{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:15:33Z","timestamp":1775578533434,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0804100"],"award-info":[{"award-number":["2018YFB0804100"]}]},{"name":"Exploration Fund Project of University of Science and Technology of China","award":["YD3480002001"],"award-info":[{"award-number":["YD3480002001"]}]},{"name":"Natural Science Foundation of China","award":["U1636201"],"award-info":[{"award-number":["U1636201"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1145\/3394171.3413729","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T13:12:00Z","timestamp":1602508320000},"page":"2273-2280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication"],"prefix":"10.1145","author":[{"given":"Xiquan","family":"Guan","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Heifei, China"}]},{"given":"Huamin","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Hang","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology in China, Hefei, China"}]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1615--1631.","author":"Adi Yossi","unstructured":"Yossi Adi , Carsten Baum , Moustapha Cisse , Benny Pinkas , and Joseph Keshet . 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring . In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1615--1631. Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1615--1631."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00144"},{"key":"e_1_3_2_2_3_1","volume-title":"Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728","author":"Chen Bryant","year":"2018","unstructured":"Bryant Chen , Wilka Carvalho , Nathalie Baracaldo , Heiko Ludwig , Benjamin Edwards , Taesung Lee , Ian Molloy , and Biplav Srivastava . 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 ( 2018 ). Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 (2018)."},{"key":"e_1_3_2_2_4_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu , Brendan Dolan-Gavitt , and Siddharth Garg . 2017 . Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017). Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"e_1_3_2_2_8_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.  Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00441"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_2_11_1","volume-title":"An entropy-based pruning method for cnn compression. arXiv preprint arXiv:1706.05791","author":"Luo Jian-Hao","year":"2017","unstructured":"Jian-Hao Luo and Jianxin Wu. 2017. An entropy-based pruning method for cnn compression. arXiv preprint arXiv:1706.05791 ( 2017 ). Jian-Hao Luo and Jianxin Wu. 2017. An entropy-based pruning method for cnn compression. arXiv preprint arXiv:1706.05791 (2017)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_3_2_2_13_1","volume-title":"Deepsigns: A generic watermarking framework for ip protection of deep learning models. arXiv preprint arXiv:1804.00750","author":"Rouhani Bita Darvish","year":"2018","unstructured":"Bita Darvish Rouhani , Huili Chen , and Farinaz Koushanfar . 2018 . Deepsigns: A generic watermarking framework for ip protection of deep learning models. arXiv preprint arXiv:1804.00750 (2018). Bita Darvish Rouhani, Huili Chen, and Farinaz Koushanfar. 2018. Deepsigns: A generic watermarking framework for ip protection of deep learning models. arXiv preprint arXiv:1804.00750 (2018)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"e_1_3_2_2_17_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"e_1_3_2_2_19_1","volume-title":"Reversible data embedding using a difference expansion","author":"Tian Jun","year":"2003","unstructured":"Jun Tian . 2003. Reversible data embedding using a difference expansion . IEEE transactions on circuits and systems for video technology, Vol. 13 , 8 ( 2003 ), 890--896. Jun Tian. 2003. Reversible data embedding using a difference expansion. IEEE transactions on circuits and systems for video technology, Vol. 13, 8 (2003), 890--896."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_2_21_1","volume-title":"Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks","author":"Wang Bolun","year":"2019","unstructured":"Bolun Wang , Yuanshun Yao , Shawn Shan , Huiying Li , Bimal Viswanath , Haitao Zheng , and Ben Y Zhao . 2019. Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks ( 2019 ), 0. Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, and Ben Y Zhao. 2019. Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks (2019), 0."},{"key":"e_1_3_2_2_22_1","volume-title":"Capacity bounds and code constructions for reversible data-hiding. IS&T\/SPIE Proceedings, Security and Watermarking of Multimedia 19 Contents V","author":"Willems FM","year":"2003","unstructured":"FM Willems and T Kalker . 2003. Capacity bounds and code constructions for reversible data-hiding. IS&T\/SPIE Proceedings, Security and Watermarking of Multimedia 19 Contents V , Vol. 5020 ( 2003 ). FM Willems and T Kalker. 2003. Capacity bounds and code constructions for reversible data-hiding. IS&T\/SPIE Proceedings, Security and Watermarking of Multimedia 19 Contents V, Vol. 5020 (2003)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Jie Zhang Dongdong Chen Jing Liao Han Fang Weiming Zhang Wenbo Zhou Hao Cui and Nenghai Yu. 2020. Model Watermarking for Image Processing Networks.. In AAAI. 12805--12812.  Jie Zhang Dongdong Chen Jing Liao Han Fang Weiming Zhang Wenbo Zhou Hao Cui and Nenghai Yu. 2020. Model Watermarking for Image Processing Networks.. In AAAI. 12805--12812.","DOI":"10.1609\/aaai.v34i07.6976"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"e_1_3_2_2_25_1","volume-title":"Improving various reversible data hiding schemes via optimal codes for binary covers","author":"Zhang Weiming","year":"2012","unstructured":"Weiming Zhang , Biao Chen , and Nenghai Yu. 2012. Improving various reversible data hiding schemes via optimal codes for binary covers . IEEE transactions on image processing, Vol. 21 , 6 ( 2012 ), 2991--3003. Weiming Zhang, Biao Chen, and Nenghai Yu. 2012. Improving various reversible data hiding schemes via optimal codes for binary covers. IEEE transactions on image processing, Vol. 21, 6 (2012), 2991--3003."}],"event":{"name":"MM '20: The 28th ACM International Conference on Multimedia","location":"Seattle WA USA","acronym":"MM '20","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 28th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394171.3413729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:16Z","timestamp":1750197676000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":25,"alternative-id":["10.1145\/3394171.3413729","10.1145\/3394171"],"URL":"https:\/\/doi.org\/10.1145\/3394171.3413729","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"2020-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}