{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T16:00:08Z","timestamp":1777305608209,"version":"3.51.4"},"reference-count":210,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2468207"],"award-info":[{"award-number":["U2468207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Provincial Science and Technology Support Program","doi-asserted-by":"publisher","award":["2024NSFTD0036"],"award-info":[{"award-number":["2024NSFTD0036"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Fusion"],"published-print":{"date-parts":[[2026,9]]},"DOI":"10.1016\/j.inffus.2026.104311","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:26:15Z","timestamp":1774023975000},"page":"104311","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Securing digital assets in intelligent railways: A survey of watermarking techniques, challenges, and prospects"],"prefix":"10.1016","volume":"133","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7022-9212","authenticated-orcid":false,"given":"Zhouqiao","family":"He","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2011-6791","authenticated-orcid":false,"given":"Zijie","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0587-380X","authenticated-orcid":false,"given":"Jie","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6949-3673","authenticated-orcid":false,"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0854-5664","authenticated-orcid":false,"given":"Shuo","family":"Ji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2460-0858","authenticated-orcid":false,"given":"Qikai","family":"Chu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8035-5255","authenticated-orcid":false,"given":"Weichao","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2952-3978","authenticated-orcid":false,"given":"Ding","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7780-104X","authenticated-orcid":false,"given":"Tianrui","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.inffus.2026.104311_bib0001","article-title":"A systematic review of generative adversarial networks for traffic state prediction: overview, taxonomy, and future prospects","author":"Li","year":"2025","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.inffus.2026.104311_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102922","article-title":"AI-Driven fusion with cybersecurity: exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms\u2013A comprehensive review","author":"Ali","year":"2025","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.inffus.2026.104311_bib0003","article-title":"Securecipher: an instantaneous synchronization stream encryption system for insider threat data leakage protection","volume":"254","author":"Montano","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2025.103801","article-title":"Diffmark: diffusion-based robust watermark against deepfakes","volume":"127","author":"Sun","year":"2026","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.inffus.2026.104311_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122547","article-title":"Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm","volume":"241","author":"Shen","year":"2024","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0006","first-page":"1","article-title":"A survey of text watermarking in the era of large language models","volume":"57","author":"Liu","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"10.1016\/j.inffus.2026.104311_bib0007","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10462-025-11222-w","article-title":"Building intelligence identification system via large language model watermarking: a survey and beyond","volume":"58","author":"Wang","year":"2025","journal-title":"Artif. Intell. Rev."},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0008","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3694965","article-title":"Image steganography approaches and their detection strategies: a survey","volume":"57","author":"Kombrink","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"7","key":"10.1016\/j.inffus.2026.104311_bib0009","doi-asserted-by":"crossref","first-page":"4339","DOI":"10.1007\/s00034-024-02651-z","article-title":"Deep learning-based watermarking techniques challenges: a review of current and future trends","volume":"43","author":"Ben Jabra","year":"2024","journal-title":"Circuits, Syst., Signal Process."},{"issue":"7","key":"10.1016\/j.inffus.2026.104311_bib0010","doi-asserted-by":"crossref","first-page":"6764","DOI":"10.1109\/TITS.2023.3254442","article-title":"Railway cyber-security in the era of interconnected systems: a survey","volume":"24","author":"Soderi","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"11","key":"10.1016\/j.inffus.2026.104311_bib0011","doi-asserted-by":"crossref","first-page":"15314","DOI":"10.1109\/TITS.2024.3419988","article-title":"A comprehensive survey and tutorial on smart vehicles: emerging technologies, security issues, and solutions using machine learning","volume":"25","author":"Ahmad","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0012","doi-asserted-by":"crossref","first-page":"2182","DOI":"10.1109\/TITS.2023.3319135","article-title":"Machine learning in urban rail transit systems: a survey","volume":"25","author":"Zhu","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0013","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1146\/annurev-psych-010418-102803","article-title":"How to do a systematic review: a best practice guide for conducting and reporting narrative reviews, meta-analyses, and meta-syntheses","volume":"70","author":"Siddaway","year":"2019","journal-title":"Annu. Rev. Psychol."},{"key":"10.1016\/j.inffus.2026.104311_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2025.105240","article-title":"Fare system selection and line planning for new suburban rail lines considering the supply\u2013demand interactions","volume":"178","author":"Wang","year":"2025","journal-title":"Transport. Res. Part C: Emerg. Technol."},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0015","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1111\/mice.13151","article-title":"Biobjective optimization for railway alignment fine-grained designs with parallel existing railways","volume":"39","author":"Gao","year":"2024","journal-title":"Comput.-Aided Civ. Infrastruct. Eng."},{"key":"10.1016\/j.inffus.2026.104311_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.autcon.2024.105840","article-title":"Decision support for railway track facility management using openBIM","volume":"168","author":"Liu","year":"2024","journal-title":"Autom. Constr."},{"key":"10.1016\/j.inffus.2026.104311_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2025.105071","article-title":"Integrated optimization of demand-oriented timetabling and rolling stock circulation planning with flexible train compositions and multiple service routes on urban rail lines","volume":"174","author":"Bao","year":"2025","journal-title":"Transport. Res. Part C: Emerg. Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2024.104526","article-title":"Integrated robust optimization of maintenance windows and train timetables using ADMM-driven and nested simulation heuristic algorithm","volume":"160","author":"Yang","year":"2024","journal-title":"Transport. Res. Part C: Emerg. Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2025.105001","article-title":"Rolling stock rescheduling in high-speed railway networks via a nested benders decomposition approach","volume":"171","author":"Li","year":"2025","journal-title":"Transport. Res. Part C: Emerg. Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2023.109781","article-title":"Causative analysis of freight railway accident in specific scenes using a data-driven bayesian network","volume":"243","author":"Chen","year":"2024","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.inffus.2026.104311_bib0021","series-title":"2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC)","first-page":"5603","article-title":"A review of intelligent infrastructure surveillance to support safe autonomy in smart-railways","author":"Pappaterra","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.108167","article-title":"An unsupervised anomaly detection framework for onboard monitoring of railway track geometrical defects using one-class support vector machine","volume":"133","author":"Ghiasi","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"18","key":"10.1016\/j.inffus.2026.104311_bib0023","doi-asserted-by":"crossref","first-page":"29728","DOI":"10.1109\/JIOT.2024.3405356","article-title":"Multidimensional edge perception model for rail vehicle operational states based on artificial intelligence of things","volume":"11","author":"Zhou","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.inffus.2026.104311_bib0024","doi-asserted-by":"crossref","first-page":"17979","DOI":"10.1109\/TITS.2024.3404504","article-title":"Hybrid decision-making for intelligent high-speed train operation: a boundary constraint and pre-evaluation reinforcement learning approach","volume":"25","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.inffus.2026.104311_bib0025","series-title":"Proceedings of the 32nd ACM International Conference on Multimedia","first-page":"10124","article-title":"Reliable model watermarking: defending against theft without compromising on evasion","author":"Zhu","year":"2024"},{"key":"10.1016\/j.inffus.2026.104311_bib0026","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"24357","article-title":"Data poisoning based backdoor attacks to contrastive learning","author":"Zhang","year":"2024"},{"key":"10.1016\/j.inffus.2026.104311_bib0027","series-title":"Proceedings of 1st International Conference on Image Processing","first-page":"86","article-title":"A digital watermark","volume":"2","author":"Van Schyndel","year":"1994"},{"key":"10.1016\/j.inffus.2026.104311_bib0028","series-title":"2008 International Symposium on Ubiquitous Multimedia Computing","first-page":"130","article-title":"A new LSB based digital watermarking scheme with random mapping function","author":"Lee","year":"2008"},{"key":"10.1016\/j.inffus.2026.104311_bib0029","series-title":"2010 International Conference on Computer Applications and Industrial Electronics","first-page":"155","article-title":"Digital watermarking algorithm using LSB","author":"Bamatraf","year":"2010"},{"issue":"3.4","key":"10.1016\/j.inffus.2026.104311_bib0030","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst. J."},{"issue":"5","key":"10.1016\/j.inffus.2026.104311_bib0031","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/83.918569","article-title":"Rotation, scale, and translation resilient watermarking for images","volume":"10","author":"Lin","year":"2001","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0032","series-title":"International Conference on Advanced Informatics for Computing Research","first-page":"431","article-title":"A recent survey of DCT based digital image watermarking theories and techniques: a review","author":"Singh","year":"2019"},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0033","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"A DCT-domain system for robust image watermarking","volume":"66","author":"Barni","year":"1998","journal-title":"Signal Process."},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0034","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1186\/s13677-023-00468-w","article-title":"Digital image watermarking using discrete cosine transformation based linear modulation","volume":"12","author":"Alomoush","year":"2023","journal-title":"J. Cloud Comput."},{"key":"10.1016\/j.inffus.2026.104311_bib0035","doi-asserted-by":"crossref","first-page":"41261","DOI":"10.1109\/ACCESS.2019.2904272","article-title":"Orientation-aware saliency guided JND model for robust image watermarking","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.inffus.2026.104311_bib0036","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","article-title":"Improved wavelet-based watermarking through pixel-wise masking","volume":"10","author":"Barni","year":"2001","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0037","doi-asserted-by":"crossref","first-page":"5789","DOI":"10.32604\/cmc.2025.068885","article-title":"Secure and invisible dual watermarking for digital content based on optimized octonion moments and chaotic metaheuristics","volume":"85","author":"El Maloufy","year":"2025","journal-title":"Comput., Mater., Continua"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0038","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0039","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-69511-3","article-title":"An improved reversible watermarking scheme using embedding optimization and quaternion moments","volume":"14","author":"Tahiri","year":"2024","journal-title":"Sci. Rep."},{"key":"10.1016\/j.inffus.2026.104311_bib0040","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.sigpro.2013.06.025","article-title":"Color image blind watermarking scheme based on QR decomposition","volume":"94","author":"Su","year":"2014","journal-title":"Signal Process."},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0041","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.eswa.2007.12.046","article-title":"Image watermarking scheme using nonnegative matrix factorization and wavelet transform","volume":"36","author":"Ouhsain","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0042","series-title":"18th International Conference on Pattern Recognition (ICPR\u201906)","first-page":"861","article-title":"Digital watermarking in contourlet domain","volume":"3","author":"Jayalakshmi","year":"2006"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0043","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TCI.2018.2794065","article-title":"Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory","volume":"4","author":"Ahmaderaghi","year":"2018","journal-title":"IEEE Trans. Comput. Imaging"},{"issue":"9","key":"10.1016\/j.inffus.2026.104311_bib0044","doi-asserted-by":"crossref","first-page":"740","DOI":"10.3844\/jcssp.2007.740.746","article-title":"Combined DWT-DCT digital image watermarking","volume":"3","author":"Al-Haj","year":"2007","journal-title":"J. Comput. Sci."},{"issue":"5","key":"10.1016\/j.inffus.2026.104311_bib0045","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1016\/j.csi.2008.09.031","article-title":"A new robust reference watermarking scheme based on DWT-SVD","volume":"31","author":"Bhatnagar","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.inffus.2026.104311_bib0046","series-title":"International Conference on Digital Technologies and Applications","first-page":"441","article-title":"Optimal color image watermarking based on DWT-SVD using an arithmetic optimization algorithm","author":"Bencherqui","year":"2023"},{"issue":"11, Num. 3","key":"10.1016\/j.inffus.2026.104311_bib0047","doi-asserted-by":"crossref","first-page":"848","DOI":"10.23939\/mmc2024.03.848","article-title":"A watermarking scheme for color images that achieves optimality using the transit search algorithm","author":"Tamimi","year":"2024","journal-title":"Math. Model. Comput."