{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:52:09Z","timestamp":1775145129897,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583489","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2340-2348","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["IRWArt: Levering Watermarking Performance for Protecting High-quality Artwork Images"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9924-1100","authenticated-orcid":false,"given":"Yuanjing","family":"Luo","sequence":"first","affiliation":[{"name":"National University of Defense Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6620-1898","authenticated-orcid":false,"given":"Tongqing","family":"Zhou","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-3878","authenticated-orcid":false,"given":"Fang","family":"Liu","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5726-833X","authenticated-orcid":false,"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"313","article-title":"Why art does not need copyright. Geo","volume":"86","author":"Adler Amy","year":"2018","unstructured":"Amy Adler. 2018. Why art does not need copyright. Geo. Wash. L. Rev. 86 (2018), 313.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of ICLR.","author":"Ardizzone Lynton","year":"2018","unstructured":"Lynton Ardizzone, Jakob Kruse, Carsten Rother, and Ullrich K\u00f6the. 2018. Analyzing Inverse Problems with Invertible Neural Networks. In Proc. of ICLR."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of NeurIPS. 2066\u20132076","author":"Baluja Shumeet","year":"2017","unstructured":"Shumeet Baluja. 2017. Hiding images in plain sight: deep steganography. In Proc. of NeurIPS. 2066\u20132076."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.918570"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.511977"},{"key":"e_1_3_2_1_7_1","volume-title":"From Painting to Pixel: Understanding NFT Artworks. Rotterdam: Universidad Erasmo. Disponible en formato digital aqu\u00ed","author":"Bsteh Sheila","year":"2021","unstructured":"Sheila Bsteh. 2021. From Painting to Pixel: Understanding NFT Artworks. Rotterdam: Universidad Erasmo. Disponible en formato digital aqu\u00ed (2021)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of ICML. PMLR, 1597\u20131607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In Proc. of ICML. PMLR, 1597\u20131607."},{"key":"e_1_3_2_1_9_1","unstructured":"Ingemar Cox Matthew Miller Jeffrey Bloom Jessica Fridrich and Ton Kalker. 2007. Digital watermarking and steganography. Morgan kaufmann."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.1494075"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548433"},{"key":"e_1_3_2_1_12_1","unstructured":"Dom Carter. 2019. How can designers deal with plagiarism?https:\/\/www.creativebloq.com\/features\/how-can-designers-deal-with-plagiarism."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/236"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of NeurIPS. 1951\u20131960","author":"Hayes Jamie","year":"2017","unstructured":"Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In Proc. of NeurIPS. 1951\u20131960."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.736686"},{"key":"e_1_3_2_1_17_1","volume-title":"Spatial transformer networks. Advances in neural information processing systems 28","author":"Jaderberg Max","year":"2015","unstructured":"Max Jaderberg, Karen Simonyan, and Andrew Zisserman. 2015. Spatial transformer networks. Advances in neural information processing systems 28 (2015)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies9010002"},{"key":"e_1_3_2_1_19_1","volume-title":"RIHOOP: robust invisible hyperlinks in offline and online photographs","author":"Jia Jun","year":"2020","unstructured":"Jun Jia, Zhongpai Gao, Kang Chen, Menghan Hu, Xiongkuo Min, Guangtao Zhai, and Xiaokang Yang. 2020. RIHOOP: robust invisible hyperlinks in offline and online photographs. IEEE Transactions on Cybernetics (2020)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00267"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of ISIE. 272\u2013277","author":"Lee Sin-Joo","year":"2001","unstructured":"Sin-Joo Lee and Sung-Hwan Jung. 2001. A survey of watermarking techniques applied to multimedia. In Proc. of ISIE. 272\u2013277."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351025"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"e_1_3_2_1_27_1","unstructured":"Madeline Shields. 2022. Plagiarism in Art Cases and How to Avoid It. https:\/\/fixgerald.com\/blog\/plagiarism-in-art."},{"key":"e_1_3_2_1_28_1","volume-title":"A theory for multiresolution signal decomposition: the wavelet representation","author":"Mallat G.","year":"1989","unstructured":"Stephane\u00a0G. Mallat. 