{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T08:16:33Z","timestamp":1778746593275,"version":"3.51.4"},"reference-count":68,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100008628","name":"Ministry of Electronics and Information technology","doi-asserted-by":"publisher","award":["PhD-02\/2022\/59"],"award-info":[{"award-number":["PhD-02\/2022\/59"]}],"id":[{"id":"10.13039\/501100008628","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Processing &amp; Management"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.ipm.2025.104600","type":"journal-article","created":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T15:06:35Z","timestamp":1767798395000},"page":"104600","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["DeepMark: A proactive deep learning-based watermarking model for tamper detection and localization across images and videos"],"prefix":"10.1016","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4726-2093","authenticated-orcid":false,"given":"Iram","family":"Abrar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3113-3802","authenticated-orcid":false,"given":"Javaid A.","family":"Sheikh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ipm.2025.104600_bib0001","series-title":"2024 IEEE 21st India Council International Conference (INDICON)","first-page":"1","article-title":"Robust watermarking scheme for digital image authentication and security","author":"Abrar","year":"2024"},{"issue":"19","key":"10.1016\/j.ipm.2025.104600_bib0002","doi-asserted-by":"crossref","first-page":"20567","DOI":"10.1007\/s11042-024-19562-5","article-title":"TDLCI: An efficient scheme for tamper detection and localization in color images","volume":"84","author":"Altaf","year":"2024","journal-title":"Multimedia Tools and Applications"},{"issue":"8","key":"10.1016\/j.ipm.2025.104600_bib0004","doi-asserted-by":"crossref","first-page":"21849","DOI":"10.1007\/s11042-023-14737-y","article-title":"Reversible medical image watermarking for tamper detection using ANN and SLT","volume":"83","author":"Bamal","year":"2023","journal-title":"Multimedia Tools and Applications"},{"issue":"11","key":"10.1016\/j.ipm.2025.104600_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3633203","article-title":"A comprehensive survey on methods for image integrity","volume":"20","author":"Capasso","year":"2024","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"10.1016\/j.ipm.2025.104600_bib0006","doi-asserted-by":"crossref","first-page":"3964","DOI":"10.1109\/TIP.2023.3293773","article-title":"Efficient robust watermarking based on structure-preserving quaternion singular value decomposition","volume":"32","author":"Chen","year":"2023","journal-title":"IEEE Transactions on Image Processing"},{"issue":"2","key":"10.1016\/j.ipm.2025.104600_bib0007","doi-asserted-by":"crossref","first-page":"1873","DOI":"10.1007\/s11042-022-13312-1","article-title":"A comprehensive survey on image authentication for tamper detection with localization","volume":"82","author":"Chennamma","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.ipm.2025.104600_bib0008","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2007). Digital watermarking and steganography.","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"10.1016\/j.ipm.2025.104600_bib0009","series-title":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"4545","article-title":"Synthesizing black-box anti-forensics deepfakes with high visual quality","author":"Fan","year":"2024"},{"key":"10.1016\/j.ipm.2025.104600_bib0010","series-title":"Proceedings of the 30th ACM International Conference on Multimedia","first-page":"2267","article-title":"PIMoG: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network","author":"Fang","year":"2022"},{"key":"10.1016\/j.ipm.2025.104600_bib0011","series-title":"Proceedings of the 30th ACM International Conference on Multimedia","first-page":"2267","article-title":"PIMoG: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network","author":"Fang","year":"2022"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0012","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s11036-018-1186-9","article-title":"A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration","volume":"25","author":"Feng","year":"2020","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0013","doi-asserted-by":"crossref","first-page":"1","DOI":"10.71129\/ijaci.v1.i1.pp1-12","article-title":"Dual watermarking based on human visual characteristics with IWT-SVD","volume":"1","author":"Fikri","year":"2025","journal-title":"IJACI : International Journal of Advanced Computing and Informatics"},{"key":"10.1016\/j.ipm.2025.104600_bib0014","unstructured":"Gan, Z., Liu, C., Tang, Y., Wang, B., Wang, W., & Zhang, X. (2025). GenPTW: In-generation image watermarking for provenance tracing and tamper localization. ArXiv Preprint ArXiv:2504.19567, 1\u201310. http:\/\/arxiv.org\/abs\/2504.19567."