{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:22:53Z","timestamp":1775503373847,"version":"3.50.1"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162067"],"award-info":[{"award-number":["62162067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62562061"],"award-info":[{"award-number":["62562061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62462067"],"award-info":[{"award-number":["62462067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62502422"],"award-info":[{"award-number":["62502422"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019413","name":"Yunnan Provincial Department of Education Science Research Fund Project","doi-asserted-by":"publisher","award":["2025J0007"],"award-info":[{"award-number":["2025J0007"]}],"id":[{"id":"10.13039\/501100019413","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019413","name":"Yunnan Provincial Department of Education Science Research Fund Project","doi-asserted-by":"publisher","award":["2025J0006"],"award-info":[{"award-number":["2025J0006"]}],"id":[{"id":"10.13039\/501100019413","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019413","name":"Yunnan Provincial Department of Education Science Research Fund Project","doi-asserted-by":"publisher","award":["2024J0010"],"award-info":[{"award-number":["2024J0010"]}],"id":[{"id":"10.13039\/501100019413","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005147","name":"Yunnan Applied Basic Research Project","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neural Networks"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neunet.2026.108626","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:03:22Z","timestamp":1768953802000},"page":"108626","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["RWP: a robust watermarking plugin for attribution and protection in stable diffusion models"],"prefix":"10.1016","volume":"198","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7675-983X","authenticated-orcid":false,"given":"Zongxin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9906-3508","authenticated-orcid":false,"given":"Jinhong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5251-9928","authenticated-orcid":false,"given":"Yunyun","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3758-6546","authenticated-orcid":false,"given":"Bingbing","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5881-9436","authenticated-orcid":false,"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neunet.2026.108626_bib0001","first-page":"8887","article-title":"New image steganography method using zero order hold zooming","volume":"975","author":"Abdelmgeid","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"10.1016\/j.neunet.2026.108626_bib0002","first-page":"8887","article-title":"Improving ZOH image steganography method by using braille method","volume":"975","author":"Abdelmged","year":"2016","journal-title":"International Journal of Computer Applications"},{"issue":"9","key":"10.1016\/j.neunet.2026.108626_bib0003","doi-asserted-by":"crossref","first-page":"740","DOI":"10.3844\/jcssp.2007.740.746","article-title":"Combined DWT-DCT digital image watermarking","volume":"3","author":"Al-Haj","year":"2007","journal-title":"Journal of Computer Science"},{"issue":"3","key":"10.1016\/j.neunet.2026.108626_bib0004","first-page":"8","article-title":"Improving image generation with better captions","volume":"2","author":"Betker","year":"2023","journal-title":"Computer Science"},{"key":"10.1016\/j.neunet.2026.108626_bib0005","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"18392","article-title":"Instructpix2pix: Learning to follow image editing instructions","author":"Brooks","year":"2023"},{"key":"10.1016\/j.neunet.2026.108626_bib0006","unstructured":"Ci, H., Song, Y., Yang, P., Xie, J., & Shou, M. Z. (2024a). Wmadapter: Adding watermark control to latent diffusion models. arXiv preprint arXiv: 2406.08337."},{"key":"10.1016\/j.neunet.2026.108626_bib0007","series-title":"European conference on computer vision","first-page":"338","article-title":"Ringid: Rethinking tree-ring watermarking for enhanced multi-key identification","author":"Ci","year":"2024"},{"key":"10.1016\/j.neunet.2026.108626_bib0008","unstructured":"Feng, W., Zhou, W., He, J., Zhang, J., Wei, T., Li, G., Zhang, T., Zhang, W., & Yu, N. (2024). AqualoRA: Toward white-box protection for customized stable diffusion models via watermark loRA. arXiv preprint arXiv: 2405.11135."},{"key":"10.1016\/j.neunet.2026.108626_bib0009","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"22466","article-title":"The stable signature: Rooting watermarks in latent diffusion models","author":"Fernandez","year":"2023"},{"key":"10.1016\/j.neunet.2026.108626_bib0010","unstructured":"Fu, S., Tamir, N., Sundaram, S., Chai, L., Zhang, R., Dekel, T., & Isola, P. (2023). Dreamsim: Learning new dimensions of human visual similarity using synthetic data. arXiv preprint arXiv: 2306.09344."