{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:35Z","timestamp":1773510995373,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T00:00:00Z","timestamp":1623888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency","doi-asserted-by":"publisher","award":["JPMJCR20D3"],"award-info":[{"award-number":["JPMJCR20D3"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,17]]},"DOI":"10.1145\/3437880.3460398","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T13:11:52Z","timestamp":1624281112000},"page":"159-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key"],"prefix":"10.1145","author":[{"given":"April Pyone","family":"Maung Maung","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University, Hino-shi, Japan"}]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University, Hino-shi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2021. Azure AI Gallery. https:\/\/gallery.azure.ai\/.  2021. Azure AI Gallery. https:\/\/gallery.azure.ai\/."},{"key":"e_1_3_2_2_2_1","unstructured":"2021. TensorFlow Hub is a repository of trained machine learning models. https:\/\/www.tensorflow.org\/hub.  2021. TensorFlow Hub is a repository of trained machine learning models. https:\/\/www.tensorflow.org\/hub."},{"key":"e_1_3_2_2_3_1","volume-title":"27th USENIX Security Symposium. 1615--1631","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi , Carsten Baum , Moustapha Ciss\u00e9 , Benny Pinkas , and Joseph Keshet . 2018 . Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring . In 27th USENIX Security Symposium. 1615--1631 . Yossi Adi, Carsten Baum, Moustapha Ciss\u00e9, Benny Pinkas, and Joseph Keshet. 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. In 27th USENIX Security Symposium. 1615--1631."},{"key":"e_1_3_2_2_4_1","volume-title":"Encryption Inspired Adversarial Defense For Visual Classification. In 2020 IEEE International Conference on Image Processing (ICIP). 1681--1685","author":"AprilPyone MaungMaung","year":"2020","unstructured":"MaungMaung AprilPyone and Hitoshi Kiya . 2020 a . Encryption Inspired Adversarial Defense For Visual Classification. In 2020 IEEE International Conference on Image Processing (ICIP). 1681--1685 . MaungMaung AprilPyone and Hitoshi Kiya. 2020 a. Encryption Inspired Adversarial Defense For Visual Classification. In 2020 IEEE International Conference on Image Processing (ICIP). 1681--1685."},{"key":"e_1_3_2_2_5_1","volume-title":"Training DNN Model with Secret Key for Model Protection. In 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE). 818--821","author":"AprilPyone MaungMaung","year":"2020","unstructured":"MaungMaung AprilPyone and Hitoshi Kiya . 2020 b . Training DNN Model with Secret Key for Model Protection. In 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE). 818--821 . MaungMaung AprilPyone and Hitoshi Kiya. 2020 b. Training DNN Model with Secret Key for Model Protection. In 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE). 818--821."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3062977"},{"key":"e_1_3_2_2_7_1","volume-title":"Bita Darvish Rouhani, and Farinaz Koushanfar","author":"Chen Huili","year":"2018","unstructured":"Huili Chen , Bita Darvish Rouhani, and Farinaz Koushanfar . 2018 . DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks . arXiv:1804.03648 (2018). http:\/\/arxiv.org\/abs\/1804.03648 Huili Chen, Bita Darvish Rouhani, and Farinaz Koushanfar. 2018. DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks. arXiv:1804.03648 (2018). http:\/\/arxiv.org\/abs\/1804.03648"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630791"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019487"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"e_1_3_2_2_12_1","unstructured":"Lixin Fan KamWoh Ng and Chee Seng Chan. 2019. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. In Advances in Neural Information Processing Systems. 4716--4725.  Lixin Fan KamWoh Ng and Chee Seng Chan. 2019. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. In Advances in Neural Information Processing Systems. 4716--4725."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001163"},{"key":"e_1_3_2_2_14_1","volume-title":"Trained Quantization and Huffman Coding. In International Conference on Learning Representations .","author":"Han Song","unstructured":"Song Han , Huizi Mao , and William J. Dally . 2016b. Deep Compression: Compressing Deep Neural Network with Pruning , Trained Quantization and Huffman Coding. In International Conference on Learning Representations . Song Han, Huizi Mao, and William J. Dally. 2016b. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. In International Conference on Learning Representations ."