/j.engappai.2026.114503_b21","article-title":"SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning","author":"Li","year":"2024","journal-title":"Neural Netw."},{"key":"10.1016\/j.engappai.2026.114503_b22","series-title":"Computer Vision\u2013ECCV 2014: 13th European Conference","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"Lin","year":"2014"},{"key":"10.1016\/j.engappai.2026.114503_b23","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhan, R., Chang, H., Yang, F., Milanfar, P., 2020. Distortion agnostic deep watermarking. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 13548\u201313557.","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"10.1016\/j.engappai.2026.114503_b24","series-title":"2024 IEEE International Conference on Consumer Electronics","first-page":"1","article-title":"Blind deep-learning-based image watermarking robust against geometric transformations","author":"Mareen","year":"2024"},{"key":"10.1016\/j.engappai.2026.114503_b25","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","article-title":"Finding robust domain from attacks: A learning framework for blind watermarking","volume":"337","author":"Mun","year":"2019","journal-title":"Neurocomputing"},{"key":"10.1016\/j.engappai.2026.114503_b26","doi-asserted-by":"crossref","unstructured":"Ong, D.S., Chan, C.S., Ng, K.W., Fan, L., Yang, Q., 2021. Protecting intellectual property of generative adversarial networks from ambiguity attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 3630\u20133639.","DOI":"10.1109\/CVPR46437.2021.00363"},{"key":"10.1016\/j.engappai.2026.114503_b27","doi-asserted-by":"crossref","unstructured":"Pan, X., Ge, C., Lu, R., Song, S., Chen, G., Huang, Z., Huang, G., 2022. On the integration of self-attention and convolution. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 815\u2013825.","DOI":"10.1109\/CVPR52688.2022.00089"},{"key":"10.1016\/j.engappai.2026.114503_b28","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2025.3530691","article-title":"ModelShield: Adaptive and robust watermark against model extraction attack","author":"Pang","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.engappai.2026.114503_b29","doi-asserted-by":"crossref","unstructured":"Peng, Z., Li, S., Chen, G., Zhang, C., Zhu, H., Xue, M., 2022. Fingerprinting deep neural networks globally via universal adversarial perturbations. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 13430\u201313439.","DOI":"10.1109\/CVPR52688.2022.01307"},{"key":"10.1016\/j.engappai.2026.114503_b30","series-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom","first-page":"62","article-title":"Robust spatial-spread deep neural image watermarking","author":"Plata","year":"2020"},{"key":"10.1016\/j.engappai.2026.114503_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103102","article-title":"A novel model watermarking for protecting generative adversarial network","volume":"127","author":"Qiao","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.engappai.2026.114503_b32","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-021-1186-y","article-title":"Intellectual property protection for deep semantic segmentation models","volume":"17","author":"Ruan","year":"2023","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.engappai.2026.114503_b33","series-title":"2023 International Conference on Networking and Network Applications","first-page":"568","article-title":"A deep model intellectual property protection method supporting public verification","author":"Shen","year":"2023"},{"key":"10.1016\/j.engappai.2026.114503_b34","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","article-title":"Robust color image watermarking technique in the spatial domain","volume":"22","author":"Su","year":"2018","journal-title":"Soft Comput."},{"key":"10.1016\/j.engappai.2026.114503_b35","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/9880038","article-title":"Deep image watermarking to JPEG compression based on mixed-frequency channel attention","volume":"2022","author":"Tan","year":"2022","journal-title":"Comput. Math. Methods Med."},{"key":"10.1016\/j.engappai.2026.114503_b36","first-page":"2021","article-title":"Convolutional neural network-based image watermarking using discrete wavelet transform","volume":"15","author":"Tavakoli","year":"2023","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.engappai.2026.114503_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2024.104684","article-title":"Enhancing image watermarking efficiency through advanced deep learning: A novel approach with modified Res-Ception blocks and practical applications in modern scenarios","volume":"154","author":"Trivedi","year":"2024","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.engappai.2026.114503_b38","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., Satoh, S., 2017. Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval. pp. 269\u2013277.","DOI":"10.1145\/3078971.3078974"},{"key":"10.1016\/j.engappai.2026.114503_b39","series-title":"The Caltech-Ucsd Birds-200\u20132011 Dataset","author":"Wah","year":"2011"},{"key":"10.1016\/j.engappai.2026.114503_b40","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.170371","article-title":"Cross-scale feature fusion-based JND estimation for robust image watermarking in quaternion DWT domain","volume":"272","author":"Wang","year":"2023","journal-title":"Optik"},{"key":"10.1016\/j.engappai.2026.114503_b41","series-title":"Romark: A robust watermarking system using adversarial training","author":"Wen","year":"2019"},{"key":"10.1016\/j.engappai.2026.114503_b42","doi-asserted-by":"crossref","unstructured":"Wengrowski, E., Dana, K., 2019. Light field messaging with deep photographic steganography. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 1515\u20131524.","DOI":"10.1109\/CVPR.2019.00161"},{"key":"10.1016\/j.engappai.2026.114503_b43","article-title":"AdvParams: An active DNN intellectual property protection technique via adversarial perturbation based parameter encryption","author":"Xue","year":"2022","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.engappai.2026.114503_b44","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s40747-024-01723-6","article-title":"Dual medical image watermarking using SRU-enhanced network and EICC chaotic map","volume":"11","author":"Yan","year":"2025","journal-title":"Complex & Intell. Syst."},{"key":"10.1016\/j.engappai.2026.114503_b45","doi-asserted-by":"crossref","DOI":"10.1109\/TCSVT.2025.3543969","article-title":"Robust image watermarking using bidirection-interactive and context-aware networks","author":"Yin","year":"2025","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.engappai.2026.114503_b46","series-title":"2023 IEEE International Conference on Multimedia and Expo","first-page":"43","article-title":"Making adversarial attack imperceptible in frequency domain: A watermark-based framework","author":"Zhang","year":"2023"},{"key":"10.1016\/j.engappai.2026.114503_b47","first-page":"4005","article-title":"Deep model intellectual property protection via deep watermarking","volume":"44","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.engappai.2026.114503_b48","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M.P., Huang, H., Molloy, I., 2018. Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security. pp. 159\u2013172.","DOI":"10.1145\/3196494.3196550"},{"key":"10.1016\/j.engappai.2026.114503_b49","article-title":"Embedding guided end-to-end framework for robust image watermarking","volume":"2022","author":"Zhang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.engappai.2026.114503_b50","doi-asserted-by":"crossref","unstructured":"Zhong, H., Chang, J., Yang, Z., Wu, T., Mahawaga Arachchige, P.C., Pathmabandu, C., Xue, M., 2023. Copyright protection and accountability of generative ai: Attack, watermarking and attribution. In: Companion Proceedings of the ACM Web Conference 2023. pp. 94\u201398.","DOI":"10.1145\/3543873.3587321"},{"key":"10.1016\/j.engappai.2026.114503_b51","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.engappai.2026.114503_b52","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2024.104238","article-title":"Towards robust image watermarking via random distortion assignment based meta-learning","volume":"103","author":"Zhou","year":"2024","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.engappai.2026.114503_b53","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L., 2018. Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision. ECCV, pp. 657\u2013672.","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626007840?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626007840?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T17:17:28Z","timestamp":1778779048000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197626007840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":53,"alternative-id":["S0952197626007840"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114503","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A secure deep image watermarking model using patch-based embedding and conditional mechanism","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114503","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114503"}}