},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0015","doi-asserted-by":"crossref","first-page":"28","DOI":"10.71129\/ijaci.v1.i1.pp28-38","article-title":"Image watermarking for ensuring image integrity and robust copyright protection based on discrete wavelet transform","volume":"1","author":"Gen","year":"2025","journal-title":"IJACI : International Journal of Advanced Computing and Informatics"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0016","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/computers14010001","article-title":"Distinguishing reality from AI: Approaches for detecting synthetic content","volume":"14","author":"Ghiur\u0103u","year":"2024","journal-title":"Computers"},{"key":"10.1016\/j.ipm.2025.104600_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118730","article-title":"Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithm","volume":"212","author":"Gul","year":"2023","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0018","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/s00034-023-02462-8","article-title":"Blind semi-fragile hybrid domain-based dual watermarking system for video authentication and tampering localization","volume":"43","author":"Hammami","year":"2024","journal-title":"Circuits, Systems, and Signal Processing"},{"key":"10.1016\/j.ipm.2025.104600_bib0019","doi-asserted-by":"crossref","first-page":"2653","DOI":"10.1109\/TIFS.2023.3269152","article-title":"FCD-Net: Learning to detect multiple types of homologous deepfake face images","volume":"18","author":"Han","year":"2023","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.ipm.2025.104600_bib0020","doi-asserted-by":"crossref","first-page":"7764","DOI":"10.1109\/TIFS.2025.3592572","article-title":"New visible watermark protection mechanism based on information hiding","volume":"20","author":"Huang","year":"2025","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.ipm.2025.104600_bib0021","doi-asserted-by":"crossref","first-page":"7764","DOI":"10.1109\/TIFS.2025.3592572","article-title":"New visible watermark protection mechanism based on information hiding","volume":"20","author":"Huang","year":"2025","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"20","key":"10.1016\/j.ipm.2025.104600_bib0022","doi-asserted-by":"crossref","first-page":"24056","DOI":"10.1007\/s10489-023-04797-w","article-title":"Convolutional neural networks tamper detection and location based on fragile watermarking","volume":"53","author":"Huang","year":"2023","journal-title":"Applied Intelligence"},{"key":"10.1016\/j.ipm.2025.104600_bib0023","series-title":"Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval","first-page":"39","article-title":"The MIR flickr retrieval evaluation","author":"Huiskes","year":"2008"},{"key":"10.1016\/j.ipm.2025.104600_bib0024","series-title":"Proceedings of the 29th ACM International Conference on Multimedia","first-page":"41","article-title":"MBRS: Enhancing robustness of DNN-based watermarking by mini-batch of real and simulated JPEG compression","author":"Jia","year":"2021"},{"key":"10.1016\/j.ipm.2025.104600_bib0025","series-title":"Proceedings of the 29th ACM International Conference on Multimedia","first-page":"41","article-title":"MBRS: Enhancing robustness of DNN-based watermarking by mini-batch of real and simulated JPEG compression","author":"Jia","year":"2021"},{"issue":"2","key":"10.1016\/j.ipm.2025.104600_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103977","article-title":"Reversible source-aware natural language watermarking via customized lexical substitution","volume":"62","author":"Jiang","year":"2025","journal-title":"Information Processing & Management"},{"issue":"8","key":"10.1016\/j.ipm.2025.104600_bib0027","doi-asserted-by":"crossref","first-page":"4163","DOI":"10.1007\/s11042-024-18801-z","article-title":"Image splicing forgery detection: A review","volume":"84","author":"Kumari","year":"2024","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"10.1016\/j.ipm.2025.104600_bib0028","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/s10489-025-06333-4","article-title":"ED-END: Robust watermarking technology based on deep coupling of feature extractors","volume":"55","author":"Li","year":"2025","journal-title":"Applied Intelligence"},{"key":"10.1016\/j.ipm.2025.104600_bib0029","unstructured":"Liang, Y., Xiao, J., Gan, W., & Yu, P. S. (2024). Watermarking techniques for large language models: A survey. ArXiv Preprint ArXiv:2409.00089, 1\u201347. https:\/\/doi.org\/10.48550\/arXiv.2409.00089."