},{"key":"e_1_3_2_2_15_1","volume-title":"Garnett (Eds.)","volume":"28","author":"Han Song","year":"2015","unstructured":"Song Han , Jeff Pool , John Tran , and William Dally . 2015 . Learning both Weights and Connections for Efficient Neural Network. In Advances in Neural Information Processing Systems, C. Cortes, N. Lawrence, D. Lee, M. Sugiyama, and R . Garnett (Eds.) , Vol. 28 . Curran Associates, Inc., 1135--1143. Song Han, Jeff Pool, John Tran, and William Dally. 2015. Learning both Weights and Connections for Efficient Neural Network. In Advances in Neural Information Processing Systems, C. Cortes, N. Lawrence, D. Lee, M. Sugiyama, and R. Garnett (Eds.), Vol. 28. Curran Associates, Inc., 1135--1143."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_17_1","volume-title":"Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps. arXiv:2101.04401","author":"Huang Yujin","year":"2021","unstructured":"Yujin Huang , Han Hu , and Chunyang Chen . 2021. Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps. arXiv:2101.04401 ( 2021 ). https:\/\/arxiv.org\/abs\/2101.04401 Yujin Huang, Han Hu, and Chunyang Chen. 2021. Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps. arXiv:2101.04401 (2021). https:\/\/arxiv.org\/abs\/2101.04401"},{"key":"e_1_3_2_2_18_1","volume-title":"2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). 1420--1424","author":"Ito Hiroki","year":"2020","unstructured":"Hiroki Ito , Yuma Kinoshita , and Hitoshi Kiya . 2020 a. A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks . In 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). 1420--1424 . Hiroki Ito, Yuma Kinoshita, and Hitoshi Kiya. 2020 a. A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks. In 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). 1420--1424."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE50665.2020.9292064"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2020SMP0022"},{"key":"e_1_3_2_2_23_1","volume-title":"An encryption-then-compression system for lossless image compression standards. IEICE transactions on information and systems","author":"Kurihara Kenta","year":"2017","unstructured":"Kenta Kurihara , Shoko Imaizumi , Sayaka Shiota , and Hitoshi Kiya . 2017. An encryption-then-compression system for lossless image compression standards. IEICE transactions on information and systems , Vol. 100 , 1 ( 2017 ), 52--56. Kenta Kurihara, Shoko Imaizumi, Sayaka Shiota, and Hitoshi Kiya. 2017. An encryption-then-compression system for lossless image compression standards. IEICE transactions on information and systems, Vol. 100, 1 (2017), 52--56."},{"key":"e_1_3_2_2_24_1","volume-title":"Deep learning. nature","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. nature , Vol. 521 , 7553 ( 2015 ), 436. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature, Vol. 521, 7553 (2015), 436."},{"key":"e_1_3_2_2_25_1","volume-title":"Piracy resistant watermarks for deep neural networks. arXiv:1910.01226","author":"Li Huiying","year":"2019","unstructured":"Huiying Li , Emily Wenger , Ben Y Zhao , and Haitao Zheng . 2019. Piracy resistant watermarks for deep neural networks. arXiv:1910.01226 ( 2019 ). https:\/\/arxiv.org\/abs\/1910.01226 Huiying Li, Emily Wenger, Ben Y Zhao, and Haitao Zheng. 2019. Piracy resistant watermarks for deep neural networks. arXiv:1910.01226 (2019). https:\/\/arxiv.org\/abs\/1910.01226"},{"key":"e_1_3_2_2_26_1","volume-title":"Block-wise Scrambled Image Recognition Using Adaptation Network. arXiv:2001.07761","author":"Madono Koki","year":"2020","unstructured":"Koki Madono , Masayuki Tanaka , Masaki Onishi , and Tetsuji Ogawa . 2020. Block-wise Scrambled Image Recognition Using Adaptation Network. arXiv:2001.07761 ( 2020 ). https:\/\/arxiv.org\/abs\/2001.07761 Koki Madono, Masayuki Tanaka, Masaki Onishi, and Tetsuji Ogawa. 2020. Block-wise Scrambled Image Recognition Using Adaptation Network. arXiv:2001.07761 (2020). https:\/\/arxiv.org\/abs\/2001.07761"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"e_1_3_2_2_28_1","volume-title":"Boris Ginsburg, Michael Houston, Oleksii Kuchaiev, Ganesh Venkatesh, and Hao Wu.","author":"Micikevicius Paulius","year":"2017","unstructured":"Paulius Micikevicius , Sharan Narang , Jonah Alben , Gregory F. Diamos , Erich Elsen , David Garc'i a , Boris Ginsburg, Michael Houston, Oleksii Kuchaiev, Ganesh Venkatesh, and Hao Wu. 2017 . Mixed Precision Training . arXiv:1710.03740 (2017). http:\/\/arxiv.org\/abs\/1710.03740 Paulius Micikevicius, Sharan Narang, Jonah Alben, Gregory F. Diamos, Erich Elsen, David Garc'i a, Boris Ginsburg, Michael Houston, Oleksii Kuchaiev, Ganesh Venkatesh, and Hao Wu. 2017. Mixed Precision Training. arXiv:1710.03740 (2017). http:\/\/arxiv.org\/abs\/1710.03740"},{"key":"e_1_3_2_2_29_1","volume-title":"Pruning Convolutional Neural Networks for Resource Efficient Inference. In International Conference on Learning Representations .","author":"Molchanov Pavlo","year":"2017","unstructured":"Pavlo Molchanov , Stephen Tyree , Tero Karras , Timo Aila , and Jan Kautz . 