{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:16:42Z","timestamp":1775913402501,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2047"],"award-info":[{"award-number":["U22B2047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002214"],"award-info":[{"award-number":["62002214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936214"],"award-info":[{"award-number":["U1936214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302286"],"award-info":[{"award-number":["62302286"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62376148"],"award-info":[{"award-number":["62376148"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chenguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission","award":["22CGA46"],"award-info":[{"award-number":["22CGA46"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M742207"],"award-info":[{"award-number":["2023M742207"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/lsp.2025.3554514","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:10:36Z","timestamp":1743030636000},"page":"1470-1474","source":"Crossref","is-referenced-by-count":6,"title":["Watermark Removal Attack Against Text-to-Image Generative Model Watermarking"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-9054","authenticated-orcid":false,"given":"Zihan","family":"Yuan","sequence":"first","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4799-5896","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0283-5338","authenticated-orcid":false,"given":"Zichi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1385-2198","authenticated-orcid":false,"given":"Jingyuan","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5867-1315","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3374057"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3157517"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01208"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2976493"},{"key":"ref5","first-page":"16784","article-title":"Glide: Towards photorealistic image generation and editing with text-guided diffusion models","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"162","author":"Nichol","year":"2022"},{"key":"ref6","first-page":"1","article-title":"Photorealistic text-to-image diffusion models with deep language understanding","volume-title":"Proc. 36th Conf. Neural Inf. Process. Syst.","author":"Saharia","year":"2022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref8","article-title":"Hierarchical text-conditional image generation with clip latents","author":"Ramesh","year":"2022"},{"key":"ref9","article-title":"Steal my artworks for fine-tuning? A watermarking framework for detecting art theft mimicry in text-to-image models","author":"Luo","year":"2023"},{"key":"ref10","first-page":"1","article-title":"DUAW: Data-free universal adversarial watermark against stable diffusion customization","volume-title":"Proc. Int. Conf. Learn. Representations 2024 Workshop Secure Trustworthy Large Lang. Models","author":"Ye","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3165573"},{"key":"ref12","first-page":"1","article-title":"Scaling autoregressive models for content-rich text-to-image generation","volume":"11","author":"Yu","year":"2022","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref13","first-page":"19822","article-title":"Cogview: Mastering text-to image generation via transformers","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Ding","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3351072"},{"key":"ref15","article-title":"A recipe for watermarking diffusion models","author":"Zhao","year":"2023"},{"key":"ref16","article-title":"Watermarking diffusion model","author":"Liu","year":"2023"},{"key":"ref17","first-page":"306","article-title":"Removing spatial spread spectrum watermarks by non-linear filtering","volume-title":"Proc. 9th Eur. Signal Process. Conf.","volume":"31","author":"Langelaar","year":"2024"},{"key":"ref18","first-page":"46","article-title":"Improved blind DCT watermarking by using chaotic sequences","volume-title":"Proc. Int. Conf. Internet Technol. Secured Trans.","author":"Tataru","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453079"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.740.746"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746058"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IMCEC.2018.8469626"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.595"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2020.07.030"},{"key":"ref26","first-page":"8821","article-title":"Zero-shot text-to-image generation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ramesh","year":"2021"},{"issue":"1","key":"ref27","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s10044-022-01096-x","article-title":"Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin n-nary","volume":"26","author":"Shi","year":"2023","journal-title":"Pattern Anal. Appl."},{"issue":"22","key":"ref28","doi-asserted-by":"crossref","DOI":"10.3390\/math10224249","article-title":"Trace concealment histogram-shifting-based reversible data hiding with improved skipping embedding and high-precision edge predictor","volume":"10","author":"Shi","year":"2022","journal-title":"Mathematics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.2300750"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01156"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3217569"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3330098"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3250750"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/97\/10802935\/10938391.pdf?arnumber=10938391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:44:04Z","timestamp":1762368244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10938391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/lsp.2025.3554514","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"value":"1070-9908","type":"print"},{"value":"1558-2361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}