},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0048","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s40009-014-0241-8","article-title":"Hybrid technique for robust and imperceptible image watermarking in DWT\u2013DCT\u2013SVD domain","volume":"37","author":"Singh","year":"2014","journal-title":"Natl. Acad. Sci. Lett."},{"issue":"12","key":"10.1016\/j.inffus.2026.104311_bib0049","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0050","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","article-title":"Rotation, scale and translation invariant spread spectrum digital image watermarking","volume":"66","author":"Ruanaidh","year":"1998","journal-title":"Signal Process."},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0051","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TSP.2003.809385","article-title":"Improved spread spectrum: a new modulation technique for robust watermarking","volume":"51","author":"Malvar","year":"2003","journal-title":"IEEE Trans. Signal Process."},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0052","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","article-title":"Quantization index modulation: a class of provably good methods for digital watermarking and information embedding","volume":"47","author":"Chen","year":"2002","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0053","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","article-title":"Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking","volume":"2","author":"Li","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.inffus.2026.104311_bib0054","series-title":"Proceedings.(ICASSP\u201905). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005.","first-page":"ii","article-title":"Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions","volume":"2","author":"Ourique","year":"2005"},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0055","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1049\/el:20000309","article-title":"Digital image watermarking technique based on vector quantisation","volume":"36","author":"Lu","year":"2000","journal-title":"Electron. Lett."},{"issue":"14","key":"10.1016\/j.inffus.2026.104311_bib0056","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1049\/el:20000876","article-title":"VQ-Based digital image watermarking method","volume":"36","author":"Lu","year":"2000","journal-title":"Electron. Lett."},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0057","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1109\/TIP.2005.847324","article-title":"Multipurpose image watermarking algorithm based on multistage vector quantization","volume":"14","author":"Lu","year":"2005","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0058","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3390\/fi9020013","article-title":"Feature-based image watermarking algorithm using SVD and APBT for copyright protection","volume":"9","author":"Zhang","year":"2017","journal-title":"Future Internet"},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0059","doi-asserted-by":"crossref","first-page":"2188","DOI":"10.1109\/TNSE.2022.3157867","article-title":"Image copyright protection based on blockchain and zero-watermark","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Trans. Network Sci. Eng."},{"key":"10.1016\/j.inffus.2026.104311_bib0060","series-title":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","first-page":"1","article-title":"Are deep neural networks good for blind image watermarking?","author":"Vukoti\u0107","year":"2018"},{"key":"10.1016\/j.inffus.2026.104311_bib0061","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.inffus.2026.104311_bib0062","unstructured":"S.-M. Mun, S.-H. Nam, H.-U. Jang, D. Kim, H.-K. Lee, A robust blind watermarking using convolutional neural network, arXiv: 1704.03248(2017)."},{"issue":"11","key":"10.1016\/j.inffus.2026.104311_bib0063","doi-asserted-by":"crossref","first-page":"131","DOI":"10.23919\/JCC.2020.11.012","article-title":"Robust image watermarking based on generative adversarial network","volume":"17","author":"Hao","year":"2020","journal-title":"China Commun."},{"key":"10.1016\/j.inffus.2026.104311_bib0064","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.126853","article-title":"GAN-Based watermarking for encrypted images in healthcare scenarios","volume":"560","author":"Singh","year":"2023","journal-title":"Neurocomputing"},{"key":"10.1016\/j.inffus.2026.104311_bib0065","first-page":"1","article-title":"ARWGAN: Attention-guided robust image watermarking model based on GAN","volume":"72","author":"Huang","year":"2023","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10.1016\/j.inffus.2026.104311_bib0066","series-title":"Proceedings of the 30th ACM International Conference on Multimedia","first-page":"1532","article-title":"Towards blind watermarking: combining invertible and non-invertible mechanisms","author":"Ma","year":"2022"},{"key":"10.1016\/j.inffus.2026.104311_bib0067","series-title":"2024 36th Chinese Control and Decision Conference (CCDC)","first-page":"1304","article-title":"A robustness improved watermarking scheme based on invertible neural network","author":"Xu","year":"2024"},{"key":"10.1016\/j.inffus.2026.104311_bib0068","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122830","article-title":"A comprehensive review on optimization-based image watermarking techniques for copyright protection","volume":"242","author":"Awasthi","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0069","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.chemolab.2015.08.020","article-title":"Particle swarm optimization (PSO). a tutorial","volume":"149","author":"Marini","year":"2015","journal-title":"Chemometr. Intell. Lab. Syst."},{"issue":"16","key":"10.1016\/j.inffus.2026.104311_bib0070","doi-asserted-by":"crossref","first-page":"22001","DOI":"10.1007\/s11042-021-11246-8","article-title":"Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD and PSO in wavelet domain","volume":"81","author":"Laxmanika","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0071","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2021.166954","article-title":"A robust and secure image watermarking scheme using SURF and improved artificial bee colony algorithm in DWT domain","volume":"242","author":"Gao","year":"2021","journal-title":"Optik"},{"key":"10.1016\/j.inffus.2026.104311_bib0072","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","article-title":"A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection","volume":"417","author":"Makbol","year":"2017","journal-title":"Inf. Sci."},{"issue":"25","key":"10.1016\/j.inffus.2026.104311_bib0073","doi-asserted-by":"crossref","first-page":"18657","DOI":"10.1007\/s11042-020-08634-x","article-title":"An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain","volume":"79","author":"Mehta","year":"2020","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"10.1016\/j.inffus.2026.104311_bib0074","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1016\/j.optcom.2008.11.024","article-title":"An optimal robust digital image watermarking based on SVD using differential evolution algorithm","volume":"282","author":"Aslantas","year":"2009","journal-title":"Opt. Commun."