{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:09:58Z","timestamp":1746245398677,"version":"3.40.4"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFF0905000"],"award-info":[{"award-number":["2023YFF0905000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE MultiMedia"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/mmul.2024.3498856","type":"journal-article","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T18:54:08Z","timestamp":1731696848000},"page":"83-91","source":"Crossref","is-referenced-by-count":0,"title":["Feature-Attention-Mechanism-Based Attack for Deep Robust Watermarking"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7040-3107","authenticated-orcid":false,"given":"Meng","family":"Chen","sequence":"first","affiliation":[{"name":"University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5176-9771","authenticated-orcid":false,"given":"Daidou","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3784-4157","authenticated-orcid":false,"given":"Heng","family":"Yao","sequence":"additional","affiliation":[{"name":"University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-4623","authenticated-orcid":false,"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[{"name":"University of Shanghai for Science and Technology, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.07.032"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.06.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/wci.2015.7495522"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00219"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icassp43922.2022.9746058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.344672"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553343"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.10.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-020-00941-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106218"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2021.3138795"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/mmul.2022.3213004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108039"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2018.00745"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref18"},{"article-title":"Invisible image watermarks are provably removable using generative AI","year":"2023","author":"Zhao","key":"ref19"},{"issue":"1","key":"ref20","first-page":"185","article-title":"A robust digital image watermarking scheme using hybrid DWT-DCT-SVD technique","volume":"10","author":"Murty","year":"2010","journal-title":"Int. J. Comput. Sci. Netw. Secur."}],"container-title":["IEEE MultiMedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/93\/10981446\/10755030.pdf?arnumber=10755030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T17:19:13Z","timestamp":1746206353000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10755030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":20,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mmul.2024.3498856","relation":{},"ISSN":["1070-986X","1941-0166"],"issn-type":[{"type":"print","value":"1070-986X"},{"type":"electronic","value":"1941-0166"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}