{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T21:04:21Z","timestamp":1776891861721,"version":"3.51.2"},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002713","name":"Imam Mohammed Ibn Saud Islamic University","doi-asserted-by":"publisher","award":["IMSIU-DDRSP2603"],"award-info":[{"award-number":["IMSIU-DDRSP2603"]}],"id":[{"id":"10.13039\/501100002713","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100023673","name":"Imam Mohammed Ibn Saud Islamic University Deanship of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100023673","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133429","type":"journal-article","created":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T07:14:23Z","timestamp":1774250063000},"page":"133429","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Visual pattern-based watermarking for large language model generated text"],"prefix":"10.1016","volume":"682","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6558-3427","authenticated-orcid":false,"given":"Shariq","family":"Bashir","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133429_bib0005","series-title":"2021 IEEE Symposium on Security and Privacy (SP)","first-page":"121","article-title":"Adversarial watermarking transformer: towards tracing text provenance with data hiding","author":"Abdelnabi","year":"2021"},{"key":"10.1016\/j.neucom.2026.133429_bib0010","series-title":"27th USENIX Security Symposium (USENIX Security 18)","first-page":"1615","article-title":"Turning your weakness into a strength: watermarking deep neural networks by backdooring","author":"Adi","year":"2018"},{"key":"10.1016\/j.neucom.2026.133429_bib0015","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/BF01840365","article-title":"The longest common subsequence problem revisited","volume":"2","author":"Apostolico","year":"1987","journal-title":"Algorithmica"},{"key":"10.1016\/j.neucom.2026.133429_bib0020","series-title":"International Workshop on Information Hiding","first-page":"196","article-title":"Natural language watermarking and tamperproofing","author":"Atallah","year":"2002"},{"key":"10.1016\/j.neucom.2026.133429_bib0025","doi-asserted-by":"crossref","first-page":"20856","DOI":"10.1109\/ACCESS.2026.3661394","article-title":"Asymmetric watermarking for large language models with public and private verification","volume":"14","author":"Bashir","year":"2026","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133429_bib0030","series-title":"Proceedings Seventh International Symposium on String Processing and Information Retrieval. SPIRE 2000","first-page":"39","article-title":"A survey of longest common subsequence algorithms","author":"Bergroth","year":"2000"},{"key":"10.1016\/j.neucom.2026.133429_bib0035","doi-asserted-by":"crossref","DOI":"10.3389\/fdata.2021.729663","article-title":"A systematic review on model watermarking for neural networks","volume":"4","author":"Boenisch","year":"2021","journal-title":"Front. Big Data"},{"key":"10.1016\/j.neucom.2026.133429_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3708889","article-title":"Human VS. Machine: a comparative study on the detection of AI-generated content","volume":"24","author":"Boutadjine","year":"2025","journal-title":"ACM Trans. Asian Low-Resour. Lang. Inf. Process."},{"key":"10.1016\/j.neucom.2026.133429_bib0045","first-page":"1","article-title":"The effects of conversational agents on human learning and how we used them: a systematic review of studies conducted before generative AI","author":"Bui","year":"2025","journal-title":"TechTrends"},{"key":"10.1016\/j.neucom.2026.133429_bib0050","series-title":"Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing","first-page":"8969","article-title":"Postmark: a robust blackbox watermark for large language models","author":"Chang","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0055","series-title":"International Workshop on Digital Watermarking","first-page":"129","article-title":"Natural language watermarking using semantic substitution for Chinese text","author":"Chiang","year":"2003"},{"key":"10.1016\/j.neucom.2026.133429_bib0060","series-title":"2025 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)","first-page":"1","article-title":"Watermarking llms\u2014challenges and opportunities in electronic design Automation","author":"DeLorenzo","year":"2025"},{"key":"10.1016\/j.neucom.2026.133429_bib0065","series-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)","first-page":"4171","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2019"},{"key":"10.1016\/j.neucom.2026.133429_bib0070","doi-asserted-by":"crossref","DOI":"10.62056\/ahmpdkp10","article-title":"Publicly-detectable watermarking for language models","volume":"1","author":"Fairoze","year":"2025","journal-title":"IACR Commun. Cryptol."},{"key":"10.1016\/j.neucom.2026.133429_bib0075","author":"Fang"},{"key":"10.1016\/j.neucom.2026.133429_bib0080","article-title":"Originality and the future of copyright in an age of generative AI","volume":"51","author":"Fenwick","year":"2023","journal-title":"Comput. Law Secur. Rev."},{"key":"10.1016\/j.neucom.2026.133429_bib0085","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1613\/jair.1.16665","article-title":"Detecting AI-generated text: factors influencing detectability with current methods","volume":"82","author":"Fraser","year":"2025","journal-title":"J. Artif. Intell. Res."