{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:37:56Z","timestamp":1774895876619,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1109\/icassp48485.2024.10447095","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:56:31Z","timestamp":1710788191000},"page":"3250-3254","source":"Crossref","is-referenced-by-count":6,"title":["WaterDiff: Perceptual Image Watermarks Via Diffusion Model"],"prefix":"10.1109","author":[{"given":"Yuqi","family":"Tan","sequence":"first","affiliation":[{"name":"Tsinghua University,Tsinghua Shenzhen International Graduate School"}]},{"given":"Yuang","family":"Peng","sequence":"additional","affiliation":[{"name":"Tsinghua University,Tsinghua Shenzhen International Graduate School"}]},{"given":"Hao","family":"Fang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Tsinghua Shenzhen International Graduate School"}]},{"given":"Bin","family":"Chen","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Shu-Tao","family":"Xia","sequence":"additional","affiliation":[{"name":"Tsinghua University,Tsinghua Shenzhen International Graduate School"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Backdoor attack on hash-based image retrieval via clean-label data poisoning","author":"Gao","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00458"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2002.1203319"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2010.02.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141725"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref9","article-title":"Fixed neural network steganography: Train the images, not the network","volume-title":"International Conference on Learning Representations","author":"Kishore"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746058"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01036"},{"key":"ref12","first-page":"22117","article-title":"Unsupervised representation learning from pre-trained diffusion probabilistic models","volume":"35","author":"Zhang","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref13","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref16","article-title":"Lsun: Construction of a large-scale image dataset using deep learning with humans in the loop","author":"Yu","year":"2015"},{"key":"ref17","article-title":"Variational image compression with a scale hyperprior","author":"Ball\u00e9","year":"2018"},{"key":"ref18","article-title":"Compressai: a pytorch library and evaluation platform for end-to-end compression research","author":"Begaint","year":"2020","journal-title":"Computer Vision and Pattern Recognition"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref20","article-title":"Invisible image watermarks are provably removable using generative ai","author":"Zhao","year":"2023"}],"event":{"name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2024,4,14]]},"end":{"date-parts":[[2024,4,19]]}},"container-title":["ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10445798\/10445803\/10447095.pdf?arnumber=10447095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T05:29:39Z","timestamp":1722576579000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10447095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icassp48485.2024.10447095","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]}}}