{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:13:57Z","timestamp":1769854437667,"version":"3.49.0"},"reference-count":16,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:p> The development of modern Internet communication technology and the popularization of multimedia technology have brought convenience to the sharing and storage of multimedia information such as images, videos, and audio. However, at the same time, it has brought about the problem of copyright theft of multimedia information, causing serious information security risks. Digital watermarking technology embeds copyright information in multimedia information in an invisible way, which can effectively realize copyright protection and traceability of infringement. Aiming at the problem that the existing learning model-based methods cannot fully extract and fuse the features of carrier images and watermark images, a robust digital watermarking method based on reversible information hiding is proposed. First, a watermark embedding model based on reversible information hiding is established, and the features of the download volume image and the watermark image in different dimensions are fully extracted and fused to generate a dense image with excellent visual quality. Then, a watermark extraction model based on reversible information hiding is established, and a noise layer is added between the embedding and the extraction model, and the attacked dense image is input to the watermark extraction model to extract the watermark. Under the constraint of the loss function, the network model learns to embed watermark information in the area that is more robust to the attack and is not easy to cause visual quality degradation, so as to optimize the comprehensive performance of the method. Experimental results show that the proposed method effectively improves the imperceptibility and robustness. <\/jats:p>","DOI":"10.1142\/s0219467825500354","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T09:04:50Z","timestamp":1692349490000},"source":"Crossref","is-referenced-by-count":1,"title":["Research on Robust Digital Watermarking Based on Reversible Information Hiding"],"prefix":"10.1142","volume":"25","author":[{"given":"Zhijing","family":"Gao","sequence":"first","affiliation":[{"name":"School of Information Network Security, People\u2019s Public Security University of P. R. China, Being, Xicheng District, Muxidi Nanli No. 1, P. R. China"}]},{"given":"Weilin","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, P. R. China"}]},{"given":"Ren","family":"Wenqi","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, P. R. China"}]},{"given":"Yan","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2023,8,22]]},"reference":[{"key":"S0219467825500354BIB001","volume-title":"Digital Watermarking","volume":"1","author":"Cox I. J.","year":"2002"},{"issue":"12","key":"S0219467825500354BIB002","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1109\/83.806631","volume":"8","author":"Kundur D.","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"S0219467825500354BIB003","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"Katzenbeisser S.","year":"2000"},{"key":"S0219467825500354BIB004","first-page":"135","volume-title":"Data Hiding Fundamentals and Applications","author":"Celik M. U.","year":"2005"},{"issue":"2","key":"S0219467825500354BIB005","first-page":"191","volume":"3","author":"Lin C. C.","year":"2009","journal-title":"IEEE J. Select. Top. Signal Process."},{"key":"S0219467825500354BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"S0219467825500354BIB007","author":"Guan Z.","year":"2022","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"S0219467825500354BIB008","first-page":"68191E-1","volume-title":"Electronic Imaging 2008, International Society for Optics and Photonics","author":"Puech W.","year":"2008"},{"issue":"10","key":"S0219467825500354BIB009","volume":"4","author":"Tamimi A. A.","year":"2013","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"S0219467825500354BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNIT.2011.6020921"},{"key":"S0219467825500354BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560428"},{"key":"S0219467825500354BIB013","first-page":"4720","volume-title":"Proc. IEEE Conf. Computer Vision and Pattern Recognition","author":"van der Ouderaa F.","year":"2019"},{"key":"S0219467825500354BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"S0219467825500354BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157"},{"issue":"01","key":"S0219467825500354BIB017","first-page":"1120","volume":"34","author":"Yu C.","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"S0219467825500354BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/11893295_27"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467825500354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T08:48:26Z","timestamp":1750668506000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219467825500354"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,22]]},"references-count":16,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1142\/S0219467825500354"],"URL":"https:\/\/doi.org\/10.1142\/s0219467825500354","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,22]]},"article-number":"2550035"}}