},{"key":"10.1016\/j.neunet.2026.108626_bib0011","unstructured":"Gunn, S., Zhao, X., & Song, D. (2024). An undetectable watermark for generative image models. arXiv preprint arXiv: 2410.07369."},{"key":"10.1016\/j.neunet.2026.108626_bib0012","doi-asserted-by":"crossref","first-page":"27181","DOI":"10.1007\/s11042-018-5913-9","article-title":"Hybrid blind robust image watermarking technique based on DFT-DCT and arnold transform","volume":"77","author":"Hamidi","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.neunet.2026.108626_bib0013","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","volume":"30","author":"Heusel","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0014","unstructured":"Ho, J., & Salimans, T. (2022). Classifier-free diffusion guidance. arXiv preprint arXiv: 2207.12598."},{"key":"10.1016\/j.neunet.2026.108626_bib0015","series-title":"European conference on computer vision","first-page":"20","article-title":"Robust-wide: Robust watermarking against instruction-driven image editing","author":"Hu","year":"2024"},{"key":"10.1016\/j.neunet.2026.108626_bib0016","doi-asserted-by":"crossref","first-page":"3937","DOI":"10.52202\/079017-0129","article-title":"Robin: Robust and invisible watermarks for diffusion models with adversarial optimization","volume":"37","author":"Huang","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0017","series-title":"Proceedings of the 29th ACM international conference on multimedia","first-page":"41","article-title":"Mbrs: Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression","author":"Jia","year":"2021"},{"key":"10.1016\/j.neunet.2026.108626_bib0018","series-title":"International conference on learning representations","article-title":"Fixed neural network steganography: Train the images, not the network","author":"Kishore","year":"2021"},{"key":"10.1016\/j.neunet.2026.108626_bib0019","series-title":"Computer vision\u2013ECCV 2014: 13th European conference, Zurich, Switzerland, September 6\u201312, 2014, proceedings, part V 13","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"Lin","year":"2014"},{"key":"10.1016\/j.neunet.2026.108626_bib0020","series-title":"European conference on computer vision","first-page":"93","article-title":"Latent guard: A safety framework for text-to-image generation","author":"Liu","year":"2025"},{"key":"10.1016\/j.neunet.2026.108626_bib0021","unstructured":"Loshchilov, I., & Hutter, F. (2017). Decoupled weight decay regularization. arXiv preprint arXiv: 1711.05101."},{"key":"10.1016\/j.neunet.2026.108626_bib0022","first-page":"5775","article-title":"Dpm-solver: A fast ode solver for diffusion probabilistic model sampling in around 10 steps","volume":"35","author":"Lu","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0023","doi-asserted-by":"crossref","unstructured":"Luo, W., Shen, Z., Yao, Y., Ding, F., Zhu, G., & Meng, W. (2025). Tracemark-LDM: Authenticatable watermarking for latent diffusion models via binary-guided rearrangement. arXiv preprint arXiv: 2503.23332.","DOI":"10.1016\/j.eswa.2026.131831"},{"key":"10.1016\/j.neunet.2026.108626_bib0024","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"13548","article-title":"Distortion agnostic deep watermarking","author":"Luo","year":"2020"},{"key":"10.1016\/j.neunet.2026.108626_bib0025","series-title":"Proceedings of the 32nd ACM international conference on multimedia","first-page":"7113","article-title":"Safe-sd: Safe and traceable stable diffusion with text prompt trigger for invisible generative watermarking","author":"Ma","year":"2024"},{"key":"10.1016\/j.neunet.2026.108626_bib0026","series-title":"European conference on computer vision","first-page":"104","article-title":"A watermark-conditioned diffusion model for ip protection","author":"Min","year":"2024"},{"key":"10.1016\/j.neunet.2026.108626_bib0027","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"12882","article-title":"Interactive continual learning: Fast and slow thinking","author":"Qi","year":"2024"},{"key":"10.1016\/j.neunet.2026.108626_bib0028","unstructured":"Qi, B., Gao, J., Luo, Y., Liu, J., Wu, L., & Zhou, B. (2024b). Investigating deep watermark security: An adversarial transferability perspective. arXiv preprint arXiv: 2402.16397."