},{"key":"10.1016\/j.neucom.2026.133429_bib0090","series-title":"Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"5791","article-title":"Gumbelsoft: diversified language model watermarking via the Gumbelmax-trick","author":"Fu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0095","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"18003","article-title":"Watermarking conditional text generation for AI detection: unveiling challenges and a semantic-aware watermark remedy","author":"Fu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0100","author":"Gu"},{"key":"10.1016\/j.neucom.2026.133429_bib0105","series-title":"Proceedings of the 31st International Conference on Computational Linguistics","first-page":"5430","article-title":"Post-hoc watermarking for robust detection in text generated by large language models","author":"Hao","year":"2025"},{"key":"10.1016\/j.neucom.2026.133429_bib0110","series-title":"Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"4115","article-title":"Can watermarks survive translation? On the cross-lingual consistency of text watermark for large language models","author":"He","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0115","series-title":"Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers)","first-page":"4067","article-title":"Semstamp: a semantic watermark with paraphrastic robustness for text generation","author":"Hou","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0120","series-title":"Findings of the Association for Computational Linguistics: ACL 2024","first-page":"1706","article-title":"K-semstamp: a clustering-based semantic watermark for detection of machine-generated text","author":"Hou","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0125","series-title":"International Conference on Machine Learning","first-page":"20746","article-title":"Token-specific watermarking with enhanced detectability and semantic coherence for large language models","author":"Huo","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0130","first-page":"214","article-title":"The promise and peril of generative AI","volume":"614","author":"Jo","year":"2023","journal-title":"Nature"},{"key":"10.1016\/j.neucom.2026.133429_bib0135","series-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1529","article-title":"Meteor: cryptographically secure steganography for realistic distributions","author":"Kaptchuk","year":"2021"},{"key":"10.1016\/j.neucom.2026.133429_bib0140","first-page":"17","article-title":"Principles of steganography","author":"Katzenbeisser","year":"2000","journal-title":"Inf. Hiding, Tech. Stenogr. Digit. Watermarking. Boston: Artech"},{"key":"10.1016\/j.neucom.2026.133429_bib0145","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/TASSP.1981.1163711","article-title":"Cubic convolution interpolation for digital image processing","volume":"29","author":"Keys","year":"2003","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"10.1016\/j.neucom.2026.133429_bib0150","series-title":"International Conference on Machine Learning","first-page":"17061","article-title":"A watermark for large language models","author":"Kirchenbauer","year":"2023"},{"key":"10.1016\/j.neucom.2026.133429_bib0155","author":"Kirchenbauer"},{"key":"10.1016\/j.neucom.2026.133429_bib0160","first-page":"27469","article-title":"Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense","volume":"36","author":"Krishna","year":"2023","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133429_bib0165","author":"Kuditipudi"},{"key":"10.1016\/j.neucom.2026.133429_bib0170","series-title":"Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"4890","article-title":"Who wrote this code? Watermarking for code generation","author":"Lee","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0175","series-title":"2024 4th International Conference on Communication Technology and Information Technology (ICCTIT)","first-page":"235","article-title":"An efficient and flexible black-box watermarking framework for large language models","author":"Li","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0180","doi-asserted-by":"crossref","DOI":"10.1007\/s10462-025-11474-6","article-title":"Watermarking techniques for large language models: a survey","volume":"59","author":"Liang","year":"2026","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.neucom.2026.133429_bib0185","author":"Liu"},{"key":"10.1016\/j.neucom.2026.133429_bib0190","first-page":"1","article-title":"A survey of text watermarking in the era of large language models","volume":"57","author":"Liu","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2026.133429_bib0195","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1017\/err.2023.59","article-title":"Chatgpt: a case study on copyright challenges for generative artificial intelligence systems","volume":"15","author":"Lucchi","year":"2024","journal-title":"Eur. J. Risk Regul."},{"key":"10.1016\/j.neucom.2026.133429_bib0200","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.csl.2008.04.001","article-title":"Natural language watermarking via morphosyntactic alterations","volume":"23","author":"Meral","year":"2009","journal-title":"Comput. Speech Lang."},{"key":"10.1016\/j.neucom.2026.133429_bib0205","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/02601370.2024.2310448","article-title":"Artificial intelligence (AI), conversational agents, and generative AI: implications for adult education practice and research","volume":"43","author":"Milana","year":"2024","journal-title":"Int. J. Lifelong Educ."