2017 . Pruning Convolutional Neural Networks for Resource Efficient Inference. In International Conference on Learning Representations . Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. 2017. Pruning Convolutional Neural Networks for Resource Efficient Inference. In International Conference on Learning Representations ."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-018-0147-1"},{"key":"e_1_3_2_2_31_1","volume-title":"DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models. arXiv:1804.00750","author":"Rouhani Bita Darvish","year":"2018","unstructured":"Bita Darvish Rouhani , Huili Chen , and Farinaz Koushanfar . 2018. DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models. arXiv:1804.00750 ( 2018 ). http:\/\/arxiv.org\/abs\/1804.00750 Bita Darvish Rouhani, Huili Chen, and Farinaz Koushanfar. 2018. DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models. arXiv:1804.00750 (2018). http:\/\/arxiv.org\/abs\/1804.00750"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_2_33_1","volume-title":"Visual Decoding of Hidden Watermark in Trained Deep Neural Network. In 2nd IEEE Conference on Multimedia Information Processing and Retrieval. 371--374","author":"Sakazawa Shigeyuki","year":"2019","unstructured":"Shigeyuki Sakazawa , Emi Myodo , Kazuyuki Tasaka , and Hiromasa Yanagihara . 2019 . Visual Decoding of Hidden Watermark in Trained Deep Neural Network. In 2nd IEEE Conference on Multimedia Information Processing and Retrieval. 371--374 . Shigeyuki Sakazawa, Emi Myodo, Kazuyuki Tasaka, and Hiromasa Yanagihara. 2019. Visual Decoding of Hidden Watermark in Trained Deep Neural Network. In 2nd IEEE Conference on Multimedia Information Processing and Retrieval. 371--374."},{"key":"e_1_3_2_2_34_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations .","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015 . Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations . Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations ."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2018.33"},{"key":"e_1_3_2_2_37_1","volume-title":"2020 28th European Signal Processing Conference (EUSIPCO). 745--749","author":"Sirichotedumrong Warit","year":"2020","unstructured":"Warit Sirichotedumrong and Hitoshi Kiya . 2020 . A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks . In 2020 28th European Signal Processing Conference (EUSIPCO). 745--749 . Warit Sirichotedumrong and Hitoshi Kiya. 2020. A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks. In 2020 28th European Signal Processing Conference (EUSIPCO). 745--749."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"e_1_3_2_2_39_1","volume-title":"Smith and Nicholay Topin","author":"Leslie","year":"2017","unstructured":"Leslie N. Smith and Nicholay Topin . 2017 . Super-Convergence: Very Fast Training of Residual Networks Using Large Learning Rates . arXiv:1708.07120 (2017). http:\/\/arxiv.org\/abs\/1708.07120 Leslie N. Smith and Nicholay Topin. 2017. Super-Convergence: Very Fast Training of Residual Networks Using Large Learning Rates. arXiv:1708.07120 (2017). http:\/\/arxiv.org\/abs\/1708.07120"},{"key":"e_1_3_2_2_40_1","volume-title":"Learnable Image Encryption. In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). 1--2.","author":"Tanaka Masayuki","year":"2018","unstructured":"Masayuki Tanaka . 2018 . Learnable Image Encryption. In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). 1--2. Masayuki Tanaka. 2018. Learnable Image Encryption. In 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). 1--2."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682202"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"}],"event":{"name":"IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security","location":"Virtual Event Belgium","acronym":"IH&MMSec '21","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437880.3460398","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437880.3460398","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437880.3460398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:26Z","timestamp":1750191446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437880.3460398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,17]]},"references-count":43,"alternative-id":["10.1145\/3437880.3460398","10.1145\/3437880"],"URL":"https:\/\/doi.org\/10.1145\/3437880.3460398","relation":{},"subject":[],"published":{"date-parts":[[2021,6,17]]},"assertion":[{"value":"2021-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}