},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0075","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1109\/TSP.2004.839901","article-title":"Multiple watermarks for stereo audio signals using phase-modulation techniques","volume":"53","author":"Takahashi","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0076","series-title":"International Workshop on Information Hiding","first-page":"102","article-title":"A phase modulation audio watermarking technique","author":"Arnold","year":"2009"},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0077","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s11042-007-0133-8","article-title":"Inaudible watermarking via phase manipulation of random frequencies","volume":"35","author":"Liew","year":"2007","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0078","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TIFS.2013.2293952","article-title":"A phase-based audio watermarking system robust to acoustic path propagation","volume":"9","author":"Arnold","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.inffus.2026.104311_bib0079","series-title":"2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)","first-page":"343","article-title":"Audio watermarking method based on phase-shifting having robustness against band-pass filtering attacks","author":"Sakai","year":"2018"},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0080","article-title":"Modified phase coding audio watermarking resistant to signal attacks","volume":"92","author":"Mohammed","year":"2014","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0081","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1587\/transinf.2014MUL0003","article-title":"Sound quality evaluation for audio watermarking based on phase shift keying using BCH code","volume":"98","author":"Murata","year":"2015","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.inffus.2026.104311_bib0082","series-title":"2015 23rd European Signal Processing Conference (EUSIPCO)","first-page":"2276","article-title":"Robust and reliable audio watermarking based on dynamic phase coding and error control coding","author":"Ngo","year":"2015"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0083","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1587\/transinf.2015MUP0019","article-title":"Method of audio watermarking based on adaptive phase modulation","volume":"99","author":"Ngo","year":"2016","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.inffus.2026.104311_bib0084","series-title":"ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"2700","article-title":"Synchronous multi-bit audio watermarking based on phase shifting","author":"Wang","year":"2021"},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0085","first-page":"1231","article-title":"An improved phase coding-Based watermarking algorithm for speech perceptual hashing authentication","volume":"6","author":"Zhang","year":"2015","journal-title":"J. Inf. Hiding Multim. Signal Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0086","series-title":"Wireless Communication and Sensor Network: Proceedings of the International Conference on Wireless Communication and Sensor Network (WCSN 2015)","first-page":"396","article-title":"An audio reversible watermarking algorithm based on improved phase coding","author":"Zhang","year":"2016"},{"key":"10.1016\/j.inffus.2026.104311_bib0087","series-title":"International Workshop on Information Hiding","first-page":"295","article-title":"Echo hiding","author":"Gruhl","year":"1996"},{"key":"10.1016\/j.inffus.2026.104311_bib0088","series-title":"International Workshop on Digital Watermarking","first-page":"456","article-title":"Modification of polar echo kernel for performance improvement of audio watermarking","author":"Kim","year":"2003"},{"issue":"8","key":"10.1016\/j.inffus.2026.104311_bib0089","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/TCSVT.2003.815950","article-title":"A novel echo-hiding scheme with backward and forward kernels","volume":"13","author":"Kim","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0090","series-title":"2002 IEEE International Conference on Acoustics, Speech, and Signal Processing","first-page":"II","article-title":"Time-spread echo method for digital audio watermarking using PN sequences","volume":"2","author":"Ko","year":"2002"},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0091","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TASLP.2014.2387385","article-title":"Time-spread echo-based audio watermarking with optimized imperceptibility and robustness","volume":"23","author":"Hua","year":"2015","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0092","series-title":"2011 International Conference on Wireless Communications and Signal Processing (WCSP)","first-page":"1","article-title":"Researches on echo kernels of audio digital watermarking technology based on echo hiding","author":"Cao","year":"2011"},{"key":"10.1016\/j.inffus.2026.104311_bib0093","series-title":"International Workshop on Digital Watermarking","first-page":"447","article-title":"Echo watermarking in sub-band domain","author":"Cho","year":"2003"},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0094","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1049\/iet-spr.2019.0376","article-title":"Secure echo-hiding audio watermarking method based on improved PN sequence and robust principal component analysis","volume":"14","author":"Wang","year":"2020","journal-title":"IET Signal Proc."},{"key":"10.1016\/j.inffus.2026.104311_bib0095","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/TASLP.2020.3013785","article-title":"Multi-subspace echo hiding based on time-frequency similarities of audio signals","volume":"28","author":"Wang","year":"2020","journal-title":"IEEE\/ACM Trans. Audio, Speech, Lang. Process."},{"issue":"9","key":"10.1016\/j.inffus.2026.104311_bib0096","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/s11128-022-03657-9","article-title":"Quantum reversible circuits for audio watermarking based on echo hiding technique","volume":"21","author":"Velayatipour","year":"2022","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0097","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/s00607-025-01422-1","article-title":"Towards secure quantum communication: a novel quantum audio watermarking based on bipolar echo hiding","volume":"107","author":"Velayatipour","year":"2025","journal-title":"Computing"},{"key":"10.1016\/j.inffus.2026.104311_bib0098","doi-asserted-by":"crossref","DOI":"10.1109\/TCSVT.2024.3448502","article-title":"Automatic, robust and blind video watermarking resisting camera recording","author":"Lin","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"10.1016\/j.inffus.2026.104311_bib0099","doi-asserted-by":"crossref","first-page":"7342","DOI":"10.1109\/TCSVT.2023.3281618","article-title":"A fast method for robust video watermarking based on zernike moments","volume":"33","author":"Chen","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.110066","article-title":"An efficient video watermark method using blockchain","volume":"259","author":"Liu","year":"2023","journal-title":"Knowl. Based Syst."