},{"key":"10.1016\/j.neucom.2026.133429_bib0210","first-page":"23","article-title":"A threshold selection method from gray-level histograms","volume":"11","author":"Otsu","year":"1975","journal-title":"Automatica"},{"key":"10.1016\/j.neucom.2026.133429_bib0215","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information hiding-a survey","volume":"87","author":"Petitcolas","year":"2002","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.neucom.2026.133429_bib0220","series-title":"2025 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)","first-page":"68","article-title":"Markmywords: analyzing and evaluating language model watermarks","author":"Piet","year":"2025"},{"key":"10.1016\/j.neucom.2026.133429_bib0225","series-title":"Proceedings of the 34th USENIX Security Symposium (USENIX Security 25)","first-page":"201","article-title":"Provably robust multi-bit watermarking for AI-generated text","author":"Qu","year":"2025"},{"key":"10.1016\/j.neucom.2026.133429_bib0230","series-title":"Findings of the Association for Computational Linguistics: NAACL 2024","first-page":"613","article-title":"A robust semantics-based watermark for large language model against paraphrasing","author":"Ren","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0235","first-page":"333","article-title":"The probabilistic relevance framework: bm25 and beyond","volume":"3","author":"Robertson","year":"2009","journal-title":"Found. Trends Inf. Retr."},{"key":"10.1016\/j.neucom.2026.133429_bib0240","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1117\/1.1631315","article-title":"Survey over image thresholding techniques and quantitative performance evaluation","volume":"13","author":"Sezgin","year":"2004","journal-title":"J. Electron. Imaging."},{"key":"10.1016\/j.neucom.2026.133429_bib0245","series-title":"Security, Steganography, and Watermarking of Multimedia Contents VIII","first-page":"106","article-title":"Natural language watermarking: challenges in building a practical system","author":"Topkara","year":"2006"},{"key":"10.1016\/j.neucom.2026.133429_bib0250","author":"Touvron"},{"key":"10.1016\/j.neucom.2026.133429_bib0255","series-title":"Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","article-title":"Frustratingly easy edit-based linguistic steganography with a masked language model","author":"Ueoka","year":"2021"},{"key":"10.1016\/j.neucom.2026.133429_bib0260","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133429_bib0265","series-title":"Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing","first-page":"1363","article-title":"Watermarking the outputs of structured prediction with an application in statistical machine translation","author":"Venugopal","year":"2011"},{"key":"10.1016\/j.neucom.2026.133429_bib0270","first-page":"69","article-title":"The copyright problem with emerging generative AI","volume":"7","author":"Verma","year":"2023","journal-title":"J. Intell. Prot. Stud."},{"key":"10.1016\/j.neucom.2026.133429_bib0275","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s40979-023-00146-z","article-title":"Testing of detection tools for AI-generated text","volume":"19","author":"Weber-Wulff","year":"2023","journal-title":"Int. J. Educ. Integr."},{"key":"10.1016\/j.neucom.2026.133429_bib0280","author":"Wolf"},{"key":"10.1016\/j.neucom.2026.133429_bib0285","series-title":"Proceedings of the 41st International Conference on Machine Learning","first-page":"53251","article-title":"Optimizing watermarks for large language models","author":"Wouters","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0290","author":"Yang"},{"key":"10.1016\/j.neucom.2026.133429_bib0295","series-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics","article-title":"Robust multi-bit natural language watermarking through invariant features","author":"Yoo","year":"2023"},{"key":"10.1016\/j.neucom.2026.133429_bib0300","series-title":"Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers)","first-page":"4031","article-title":"Advancing beyond identification: multi-bit watermark for large language models","author":"Yoo","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0305","author":"Zhang"},{"key":"10.1016\/j.neucom.2026.133429_bib0310","author":"Zhang"},{"key":"10.1016\/j.neucom.2026.133429_bib0315","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1049\/iet-ipr.2011.0534","article-title":"Image zooming using directional cubic convolution interpolation","volume":"6","author":"Zhou","year":"2012","journal-title":"IET Image Process."},{"key":"10.1016\/j.neucom.2026.133429_bib0320","series-title":"Findings of the Association for Computational Linguistics: ACL 2024","first-page":"11416","article-title":"Duwak: dual watermarks in large language models","author":"Zhu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133429_bib0325","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"657","article-title":"Hidden: hiding data with deep networks","author":"Zhu","year":"2018"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S092523122600826X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S092523122600826X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:30:46Z","timestamp":1776889846000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S092523122600826X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":65,"alternative-id":["S092523122600826X"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133429","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Visual pattern-based watermarking for large language model generated text","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133429","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133429"}}