{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T07:27:57Z","timestamp":1770103677866,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302142"],"award-info":[{"award-number":["62302142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["PA2025GDSK0079"],"award-info":[{"award-number":["PA2025GDSK0079"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/lsp.2026.3655346","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:58:03Z","timestamp":1768856283000},"page":"688-692","source":"Crossref","is-referenced-by-count":0,"title":["Semantic-Aware and Semi-Fragile Diffusion Watermarking for Proactive Deepfake Detection"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1547-161X","authenticated-orcid":false,"given":"Rui","family":"Sun","sequence":"first","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Ministry of Education), School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"}]},{"given":"Yifan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"}]},{"given":"Xiaolu","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"}]},{"given":"Yuwei","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7765-9239","authenticated-orcid":false,"given":"Yaofei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3298868"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i4.28147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2025.3627532"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3278310"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01647"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3592230"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2025.3616232"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3383648"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01156"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2025.3547664"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2025.3570660"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100679"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-9803-6_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03365-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2025.145866"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibmed.2025.100280"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3438101"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3004708"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3510355"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3415415"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3640466"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103801"},{"key":"ref23","first-page":"48832","article-title":"KGMark: A diffusion watermark for knowledge graphs","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Peng","year":"2025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref25","first-page":"2051","article-title":"A loss function for generative neural networks based on Watson\u2019s perceptual model","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Czolbe","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref27","first-page":"1","article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Karras","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612471"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680869"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02053"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3676165"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2916751"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01354"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3450626.3459814"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/97\/11304147\/11358695.pdf?arnumber=11358695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:48:11Z","timestamp":1770065291000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11358695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/lsp.2026.3655346","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"value":"1070-9908","type":"print"},{"value":"1558-2361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}