{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:31:03Z","timestamp":1776889863697,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3612015","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T07:27:30Z","timestamp":1698391650000},"page":"7922-7932","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Practical Deep Dispersed Watermarking with Synchronization and Fusion"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9700-9180","authenticated-orcid":false,"given":"Hengchang","family":"Guo","sequence":"first","affiliation":[{"name":"ByteDance Inc., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2591-5762","authenticated-orcid":false,"given":"Qilong","family":"Zhang","sequence":"additional","affiliation":[{"name":"ByteDance Inc., Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5051-4336","authenticated-orcid":false,"given":"Junwei","family":"Luo","sequence":"additional","affiliation":[{"name":"ByteDance Inc., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0814-8360","authenticated-orcid":false,"given":"Feng","family":"Guo","sequence":"additional","affiliation":[{"name":"ByteDance Inc., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3860-8516","authenticated-orcid":false,"given":"Wenbin","family":"Zhang","sequence":"additional","affiliation":[{"name":"ByteDance Inc., Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0330-3145","authenticated-orcid":false,"given":"Xiaodong","family":"Su","sequence":"additional","affiliation":[{"name":"ByteDance Inc., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8104-5878","authenticated-orcid":false,"given":"Minglei","family":"Li","sequence":"additional","affiliation":[{"name":"ByteDance Inc., Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157"},{"key":"e_1_3_2_1_2_1","volume-title":"Rainu Nandal, and Rishabh Jain.","author":"Allwadhi Sachin","year":"2022","unstructured":"Sachin Allwadhi, Kamaldeep Joshi, Ashok Kumar Yadav, Rainu Nandal, and Rishabh Jain. 2022. A comprehensive survey of state-of-art techniques in digital watermarking. In ICAC3N. 2362--2368."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00015-2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_2_1_5_1","volume-title":"A Novel Robust Blind AES\/LWT DCT SVD-Based Crypto-Watermarking schema for DICOM Images Security","author":"Boussif Mohamed","unstructured":"Mohamed Boussif, Oussema Bouferas, Noureddine Aloui, and Adnen Cherif. 2021. A Novel Robust Blind AES\/LWT DCT SVD-Based Crypto-Watermarking schema for DICOM Images Security. In DTS. IEEE, 1--6."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7040069"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.812753"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164562"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746058"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.465263"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2019.03.03"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Daren Huang Jiufen Liu Jiwu Huang and Hongmei Liu. 2001. A Dwt-Based Image Watermarking Algorithm. In ICME. https:\/\/doi.org\/10.1109\/ICME.2001.1237719","DOI":"10.1109\/ICME.2001.1237719"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815957"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.005"},{"key":"e_1_3_2_1_20_1","volume-title":"The Open Images Dataset V4: Unified image classification, object detection, and visual relationship detection at scale. CoRR","author":"Kuznetsova Alina","year":"2018","unstructured":"Alina Kuznetsova, Hassan Rom, Neil Alldrin, Jasper R. R. Uijlings, Ivan Krasin, Jordi Pont-Tuset, Shahab Kamali, Stefan Popov, Matteo Malloci, Tom Duerig, and Vittorio Ferrari. 2018. The Open Images Dataset V4: Unified image classification, object detection, and visual relationship detection at scale. CoRR, Vol. abs\/1811.00982 (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Yang Liu Mengxi Guo Jian Zhang Yuesheng Zhu and Xiaodong Xie. 2019. A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking. In ACM MM Laurent Amsaleg Benoit Huet Martha A. Larson Guillaume Gravier Hayley Hung Chong-Wah Ngo and Wei Tsang Ooi (Eds.). 1509--1517. https:\/\/doi.org\/10.1145\/3343031.3351025","DOI":"10.1145\/3343031.3351025"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19772-7_32"},{"key":"e_1_3_2_1_25_1","unstructured":"Ilya Loshchilov and Frank Hutter. 2019. Decoupled Weight Decay Regularization. In ICLR."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2206.10813"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107255"},{"key":"e_1_3_2_1_28_1","volume-title":"Edward Z. Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala.","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas K\u00f6 pf, Edward Z. Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In NeurIPS, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alch\u00e9-Buc, Emily B. Fox, and Roman Garnett (Eds.). 8024--8035."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.846253"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1961.287814"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107404"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"Xuebin Qin Zichen Zhang Chenyang Huang Chao Gao Masood Dehghan and Martin J\u00e4gersand. 2019. BASNet: Boundary-Aware Salient Object Detection. In CVPR. 7479--7489. https:\/\/doi.org\/10.1109\/CVPR.2019.00766","DOI":"10.1109\/CVPR.2019.00766"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0090-8"},{"key":"e_1_3_2_1_34_1","volume-title":"NeurIPS Workshop.","author":"Shin Richard","year":"2017","unstructured":"Richard Shin and Dawn Song. 2017. Jpeg-resistant adversarial images. In NeurIPS Workshop."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.465307"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.361"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3005304"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Matthew Tancik Ben Mildenhall and Ren Ng. 2020. StegaStamp: Invisible Hyperlinks in Physical Photographs. In CVPR. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00219","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.02.083"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_10"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","unstructured":"Zhibo Wang Hengchang Guo Zhifei Zhang Wenxin Liu Zhan Qin and Kui Ren. 2021a. Feature Importance-aware Transferable Adversarial Attacks. In ICCV. 7619--7628. https:\/\/doi.org\/10.1109\/ICCV48922.2021.00754","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"e_1_3_2_1_44_1","first-page":"1398","article-title":"Multiscale structural similarity for image quality assessment","volume":"2","author":"Wang Zhou","year":"2003","unstructured":"Zhou Wang, Eero P Simoncelli, and Alan C Bovik. 2003. Multiscale structural similarity for image quality assessment. In ACSSC, Vol. 2. 1398--1402.","journal-title":"ACSSC"},{"key":"e_1_3_2_1_45_1","unstructured":"Shengming Yuan Qilong Zhang Lianli Gao Yaya Cheng and Jingkuan Song. 2022. Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks. In NeurIPS."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2203.04607"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","location":"Ottawa ON Canada","acronym":"MM '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3612015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:58Z","timestamp":1755820858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":47,"alternative-id":["10.1145\/3581783.3612015","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3612015","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}