{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T06:46:42Z","timestamp":1773125202084,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/iccvw69036.2025.00163","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:44:02Z","timestamp":1771879442000},"page":"1534-1543","source":"Crossref","is-referenced-by-count":1,"title":["MultiNeRF: Multiple Watermark Embedding for Neural Radiance Fields"],"prefix":"10.1109","author":[{"given":"Yash","family":"Kulthe","sequence":"first","affiliation":[{"name":"University of Surrey,CVSSP,UK"}]},{"given":"Andrew","family":"Gilbert","sequence":"additional","affiliation":[{"name":"University of Surrey,CVSSP,UK"}]},{"given":"John","family":"Collomosse","sequence":"additional","affiliation":[{"name":"University of Surrey,CVSSP,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Hierarchical Text-Conditional Image Generation with CLIP Latents","author":"Aditya","year":"2022","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01027"},{"key":"ref3","article-title":"Variational image compression with a scale hyperprior","author":"Ball\u00e9","year":"2018","journal-title":"arXiv preprint"},{"key":"ref4","article-title":"Hiding Images in Plain Sight: Deep Steganography","volume":"30","author":"Baluja","year":"2017","journal-title":"NeurIPS"},{"key":"ref5","article-title":"TrustMark: Universal Watermarking for Arbitrary Resolution Images","author":"Bui","year":"2023","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00100"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19824-3_20"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00796"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2024.3380168"},{"key":"ref10","first-page":"2051","article-title":"A loss function for generative neural networks based on watson\u2019s perceptual model","volume":"33","author":"Czolbe","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app14051825"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746058"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02053"},{"key":"ref14","article-title":"Video Seal: Open and Efficient Video Watermarking","author":"Fernandez","year":"2024","journal-title":"arXiv preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2011.6129126"},{"key":"ref16","article-title":"Imagen Video: High Definition Video Generation with Diffusion Models","author":"Ho","year":"2022","journal-title":"NeurIPS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01149"},{"key":"ref18","article-title":"Adam: A Method for Stochastic Optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint"},{"key":"ref19","first-page":"1","article-title":"RT- NeRF: Real-Time On-Device Neural Radiance Fields Towards Immersive AR\/VR Rendering","volume-title":"Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design","author":"Li","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00047"},{"key":"ref21","article-title":"InstantSplamp: Fast and Generalizable Stenography Framework for Generative Gaussian Splatting","volume-title":"The Thirteenth International Conference on Learning Representations","author":"Li","year":"2025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02047"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3322980"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3503250"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3528223.3530127"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554423"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11671"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref30","article-title":"Radioactive Data: Tracing Through Training","volume-title":"International Conference on Machine Learning (ICML)","author":"Sablayrolles","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73247-8_4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12691-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475518"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref36","article-title":"Tree-Ring Watermarks: Invisible Fingerprints for Diffusion Images","author":"Wen","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/wacv61041.2025.00098"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19821-2_41"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.61173\/ttjnt195"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref41","article-title":"GS- Hider: Hiding Messages into 3D Gaussian Splatting","author":"Zhang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref42","first-page":"2700","article-title":"DeepMarks: A Secure Fingerprinting Framework for Digital Content Protection","volume":"16","author":"Zhang","year":"2021","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.52202\/079017-0276"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"2025 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,10,19]]},"end":{"date-parts":[[2025,10,20]]}},"container-title":["2025 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11373940\/11374285\/11375407.pdf?arnumber=11375407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:34:34Z","timestamp":1771918474000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11375407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/iccvw69036.2025.00163","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}