{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T16:06:15Z","timestamp":1750349175422,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities"},{"name":"the Opening Project of State Key Laboratory of Information Security, the Opening Project of Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security"},{"name":"Natural Science Foundation of Guangdong Province, China","award":["2019B010137005, 2018A030313387"],"award-info":[{"award-number":["2019B010137005, 2018A030313387"]}]},{"name":"Science and Technology Program of Guangzhou","award":["202007040004, 201804010428"],"award-info":[{"award-number":["202007040004, 201804010428"]}]},{"name":"Key R\\&D Program of Guangdong Province","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802145"],"award-info":[{"award-number":["61802145"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506498","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"46-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Visible Watermark Removal Based on Dual-input Network"],"prefix":"10.1145","author":[{"given":"Tong","family":"Li","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Jinan University, GuangZhou, GuangDong, China"}]},{"given":"Bingwen","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, GuangZhou, GuangDong, China"}]},{"given":"Guofeng","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, GuangZhou, GuangDong, China"}]},{"given":"Xinzhen","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, GuangZhou, GuangDong, China"}]},{"given":"Mingjin","family":"He","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, GuangZhou, GuangDong, China"}]},{"given":"Peiya","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, GuangZhou, GuangDong, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.235469"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03338-5_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.726"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2018.8486522"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.84"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.884011"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20010838"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.819579"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451252"},{"key":"e_1_3_2_1_12_1","volume-title":"Towards Photo-Realistic Visible Watermark Removal with Conditional Generative Adversarial Networks. In International Conference on Image and Graphics. Springer, 345--356","author":"Li Xiang","year":"2019","unstructured":"Xiang Li , Chan Lu , Danni Cheng , Wei-Hong Li , Mei Cao , Bo Liu , Jiechao Ma , and Wei-Shi Zheng . 2019 . Towards Photo-Realistic Visible Watermark Removal with Conditional Generative Adversarial Networks. In International Conference on Image and Graphics. Springer, 345--356 . Xiang Li, Chan Lu, Danni Cheng, Wei-Hong Li, Mei Cao, Bo Liu, Jiechao Ma, and Wei-Shi Zheng. 2019. Towards Photo-Realistic Visible Watermark Removal with Conditional Generative Adversarial Networks. In International Conference on Image and Graphics. Springer, 345--356."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_6"},{"key":"e_1_3_2_1_15_1","volume-title":"Single-image fence removal using deep convolutional neural network","author":"Matsui Takuro","year":"2019","unstructured":"Takuro Matsui and Masaaki Ikehara . 2019. Single-image fence removal using deep convolutional neural network . IEEE Access ( 2019 ). Takuro Matsui and Masaaki Ikehara. 2019. Single-image fence removal using deep convolutional neural network. IEEE Access (2019)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2000.871535"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.278"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.885031"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2019.8739213"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4931-3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.01.010"},{"key":"e_1_3_2_1_22_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"e_1_3_2_1_24_1","volume-title":"Multi-Scale Deep Residual Learning-Based Single Image Haze Removal via Image Decomposition","author":"Yeh Chia-Hung","year":"2019","unstructured":"Chia-Hung Yeh , Chih-Hsiang Huang , and Li-Wei Kang . 2019. Multi-Scale Deep Residual Learning-Based Single Image Haze Removal via Image Decomposition . IEEE Transactions on Image Processing ( 2019 ). Chia-Hung Yeh, Chih-Hsiang Huang, and Li-Wei Kang. 2019. Multi-Scale Deep Residual Learning-Based Single Image Haze Removal via Image Decomposition. IEEE Transactions on Image Processing (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659733"},{"key":"e_1_3_2_1_26_1","volume-title":"Residual non-local attention networks for image restoration. arXiv preprint arXiv:1903.10082","author":"Zhang Yulun","year":"2019","unstructured":"Yulun Zhang , Kunpeng Li , Kai Li , Bineng Zhong , and Yun Fu. 2019. Residual non-local attention networks for image restoration. arXiv preprint arXiv:1903.10082 ( 2019 ). Yulun Zhang, Kunpeng Li, Kai Li, Bineng Zhong, and Yun Fu. 2019. Residual non-local attention networks for image restoration. arXiv preprint arXiv:1903.10082 (2019)."}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:21Z","timestamp":1750183761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":26,"alternative-id":["10.1145\/3491396.3506498","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506498","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}