},{"issue":"10","key":"10.1016\/j.inffus.2026.104311_bib0101","doi-asserted-by":"crossref","first-page":"13113","DOI":"10.1007\/s12652-022-03771-7","article-title":"A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection","volume":"14","author":"Farri","year":"2023","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0102","doi-asserted-by":"crossref","first-page":"7860","DOI":"10.1038\/s41598-025-91192-9","article-title":"Robust and blind video watermarking against online sharing platforms","volume":"15","author":"Fu","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.inffus.2026.104311_bib0103","series-title":"Multimedia Systems and Applications VI","first-page":"233","article-title":"Real-time stereo image watermarking using discrete cosine transform and adaptive disparity maps","volume":"5241","author":"Hwang","year":"2003"},{"key":"10.1016\/j.inffus.2026.104311_bib0104","series-title":"Mathematics of Data\/Image Coding, Compression, and Encryption VI, with Applications","first-page":"196","article-title":"Stereo image watermarking scheme based on discrete wavelet transform and adaptive disparity estimation","volume":"5208","author":"Hwang","year":"2004"},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0105","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1007\/s11042-014-2433-0","article-title":"A robust watermarking method for stereo-pair images based on unmatched block bitmap","volume":"75","author":"Ou","year":"2016","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"10.1016\/j.inffus.2026.104311_bib0106","doi-asserted-by":"crossref","first-page":"7811","DOI":"10.1007\/s11042-017-4678-x","article-title":"A SIFT features based blind watermarking for DIBR 3D images","volume":"77","author":"Nam","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0107","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2020.06.066","article-title":"Robust and discriminative zero-watermark scheme based on invariant features and similarity-based retrieval to protect large-scale DIBR 3D videos","volume":"542","author":"Liu","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.inffus.2026.104311_bib0108","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130068","article-title":"An adversarial contrastive learning based cross-Modality zero-Watermarking scheme for DIBR 3D video copyright protection","volume":"637","author":"Liu","year":"2025","journal-title":"Neurocomputing"},{"issue":"1\u20132","key":"10.1016\/j.inffus.2026.104311_bib0109","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/S0923-5965(99)00026-0","article-title":"Scalable internet video using MPEG-4","volume":"15","author":"Radha","year":"1999","journal-title":"Signal Process. Image Commun."},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0110","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1049\/ecej:19950606","article-title":"MPEG-2 Video compression","volume":"7","author":"Tudor","year":"1995","journal-title":"Electron. Commun. Eng. J."},{"issue":"5","key":"10.1016\/j.inffus.2026.104311_bib0111","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.1109\/TIM.2005.855084","article-title":"An adaptive compressed MPEG-2 video watermarking scheme","volume":"54","author":"Biswas","year":"2005","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0112","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TMM.2004.840594","article-title":"Watermarking of MPEG-4 video objects","volume":"7","author":"Barni","year":"2005","journal-title":"IEEE Trans. Multimedia"},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0113","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TIP.2006.873476","article-title":"Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain","volume":"15","author":"Wang","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0114","series-title":"2008 International Multi-symposiums on Computer and Computational Sciences","first-page":"164","article-title":"Digital watermarking synchronization algorithm of mpeg-4 video","author":"Kezheng","year":"2008"},{"issue":"9","key":"10.1016\/j.inffus.2026.104311_bib0115","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","article-title":"An overview of digital video watermarking","volume":"28","author":"Asikuzzaman","year":"2017","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0116","series-title":"2010 8th International Conference on Communications","first-page":"477","article-title":"MPEG-4 AVC Robust video watermarking based on QIM and perceptual masking","author":"Belhaj","year":"2010"},{"issue":"8\u20139","key":"10.1016\/j.inffus.2026.104311_bib0117","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.image.2011.07.004","article-title":"A practical design of digital video watermarking in h. 264\/AVC for content authentication","volume":"26","author":"Su","year":"2011","journal-title":"Signal Process. Image Commun."},{"key":"10.1016\/j.inffus.2026.104311_bib0118","series-title":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","first-page":"865","article-title":"A hybrid watermarking scheme for h. 264\/AVC video","volume":"4","author":"Qiu","year":"2004"},{"key":"10.1016\/j.inffus.2026.104311_bib0119","series-title":"2011 Annual IEEE India Conference","first-page":"1","article-title":"Video watermarking based on motion vectors of h. 264","author":"Swaraja","year":"2011"},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0120","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TCSII.2006.886247","article-title":"Robust video watermarking of h. 264\/AVC","volume":"54","author":"Zhang","year":"2007","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"12","key":"10.1016\/j.inffus.2026.104311_bib0121","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","article-title":"Overview of the high efficiency video coding (HEVC) standard","volume":"22","author":"Sullivan","year":"2012","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.inffus.2026.104311_bib0122","series-title":"2015 Fifth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG)","first-page":"1","article-title":"A robust watermarking scheme against re-compression attack for h. 265\/HEVC","author":"Gaj","year":"2015"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0123","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3009910","article-title":"Drift-compensated robust watermarking algorithm for h. 265\/HEVC video stream","volume":"13","author":"Gaj","year":"2017","journal-title":"ACM Trans. Multimed. Comput., Commun., Appl. (TOMM)"},{"issue":"25","key":"10.1016\/j.inffus.2026.104311_bib0124","doi-asserted-by":"crossref","first-page":"18089","DOI":"10.1007\/s11042-019-08301-w","article-title":"Prediction mode based h. 265\/HEVC video watermarking resisting re-compression attack","volume":"79","author":"Gaj","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0125","series-title":"2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","first-page":"1","article-title":"A reversible watermarking algorithm for high efficiency video coding","author":"Cai","year":"2017"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0126","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3002178","article-title":"An efficient framework for compressed domain watermarking in p frames of high-efficiency video coding (HEVC)\u2013encoded video","volume":"13","author":"Dutta","year":"2017","journal-title":"ACM Trans. Multimed. Comput., Commun., Appl. (TOMM)"},{"key":"10.1016\/j.inffus.2026.104311_bib0127","unstructured":"K.A. Zhang, L. Xu, A. Cuesta-Infante, K. Veeramachaneni, Robust invisible video watermarking with attention, arXiv: 1909.01285(2019)."