},{"issue":"2","key":"10.1016\/j.ipm.2025.104600_bib0030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics12020415","article-title":"Fragile watermarking for tamper localization and self-recovery based on AMBTC and VQ","volume":"12","author":"Lin","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.ipm.2025.104600_bib0031","unstructured":"Liu, Ziwei, Luo, Ping Wang, Xiaogang Xiaoou, T. (2018). Large-scale celebfaces attributes (celeba) dataset. https:\/\/mmlab.ie.cuhk.edu.hk\/projects\/CelebA.html\/CelebA\/CelebA.html."},{"key":"10.1016\/j.ipm.2025.104600_bib0032","doi-asserted-by":"crossref","first-page":"36311","DOI":"10.1109\/ACCESS.2024.3374201","article-title":"Digital watermarking\u2014A meta-survey and techniques for fake news detection","volume":"12","author":"Malanowska","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.ipm.2025.104600_bib0034","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.aej.2023.07.068","article-title":"Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption","volume":"78","author":"Meselhy-Eltoukhy","year":"2023","journal-title":"Alexandria Engineering Journal"},{"issue":"4","key":"10.1016\/j.ipm.2025.104600_bib0035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3700146","article-title":"Social media authentication and combating deepfakes using semi-fragile invisible image watermarking","volume":"5","author":"Nadimpalli","year":"2024","journal-title":"Digital Threats: Research and Practice"},{"key":"10.1016\/j.ipm.2025.104600_bib0036","unstructured":"Neekhara, P., Hussain, S., Zhang, X., Huang, K., McAuley, J., & Koushanfar, F. (2022). FaceSigns: Semi-fragile neural watermarks for media authentication and countering deepfakes. 1\u201313. http:\/\/arxiv.org\/abs\/2204.01960."},{"issue":"11","key":"10.1016\/j.ipm.2025.104600_bib0037","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3640466","article-title":"FaceSigns: Semi-fragile watermarks for media authentication","volume":"20","author":"Neekhara","year":"2024","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0038","doi-asserted-by":"crossref","first-page":"13","DOI":"10.71129\/ijaci.v1.i1.pp13-27","article-title":"Secure and effective image integrity and copyright protection using two-layer authentication with integer wavelet transform","volume":"1","author":"Onn","year":"2025","journal-title":"IJACI : International Journal of Advanced Computing and Informatics"},{"key":"10.1016\/j.ipm.2025.104600_bib0039","doi-asserted-by":"crossref","first-page":"140082","DOI":"10.1109\/ACCESS.2024.3466611","article-title":"A triple self-embedding fragile watermarking scheme for image tamper detection and recovery","volume":"12","author":"Ozkaya","year":"2024","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.ipm.2025.104600_bib0040","doi-asserted-by":"crossref","first-page":"6134","DOI":"10.1109\/TAI.2024.3485519","article-title":"Deep learning-based dual watermarking for image copyright protection and authentication","volume":"5","author":"Padhi","year":"2024","journal-title":"IEEE Transactions on Artificial Intelligence"},{"issue":"12","key":"10.1016\/j.ipm.2025.104600_bib0041","doi-asserted-by":"crossref","first-page":"8394","DOI":"10.1109\/TCSVT.2022.3192542","article-title":"A semi-fragile reversible watermarking for authenticating 3D models in dual domains based on variable direction double modulation","volume":"32","author":"Peng","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"7","key":"10.1016\/j.ipm.2025.104600_bib0042","doi-asserted-by":"crossref","first-page":"3187","DOI":"10.3390\/app11073187","article-title":"Color image self-recovery and tampering detection scheme based on fragile watermarking with high recovery capability","volume":"11","author":"Reyes-Reyes","year":"2021","journal-title":"Applied Sciences"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0043","doi-asserted-by":"crossref","first-page":"39","DOI":"10.71129\/ijaci.v1.i1.pp39-47","article-title":"Robust color image watermarking using dual embedding via