{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:36:12Z","timestamp":1769751372874,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T00:00:00Z","timestamp":1625443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,5]]},"DOI":"10.1109\/icme51207.2021.9428410","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:14:21Z","timestamp":1623273261000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Watermark Faker: Towards Forgery of Digital Image Watermarking"],"prefix":"10.1109","author":[{"given":"Ruowei","family":"Wang","sequence":"first","affiliation":[{"name":"Sichuan University,College of Computer Science,China"}]},{"given":"Chenguo","family":"Lin","sequence":"additional","affiliation":[{"name":"Sichuan University,College of Computer Science,China"}]},{"given":"Qijun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Sichuan University,College of Computer Science,China"}]},{"given":"Feiyu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Sichuan University,College of Computer Science,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"465","article-title":"Toward multimodal image-to-image translation","author":"zhu","year":"2017","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurlPS)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00519"},{"key":"ref15","first-page":"35","article-title":"Diverse image- to-image translation via disentangled representations","author":"lee","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"key":"ref16","article-title":"Steganography gan: Cracking steganography with cycle generative adversarial networks","author":"khan","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"ref4","first-page":"10223","article-title":"Udh: Universal deep hiding for steganography, watermarking, and light field messaging","author":"zhang","year":"2020","journal-title":"Conference on Neural Information Processing Systems (NeurIPS)"},{"key":"ref3","first-page":"657","article-title":"Hidden: Hiding data with deep networks","author":"zhu","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref5","article-title":"A brief survey on deep learning based data hiding, steganography and watermarking","author":"zhang","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"ref7","first-page":"1125","article-title":"Image-to-image translation with conditional adversarial networks","author":"isola","year":"2017","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"43391","DOI":"10.1109\/ACCESS.2020.2978186","article-title":"A new chaotic image watermarking scheme based on svd and iwt","volume":"8","author":"zainol","year":"2020","journal-title":"IEEE Access"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.02.055"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00244"},{"key":"ref20","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014"},{"key":"ref22","article-title":"Caltech-256 object category dataset","author":"griffin","year":"2007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.304"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"}],"event":{"name":"2021 IEEE International Conference on Multimedia and Expo (ICME)","location":"Shenzhen, China","start":{"date-parts":[[2021,7,5]]},"end":{"date-parts":[[2021,7,9]]}},"container-title":["2021 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9428049\/9428068\/09428410.pdf?arnumber=9428410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:23:59Z","timestamp":1659486239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9428410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icme51207.2021.9428410","relation":{},"subject":[],"published":{"date-parts":[[2021,7,5]]}}}