},{"key":"10.1016\/j.inffus.2026.104311_bib0128","article-title":"Dvmark: a deep multiscale framework for video watermarking","author":"Luo","year":"2023","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0129","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"8095","article-title":"A novel deep video watermarking framework with enhanced robustness to h. 264\/AVC compression","author":"Zhang","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0130","series-title":"2022 IEEE International Conference on e-Business Engineering (ICEBE)","first-page":"80","article-title":"Robust video watermarking based on deep neural network and curriculum learning","author":"Ke","year":"2022"},{"issue":"4","key":"10.1016\/j.inffus.2026.104311_bib0131","doi-asserted-by":"crossref","first-page":"6019","DOI":"10.1007\/s11042-020-09904-4","article-title":"A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain","volume":"80","author":"Gao","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0132","series-title":"VISIGRAPP (5: VISAPP)","first-page":"668","article-title":"A robust deep learning-Based video watermarking using mosaic generation","author":"Mansour","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0133","doi-asserted-by":"crossref","first-page":"7364","DOI":"10.1109\/TMM.2022.3221894","article-title":"RIVIE: Robust inherent video information embedding","volume":"25","author":"Jia","year":"2022","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.inffus.2026.104311_bib0134","series-title":"2023 International Conference on Culture-Oriented Science and Technology (CoST)","first-page":"192","article-title":"Itov: efficiently adapting deep learning-based image watermarking to video watermarking","author":"Ye","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0135","unstructured":"P. Fernandez, H. Elsahar, I.Z. Yalniz, A. Mourachko, Video seal: open and efficient video watermarking, arXiv: 2412.09492(2024)."},{"key":"10.1016\/j.inffus.2026.104311_bib0136","first-page":"422","article-title":"Survey on relational database watermarking techniques","volume":"11","author":"Alfagi","year":"2016","journal-title":"ARPN-JEAS"},{"key":"10.1016\/j.inffus.2026.104311_bib0137","series-title":"VLDB\u201902: Proceedings of the 28th International Conference on Very Large Databases","first-page":"155","article-title":"Watermarking relational databases","author":"Agrawal","year":"2002"},{"issue":"2","key":"10.1016\/j.inffus.2026.104311_bib0138","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","article-title":"Watermarking relational data: framework, algorithms and analysis","volume":"12","author":"Agrawal","year":"2003","journal-title":"VLDB J."},{"key":"10.1016\/j.inffus.2026.104311_bib0139","series-title":"2006 10th International Database Engineering and Applications Symposium (IDEAS\u201906)","first-page":"301","article-title":"Watermark based copyright protection of outsourced database","author":"Qin","year":"2006"},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0140","doi-asserted-by":"crossref","first-page":"2329","DOI":"10.1109\/TKDE.2023.3324932","article-title":"A robust database watermarking scheme that preserves statistical characteristics","volume":"36","author":"Ren","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.inffus.2026.104311_bib0141","unstructured":"J. Chen, W. Wang, C. Shi, L. Dong, Y. Li, X. Hu, Deep robust reversible watermarking, arXiv: 2503.02490(2025)."},{"key":"10.1016\/j.inffus.2026.104311_bib0142","doi-asserted-by":"crossref","first-page":"4114","DOI":"10.1109\/TIFS.2024.3372811","article-title":"A robust reversible watermarking scheme using attack-simulation-based adaptive normalization and embedding","volume":"19","author":"Tang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.inffus.2026.104311_bib0143","series-title":"Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826)","first-page":"1739","article-title":"Watermarking relational database using image","volume":"3","author":"Zhang","year":"2004"},{"key":"10.1016\/j.inffus.2026.104311_bib0144","series-title":"2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008)","first-page":"263","article-title":"Atbam: an arnold transform based method on watermarking relational data","author":"Wang","year":"2008"},{"key":"10.1016\/j.inffus.2026.104311_bib0145","series-title":"2009 International Conference on Measuring Technology and Mechatronics Automation","first-page":"425","article-title":"An image based algorithm for watermarking relational databases","volume":"1","author":"Hu","year":"2009"},{"key":"10.1016\/j.inffus.2026.104311_bib0146","series-title":"2008 International Symposiums on Information Processing","first-page":"603","article-title":"A speech based algorithm for watermarking relational databases","author":"Wang","year":"2008"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0147","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/02533839.2012.726041","article-title":"A novel blind reversible method for watermarking relational databases","volume":"36","author":"Farfoura","year":"2013","journal-title":"J. Chin. Inst. Eng."},{"key":"10.1016\/j.inffus.2026.104311_bib0148","series-title":"Proceedings. the Fourth International Conference on Computer and Information Technology","first-page":"946","article-title":"A new watermark mechanism for relational data","author":"Huang","year":"2004"},{"key":"10.1016\/j.inffus.2026.104311_bib0149","series-title":"2009 First International Workshop on Database Technology and Applications","first-page":"107","article-title":"A cluster-based watermarking technique for relational database","author":"Huang","year":"2009"},{"key":"10.1016\/j.inffus.2026.104311_bib0150","series-title":"ICSOFT (2)","first-page":"229","article-title":"A distortion free watermark framework for relational databases","author":"Bhattacharya","year":"2009"},{"key":"10.1016\/j.inffus.2026.104311_bib0151","series-title":"International Conference on Information Systems Security","first-page":"252","article-title":"A generic distortion free watermarking technique for relational databases","author":"Bhattacharya","year":"2009"},{"key":"10.1016\/j.inffus.2026.104311_bib0152","series-title":"International Conference on Software and Data Technologies","first-page":"205","article-title":"Distortion-Free authentication watermarking","author":"Bhattacharya","year":"2010"},{"key":"10.1016\/j.inffus.2026.104311_bib0153","series-title":"Proceedings of the 46th Annual ACM Southeast Conference","first-page":"127","article-title":"A new watermarking approach for relational data","author":"Pournaghshband","year":"2008"},{"key":"10.1016\/j.inffus.2026.104311_bib0154","series-title":"2008 Eighth International Conference on Intelligent Systems Design and Applications","first-page":"403","article-title":"Tamper detection of relational database based on SVR predictive difference","volume":"3","author":"Wu","year":"2008"},{"issue":"9","key":"10.1016\/j.inffus.2026.104311_bib0155","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.17706\/jcp.13.9.1053-1066","article-title":"Distortion free database watermarking system based on intelligent mechanism for content integrity and ownership control","volume":"13","author":"Darwish","year":"2018","journal-title":"J. Comput."