1989. A theory for multiresolution signal decomposition: the wavelet representation. IEEE transactions on pattern analysis and machine intelligence 11, 7 (1989), 674\u2013693."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of LREC.","author":"Mohammad Saif","year":"2018","unstructured":"Saif Mohammad and Svetlana Kiritchenko. 2018. Wikiart emotions: An annotated dataset of emotions evoked by art. In Proc. of LREC."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.067"},{"key":"e_1_3_2_1_31_1","unstructured":"Seung-Min Mun Seung-Hun Nam Han-Ul Jang Dongkyu Kim and Heung-Kyu Lee. 2017. A robust blind watermarking using convolutional neural network. https:\/\/arxiv.org\/abs\/1704.03248. (2017)."},{"key":"e_1_3_2_1_32_1","volume-title":"Plagiarism and copyright infringement. Originality, imitation, and plagiarism: Teaching writing in the digital age","author":"Murray J","year":"2008","unstructured":"Laura\u00a0J Murray. 2008. Plagiarism and copyright infringement. Originality, imitation, and plagiarism: Teaching writing in the digital age (2008), 173\u2013182."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19960711"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.909440"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of ICML. PMLR, 8748\u20138763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong\u00a0Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, 2021. Learning transferable visual models from natural language supervision. In Proc. of ICML. PMLR, 8748\u20138763."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560428"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421631"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of NeurIPS, Vol.\u00a032","author":"Song Yang","year":"2019","unstructured":"Yang Song, Chenlin Meng, and Stefano Ermon. 2019. Mintnet: Building invertible neural networks with masked convolutions. In Proc. of NeurIPS, Vol.\u00a032."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-014-0446-1"},{"key":"e_1_3_2_1_40_1","unstructured":"Abdelfatah\u00a0A. Tamimi Ayman\u00a0M. Abdalla and Omaima Al-Allaf. 2013. Hiding an image inside another image using variable-rate steganography. (2013)."},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. of NeurIPS. 6827\u20136839","author":"Tian Yonglong","year":"2020","unstructured":"Yonglong Tian, Chen Sun, Ben Poole, Dilip Krishnan, Cordelia Schmid, and Phillip Isola. 2020. What makes for good views for contrastive learning?. In Proc. of NeurIPS. 6827\u20136839."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.149"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. of CVPR. 4720\u20134728","author":"FA.","unstructured":"Tycho\u00a0FA. van\u00a0der Ouderaa and Daniel\u00a0E. Worrall. 2019. Reversible gans for memory-efficient image-to-image translation. In Proc. of CVPR. 4720\u20134728."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325011"},{"key":"e_1_3_2_1_45_1","unstructured":"White Lewis. 2019. Opensea the largest NFT market confirms 80 of NFTs are scams. https:\/\/stealthoptional.com\/crypto\/opensea-80-percent-nfts-scams."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_8"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5463"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. of NeurIPS, Vol.\u00a033","author":"Zhang Chaoning","year":"2020","unstructured":"Chaoning Zhang, Philipp Benz, Adil Karjauv, Geng Sun, and In\u00a0So Kweon. 2020. Udh: Universal deep hiding for steganography, watermarking, and light field messaging. In Proc. of NeurIPS, Vol.\u00a033. 10223\u201310234."},{"key":"e_1_3_2_1_50_1","unstructured":"Honglei Zhang Hu Wang Yidong Li Yuanzhouhan Cao and Chunhua Shen. 2020. Robust watermarking using inverse gradient attention. https:\/\/arxiv.org\/abs\/2011.10850. (2020)."},{"key":"e_1_3_2_1_51_1","volume-title":"Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising","author":"Zhang Kai","year":"2017","unstructured":"Kai Zhang, Wangmeng Zuo, Yunjin Chen, Deyu Meng, and Lei Zhang. 2017. Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising. IEEE transactions on image processing 26, 7 (2017), 3142\u20133155."},{"key":"e_1_3_2_1_52_1","volume-title":"Invisible steganography via generative adversarial networks. Multimedia tools and applications 78","author":"Zhang Ru","year":"2019","unstructured":"Ru Zhang, Shiqi Dong, and Jianyi Liu. 2019. Invisible steganography via generative adversarial networks. Multimedia tools and applications 78 (2019), 8559\u20138575."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3006415"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:54Z","timestamp":1750178874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":55,"alternative-id":["10.1145\/3543507.3583489","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583489","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}