},{"key":"10.1016\/j.neunet.2026.108626_bib0029","series-title":"International conference on machine learning","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","author":"Radford","year":"2021"},{"key":"10.1016\/j.neunet.2026.108626_bib0030","doi-asserted-by":"crossref","unstructured":"Rahman, M. M. (2013). A DWT, DCT and SVD based watermarking technique to protect the image piracy. arXiv preprint arXiv: 1307.3294.","DOI":"10.5121\/ijmpict.2013.4203"},{"key":"10.1016\/j.neunet.2026.108626_bib0031","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"10684","article-title":"High-resolution image synthesis with latent diffusion models","author":"Rombach","year":"2022"},{"key":"10.1016\/j.neunet.2026.108626_bib0032","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"22522","article-title":"Safe latent diffusion: Mitigating inappropriate degeneration in diffusion models","author":"Schramowski","year":"2023"},{"key":"10.1016\/j.neunet.2026.108626_bib0033","first-page":"25278","article-title":"Laion-5b: An open large-scale dataset for training next generation image-text models","volume":"35","author":"Schuhmann","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0034","unstructured":"Song, J., Meng, C., & Ermon, S. (2020). Denoising diffusion implicit models. arXiv preprint arXiv: 2010.02502."},{"key":"10.1016\/j.neunet.2026.108626_bib0035","first-page":"12438","article-title":"Improved techniques for training score-based generative models","volume":"33","author":"Song","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0036","doi-asserted-by":"crossref","unstructured":"Thietke, J., M\u00fcller, A., Lukovnikov, D., Fischer, A., & Quiring, E. (2025). Towards a correct usage of cryptography in semantic watermarks for diffusion models. arXiv preprint arXiv: 2503.11404.","DOI":"10.1109\/CVPR52734.2025.01950"},{"issue":"4","key":"10.1016\/j.neunet.2026.108626_bib0037","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.neunet.2026.108626_bib0038","series-title":"Proceedings of the 61st annual meeting of the association for computational linguistics (volume 1: Long papers)","first-page":"893","article-title":"Diffusiondb: A large-scale prompt gallery dataset for text-to-image generative models","author":"Wang","year":"2023"},{"key":"10.1016\/j.neunet.2026.108626_bib0039","first-page":"58047","article-title":"Tree-rings watermarks: Invisible fingerprints for diffusion images","volume":"36","author":"Wen","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0040","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"12162","article-title":"Gaussian shading: Provable performance-lossless image watermarking for diffusion models","author":"Yang","year":"2024"},{"key":"10.1016\/j.neunet.2026.108626_bib0041","unstructured":"Yu, J., Xu, Y., Koh, J. Y., Luong, T., Baid, G., Wang, Z., Vasudevan, V., Ku, A., Yang, Y., Ayan, B. K. et al. (2022). Scaling autoregressive models for content-rich text-to-image generation. 2(3), 5. arXiv preprint arXiv: 2206.10789."},{"key":"10.1016\/j.neunet.2026.108626_bib0042","unstructured":"Zhang, K. A., Xu, L., Cuesta-Infante, A., & Veeramachaneni, K. (2019). Robust invisible video watermarking with attention. arXiv preprint arXiv: 1909.01285."},{"key":"10.1016\/j.neunet.2026.108626_bib0043","first-page":"38480","article-title":"Attack-resilient image watermarking using stable diffusion","volume":"37","author":"Zhang","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108626_bib0044","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"3836","article-title":"Adding conditional control to text-to-image diffusion models","author":"Zhang","year":"2023"},{"key":"10.1016\/j.neunet.2026.108626_bib0045","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"586","article-title":"The unreasonable effectiveness of deep features as a perceptual metric","author":"Zhang","year":"2018"},{"key":"10.1016\/j.neunet.2026.108626_bib0046","series-title":"Companion proceedings of the ACM web conference 2023","first-page":"94","article-title":"Copyright protection and accountability of generative ai: Attack, watermarking and attribution","author":"Zhong","year":"2023"},{"key":"10.1016\/j.neunet.2026.108626_bib0047","series-title":"Proceedings of the European conference on computer vision (ECCV)","first-page":"657","article-title":"Hidden: Hiding data with deep networks","author":"Zhu","year":"2018"}],"container-title":["Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608026000882?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608026000882?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T18:35:54Z","timestamp":1775500554000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0893608026000882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":47,"alternative-id":["S0893608026000882"],"URL":"https:\/\/doi.org\/10.1016\/j.neunet.2026.108626","relation":{},"ISSN":["0893-6080"],"issn-type":[{"value":"0893-6080","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"RWP: a robust watermarking plugin for attribution and protection in stable diffusion models","name":"articletitle","label":"Article Title"},{"value":"Neural Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neunet.2026.108626","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108626"}}