},{"key":"10.1016\/j.inffus.2026.104311_bib0156","series-title":"International Conference on Advanced Machine Learning Technologies and Applications","first-page":"532","article-title":"A novel watermarking approach for data integrity and non-repudiation in rational databases","author":"Zawawi","year":"2012"},{"issue":"7","key":"10.1016\/j.inffus.2026.104311_bib0157","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1016\/j.cose.2009.04.001","article-title":"A schema for protecting the integrity of databases","volume":"28","author":"Kamel","year":"2009","journal-title":"Comput. Security"},{"issue":"5","key":"10.1016\/j.inffus.2026.104311_bib0158","article-title":"A fragile zero-watermarking technique for authentication of relational databases","volume":"5","author":"Hamadou","year":"2011","journal-title":"Int. J. Digit. Content Technol. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0159","series-title":"European Conference on Information Management","first-page":"214","article-title":"Distortion free algorithm to handle secondary watermark attack in relational databases","author":"Iqbal","year":"2011"},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0160","doi-asserted-by":"crossref","DOI":"10.1155\/2014\/697165","article-title":"Distortion-free watermarking approach for relational database integrity checking","volume":"2014","author":"Camara","year":"2014","journal-title":"Math. Probl. Eng."},{"key":"10.1016\/j.inffus.2026.104311_bib0161","series-title":"2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC)","first-page":"192","article-title":"A distortion-free watermarking approach for verifying integrity of relational databases","author":"Siledar","year":"2020"},{"issue":"23","key":"10.1016\/j.inffus.2026.104311_bib0162","doi-asserted-by":"crossref","first-page":"16051","DOI":"10.1007\/s11042-018-7074-2","article-title":"Watermarking as a service (waas) with anonymity","volume":"79","author":"Naz","year":"2020","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"10.1016\/j.inffus.2026.104311_bib0163","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/TKDE.2007.190668","article-title":"Watermarking relational databases using optimization-based techniques","volume":"20","author":"Shehab","year":"2007","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"10.1016\/j.inffus.2026.104311_bib0164","doi-asserted-by":"crossref","first-page":"2742","DOI":"10.1016\/j.jss.2013.06.023","article-title":"Genetic algorithm and difference expansion based reversible watermarking for relational databases","volume":"86","author":"Jawad","year":"2013","journal-title":"J. Syst. Software"},{"issue":"3","key":"10.1016\/j.inffus.2026.104311_bib0165","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s11042-013-1700-9","article-title":"Watermarking relational databases using bacterial foraging algorithm","volume":"74","author":"Khanduja","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0166","series-title":"Proceedings of the 2025 4th International Conference on Cryptography, Network Security and Communication Technology","first-page":"50","article-title":"PSOHSW: A robust database watermarking scheme with low distortion","author":"Ge","year":"2025"},{"key":"10.1016\/j.inffus.2026.104311_bib0167","first-page":"1","article-title":"Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm","volume":"35","author":"Unnikrishnan","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0168","unstructured":"Y. Sun, T. Liu, P. Hu, Q. Liao, S. Fu, N. Yu, D. Guo, Y. Liu, L. Liu, Deep intellectual property protection: a survey, arXiv: 2304.14613(2023)."},{"key":"10.1016\/j.inffus.2026.104311_bib0169","series-title":"Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval","first-page":"269","article-title":"Embedding watermarks into deep neural networks","author":"Uchida","year":"2017"},{"key":"10.1016\/j.inffus.2026.104311_bib0170","series-title":"ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"2622","article-title":"Attacks on digital watermarks for deep neural networks","author":"Wang","year":"2019"},{"key":"10.1016\/j.inffus.2026.104311_bib0171","series-title":"Proceedings of the Web Conference 2021","first-page":"993","article-title":"Riga: covert and robust white-box watermarking of deep neural networks","author":"Wang","year":"2021"},{"key":"10.1016\/j.inffus.2026.104311_bib0172","article-title":"Spread-transform dither modulation watermarking of deep neural network","volume":"63","author":"Li","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0173","series-title":"ICML","first-page":"6978","article-title":"Watermarking deep neural networks with greedy residuals","volume":"139","author":"Liu","year":"2021"},{"key":"10.1016\/j.inffus.2026.104311_bib0174","series-title":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","first-page":"1","article-title":"Structural watermarking to deep neural networks via network channel pruning","author":"Zhao","year":"2021"},{"key":"10.1016\/j.inffus.2026.104311_bib0175","article-title":"Rethinking deep neural network ownership verification: embedding passports to defeat ambiguity attacks","volume":"32","author":"Fan","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"10","key":"10.1016\/j.inffus.2026.104311_bib0176","doi-asserted-by":"crossref","first-page":"6122","DOI":"10.1109\/TPAMI.2021.3088846","article-title":"Deepip: deep neural network intellectual property protection with passports","volume":"44","author":"Fan","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.inffus.2026.104311_bib0177","first-page":"22619","article-title":"Passport-aware normalization for deep model protection","volume":"33","author":"Zhang","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.inffus.2026.104311_bib0178","series-title":"27th USENIX Security Symposium (USENIX Security 18)","first-page":"1615","article-title":"Turning your weakness into a strength: watermarking deep neural networks by backdooring","author":"Adi","year":"2018"},{"key":"10.1016\/j.inffus.2026.104311_bib0179","series-title":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","first-page":"228","article-title":"Robust watermarking of neural network with exponential weighting","author":"Namba","year":"2019"},{"key":"10.1016\/j.inffus.2026.104311_bib0180","series-title":"30th USENIX Security Symposium (USENIX Security 21)","first-page":"1937","article-title":"Entangled watermarks as a defense against model extraction","author":"Jia","year":"2021"},{"key":"10.1016\/j.inffus.2026.104311_bib0181","series-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","first-page":"159","article-title":"Protecting intellectual property of deep neural networks with watermarking","author":"Zhang","year":"2018"},{"key":"10.1016\/j.inffus.2026.104311_bib0182","series-title":"2018 IEEE\/ACM International Conference on Computer-aided Design (ICCAD)","first-page":"1","article-title":"Watermarking deep neural networks for embedded systems","author":"Guo","year":"2018"},{"key":"10.1016\/j.inffus.2026.104311_bib0183","series-title":"Proceedings of the 35th Annual Computer Security Applications Conference","first-page":"126","article-title":"How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN","author":"Li","year":"2019"},{"key":"10.1016\/j.inffus.2026.104311_bib0184","series-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"462","article-title":"Protecting IP of deep neural networks with watermarking: a new label helps","author":"Zhong","year":"2020"},{"key":"10.1016\/j.inffus.2026.104311_bib0185","series-title":"2020 IEEE 19Th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"402","article-title":"Protecting the intellectual property of deep neural networks with watermarking: the frequency domain approach","author":"Li","year":"2020"},{"key":"10.1016\/j.inffus.2026.104311_bib0186","unstructured":"S. Sun, M. Xue, J. Wang, W. Liu, Protecting the intellectual properties of deep neural networks with an additional class and steganographic images, arXiv: 2104.09203(2021)."