schur decomposition","volume":"1","author":"Ridwan","year":"2025","journal-title":"IJACI : International Journal of Advanced Computing and Informatics"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0044","doi-asserted-by":"crossref","first-page":"41","DOI":"10.71129\/ijaci.v2i1.pp41-52","article-title":"Robust digital image watermarking using DWT, Hessenberg, and SVD for copyright protection","volume":"2","author":"Romadhona Kusuma","year":"2025","journal-title":"IJACI : International Journal of Advanced Computing and Informatics"},{"key":"10.1016\/j.ipm.2025.104600_bib0045","doi-asserted-by":"crossref","first-page":"85677","DOI":"10.1109\/ACCESS.2022.3198963","article-title":"A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities","volume":"10","author":"Sharma","year":"2022","journal-title":"IEEE Access"},{"issue":"11","key":"10.1016\/j.ipm.2025.104600_bib0046","doi-asserted-by":"crossref","first-page":"31829","DOI":"10.1007\/s11042-023-16843-3","article-title":"A review of image watermarking for identity protection and verification","volume":"83","author":"Sharma","year":"2023","journal-title":"Multimedia Tools and Applications"},{"issue":"28","key":"10.1016\/j.ipm.2025.104600_bib0047","doi-asserted-by":"crossref","first-page":"71451","DOI":"10.1007\/s11042-024-18350-5","article-title":"Deep learning based authentication schemes for smart devices in different modalities: Progress, challenges, performance, datasets and future directions","volume":"83","author":"Shende","year":"2024","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0048","doi-asserted-by":"crossref","first-page":"3487","DOI":"10.1109\/TCE.2024.3371458","article-title":"Using multimodal biometric fusion for watermarking of multiple images","volume":"70","author":"Singh","year":"2024","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.ipm.2025.104600_bib0049","unstructured":"Soomro, K. (2012). UCF101: A dataset of 101 human actions classes from videos in the wild. ArXiv Preprint ArXiv:1212.0402."},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0050","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-67672-9","article-title":"A reversible-zero watermarking scheme for medical images","volume":"14","author":"Taj","year":"2024","journal-title":"Scientific Reports"},{"issue":"1","key":"10.1016\/j.ipm.2025.104600_bib0051","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-67672-9","article-title":"A reversible-zero watermarking scheme for medical images","volume":"14","author":"Taj","year":"2024","journal-title":"Scientific Reports"},{"key":"10.1016\/j.ipm.2025.104600_bib0052","series-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition","first-page":"2114","article-title":"Stegastamp: Invisible hyperlinks in physical photographs","author":"Tancik","year":"2020"},{"issue":"5","key":"10.1016\/j.ipm.2025.104600_bib0053","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3402446","article-title":"Learning generalizable and identity-discriminative representations for face anti-spoofing","volume":"11","author":"Tu","year":"2020","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"2","key":"10.1016\/j.ipm.2025.104600_bib0054","doi-asserted-by":"crossref","first-page":"89","DOI":"10.71129\/ijaci.v1.i2.pp89-98","article-title":"Robust image watermarking based on hybrid IWT-DCT-SVD","volume":"1","author":"Wahyudi","year":"2025","journal-title":"IJACI : International Journal of Advanced Computing and Informatics"},{"issue":"2","key":"10.1016\/j.ipm.2025.104600_bib0055","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/TCSVT.2024.3474029","article-title":"Robust image watermarking with synchronization using template enhanced-extracted network","volume":"35","author":"Wang","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.ipm.2025.104600_bib0056","unstructured":"Wang, T., Cheng, H., Liu, M.-H., & Kankanhalli, M. (2025a). FractalForensics: Proactive deepfake detection and localization via fractal watermarks. ArXiv Preprint ArXiv:2504.09451, 1\u20139. http:\/\/arxiv.org\/abs\/2504.09451."},{"key":"10.1016\/j.ipm.2025.104600_bib0057","unstructured":"Wang, T., Cheng, H., Liu, M.-H., & Kankanhalli, M. (2025b). FractalForensics: Proactive deepfake detection and localization via fractal watermarks. ArXiv Preprint ArXiv:2504.09451, 1\u20139."},{"issue":"7","key":"10.1016\/j.ipm.2025.104600_bib0058","doi-asserted-by":"crossref","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","article-title":"Watermarking neural networks with watermarked images","volume":"31","author":"Wu","year":"2021","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.ipm.2025.104600_bib0059","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"1190","article-title":"SepMark: Deep separable watermarking for unified source tracing and deepfake detection","author":"Wu","year":"2023"},{"key":"10.1016\/j.ipm.2025.104600_bib0060","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"1190","article-title":"SepMark: Deep separable watermarking for unified source tracing and deepfake detection","author":"Wu","year":"2023"},{"issue":"3","key":"10.1016\/j.ipm.2025.104600_bib0061","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103661","article-title":"A reversible natural language watermarking for sensitive information protection","volume":"61","author":"Xiang","year":"2024","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.ipm.2025.104600_bib0062","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121315","article-title":"Semi-fragile neural network watermarking for content authentication and tampering localization","volume":"236","author":"Yuan","year":"2024","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.1016\/j.ipm.2025.104600_bib0063","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1109\/TETCI.2024.3372373","article-title":"Semi-fragile neural network watermarking based on adversarial examples","volume":"8","author":"Yuan","year":"2024","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"issue":"12","key":"10.1016\/j.ipm.2025.104600_bib0064","doi-asserted-by":"crossref","first-page":"17521","DOI":"10.1007\/s11042-022-13797-w","article-title":"Image forgery detection: A survey of recent deep-learning approaches","volume":"82","author":"Zanardelli","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.ipm.2025.104600_bib0065","series-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition","first-page":"11964","article-title":"EditGuard: Versatile image watermarking for tamper localization and copyright protection","author":"Zhang","year":"2024"},{"key":"10.1016\/j.ipm.2025.104600_bib0066","doi-asserted-by":"crossref","first-page":"4628","DOI":"10.1109\/TIFS.2024.3383648","article-title":"Dual defense: Adversarial, traceable, and invisible robust watermarking against face swapping","volume":"19","author":"Zhang","year":"2024","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"10.1016\/j.ipm.2025.104600_bib0067","doi-asserted-by":"crossref","first-page":"34647","DOI":"10.1007\/s11042-023-16976-5","article-title":"A reversible image watermarking algorithm for tamper detection based on SIFT","volume":"83","author":"Zhang","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.ipm.2025.104600_bib0068","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.patrec.2022.10.013","article-title":"DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network","volume":"164","author":"Zhao","year":"2022","journal-title":"Pattern Recognition Letters"},{"issue":"March","key":"10.1016\/j.ipm.2025.104600_bib0069","first-page":"1","article-title":"Proactive image manipulation detection via deep semi-fragile watermark","volume":"585","author":"Zhao","year":"2024","journal-title":"Neurocomputing"},{"issue":"21","key":"10.1016\/j.ipm.2025.104600_bib0070","doi-asserted-by":"crossref","DOI":"10.3390\/app132111852","article-title":"A brief, in-depth survey of deep learning-based image watermarking","volume":"13","author":"Zhong","year":"2023","journal-title":"Applied Sciences"}],"container-title":["Information Processing &amp; Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306457325005412?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306457325005412?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T08:04:34Z","timestamp":1778745874000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306457325005412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":68,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["S0306457325005412"],"URL":"https:\/\/doi.org\/10.1016\/j.ipm.2025.104600","relation":{},"ISSN":["0306-4573"],"issn-type":[{"value":"0306-4573","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"DeepMark: A proactive deep learning-based watermarking model for tamper detection and localization across images and videos","name":"articletitle","label":"Article Title"},{"value":"Information Processing & Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ipm.2025.104600","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104600"}}