},{"key":"10.1016\/j.inffus.2026.104311_bib0187","doi-asserted-by":"crossref","unstructured":"Y. Sun, L. Liu, N. Yu, Y. Liu, Q. Tian, D. Guo, Deep watermarking for deep intellectual property protection: a comprehensive survey, Available at SSRN 4697020 (2024).","DOI":"10.2139\/ssrn.4697020"},{"issue":"13","key":"10.1016\/j.inffus.2026.104311_bib0188","doi-asserted-by":"crossref","first-page":"9233","DOI":"10.1007\/s00521-019-04434-z","article-title":"Adversarial frontier stitching for remote neural network watermarking","volume":"32","author":"Le Merrer","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.inffus.2026.104311_bib0189","series-title":"International Conference on Machine Learning","first-page":"16696","article-title":"Margin-based neural network watermarking","author":"Kim","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0190","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"1588","article-title":"Deep neural network watermarking against model extraction attack","author":"Tan","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0191","series-title":"International Conference on Machine Learning","first-page":"17061","article-title":"A watermark for large language models","author":"Kirchenbauer","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0192","series-title":"The Thirty Seventh Annual Conference on Learning Theory","first-page":"1125","article-title":"Undetectable watermarks for language models","author":"Christ","year":"2024"},{"key":"10.1016\/j.inffus.2026.104311_bib0193","unstructured":"X. Zhao, P. Ananth, L. Li, Y.-X. Wang, Provable robust watermarking for ai-generated text, arXiv: 2306.17439(2023)."},{"key":"10.1016\/j.inffus.2026.104311_bib0194","unstructured":"Y. Liu, Y. Bu, Adaptive text watermark for large language models, arXiv: 2401.13927(2024)."},{"issue":"8035","key":"10.1016\/j.inffus.2026.104311_bib0195","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1038\/s41586-024-08025-4","article-title":"Scalable watermarking for identifying large language model outputs","volume":"634","author":"Dathathri","year":"2024","journal-title":"Nature"},{"key":"10.1016\/j.inffus.2026.104311_bib0196","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"22466","article-title":"The stable signature: rooting watermarks in latent diffusion models","author":"Fernandez","year":"2023"},{"key":"10.1016\/j.inffus.2026.104311_bib0197","unstructured":"Y. Zhao, T. Pang, C. Du, X. Yang, N.-M. Cheung, M. Lin, A recipe for watermarking diffusion models, arXiv: 2303.10137(2023)."},{"key":"10.1016\/j.inffus.2026.104311_bib0198","series-title":"European Conference on Computer Vision","first-page":"338","article-title":"Ringid: rethinking tree-ring watermarking for enhanced multi-key identification","author":"Ci","year":"2024"},{"key":"10.1016\/j.inffus.2026.104311_bib0199","unstructured":"R.S. Roman, P. Fernandez, A. D\u00e9fossez, T. Furon, T. Tran, H. Elsahar, Proactive detection of voice cloning with localized watermarking, arXiv: 2401.17264(2024)."},{"key":"10.1016\/j.inffus.2026.104311_bib0200","unstructured":"Y. Liu, L. Lu, J. Jin, L. Sun, A. Fanelli, Xattnmark: learning robust audio watermarking with cross-attention, arXiv: 2502.04230(2025)."},{"key":"10.1016\/j.inffus.2026.104311_bib0201","unstructured":"X. Hu, H. Li, J. Li, Y. Huang, A. Liu, Videomark: a distortion-free robust watermarking framework for video diffusion models, arXiv: 2504.16359(2025)."},{"key":"10.1016\/j.inffus.2026.104311_bib0202","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2024.100662","article-title":"Digital image watermarking using deep learning: a survey","volume":"53","author":"Hosny","year":"2024","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.inffus.2026.104311_bib0203","first-page":"27469","article-title":"Paraphrasing evades detectors of ai-generated text, but retrieval is an effective defense","volume":"36","author":"Krishna","year":"2023","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.inffus.2026.104311_bib0204","article-title":"Reliable few-shot learning under dual noises","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.inffus.2026.104311_bib0205","doi-asserted-by":"crossref","first-page":"6115","DOI":"10.1109\/TIP.2023.3328478","article-title":"From global to local: multi-scale out-of-distribution detection","volume":"32","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.inffus.2026.104311_bib0206","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2025.111202","article-title":"Data-driven decision support system for the safety management of railway bridge networks","author":"Monti","year":"2025","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.inffus.2026.104311_bib0207","doi-asserted-by":"crossref","DOI":"10.1016\/j.conbuildmat.2023.130409","article-title":"Systematic review: ultrasonic technology for detecting rail defects","volume":"368","author":"Xue","year":"2023","journal-title":"Constr. Build. Mater."},{"key":"10.1016\/j.inffus.2026.104311_bib0208","doi-asserted-by":"crossref","DOI":"10.1016\/j.rineng.2025.105844","article-title":"Generative AI-Driven edge-Cloud system for intelligent road infrastructure inspection","author":"Ejaz","year":"2025","journal-title":"Results Eng."},{"key":"10.1016\/j.inffus.2026.104311_bib0209","doi-asserted-by":"crossref","DOI":"10.1016\/j.autcon.2024.105378","article-title":"Advancing railway track health monitoring: integrating GPR, inSAR and machine learning for enhanced asset management","volume":"162","author":"Koohmishi","year":"2024","journal-title":"Autom. Constr."},{"issue":"6","key":"10.1016\/j.inffus.2026.104311_bib0210","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-024-4333-7","article-title":"DiagLLM: multimodal reasoning with large language model for explainable bearing fault diagnosis","volume":"68","author":"Wang","year":"2025","journal-title":"Sci. China Inf. Sci."}],"container-title":["Information Fusion"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253526001909?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253526001909?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T15:29:28Z","timestamp":1777303768000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1566253526001909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,9]]},"references-count":210,"alternative-id":["S1566253526001909"],"URL":"https:\/\/doi.org\/10.1016\/j.inffus.2026.104311","relation":{},"ISSN":["1566-2535"],"issn-type":[{"value":"1566-2535","type":"print"}],"subject":[],"published":{"date-parts":[[2026,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Securing digital assets in intelligent railways: A survey of watermarking techniques, challenges, and prospects","name":"articletitle","label":"Article Title"},{"value":"Information Fusion","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.inffus.2026.104311","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"104311"}}