{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:14:49Z","timestamp":1775067289566,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23B2023,61902235"],"award-info":[{"award-number":["U23B2023,61902235"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1145\/3658664.3659634","type":"proceedings-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T15:09:27Z","timestamp":1718204967000},"page":"223-234","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8559-4599","authenticated-orcid":false,"given":"Li","family":"Zhang","sequence":"first","affiliation":[{"name":"Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8478-8525","authenticated-orcid":false,"given":"Yong","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5867-1315","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1599-7232","authenticated-orcid":false,"given":"Hanzhou","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. USENIX Conference on Security Symposium. 1615--1631","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In Proc. USENIX Conference on Security Symposium. 1615--1631."},{"key":"e_1_3_2_1_2_1","unstructured":"Gwern Branwen and A Gokaslan. 2019. Danbooru2019: A Large-Scale Crowdsourced and Tagged Anime Illustration Dataset."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.26.000157"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUSIPCO.2015.7362343"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325042"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_7_1","unstructured":"Ingemar Cox Matthew Miller Jeffrey Bloom Jessica Fridrich and Ton Kalker. 2007. Digital watermarking and steganography. Morgan kaufmann."},{"key":"e_1_3_2_1_8_1","first-page":"10","article-title":"Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks","volume":"32","author":"Fan Lixin","year":"2019","unstructured":"Lixin Fan, Kam Woh Ng, and Chee Seng Chan. 2019. Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. In Proc. Neural Information Processing Systems, Vol. 32. 10.","journal-title":"Proc. Neural Information Processing Systems"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. International Conference on Machine Learning. 3247--3258","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Thorsten Eisenhofer, Lea Sch\u00f6nherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz. 2020. Leveraging frequency analysis for deep fake image recognition. In Proc. International Conference on Machine Learning. 3247--3258."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Rafael C Gonzalez. 2009. Digital image processing. Pearson education india.","DOI":"10.1117\/1.3115362"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240862"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. International Conference on Machine Learning. 448--456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In Proc. International Conference on Machine Learning. 448--456."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"e_1_3_2_1_16_1","volume-title":"Progressive growing of gans for improved quality, stability, and variation. arXiv Preprint arXiv:1710.10196","author":"Karras Tero","year":"2017","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality, stability, and variation. arXiv Preprint arXiv:1710.10196 (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_18_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_20_1","volume-title":"Nature","volume":"521","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature, Vol. 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_21_1","volume-title":"Piracy resistant watermarks for deep neural networks. arXiv Preprint arXiv:1910.01226","author":"Li Huiying","year":"2019","unstructured":"Huiying Li, Emily Wenger, Shawn Shan, Ben Y Zhao, and Haitao Zheng. 2019b. Piracy resistant watermarks for deep neural networks. arXiv Preprint arXiv:1910.01226 (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359801"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800818"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2633878"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2116010"},{"key":"e_1_3_2_1_27_1","volume-title":"Deconvolution and checkerboard artifacts. Distill","author":"Odena Augustus","year":"2016","unstructured":"Augustus Odena, Vincent Dumoulin, and Chris Olah. 2016. Deconvolution and checkerboard artifacts. Distill (2016)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_1_29_1","volume-title":"Neural machine translation of rare words with subword units. arXiv Preprint arXiv:1508.07909","author":"Sennrich Rico","year":"2015","unstructured":"Rico Sennrich, Barry Haddow, and Alexandra Birch. 2015. Neural machine translation of rare words with subword units. arXiv Preprint arXiv:1508.07909 (2015)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"key":"e_1_3_2_1_31_1","volume-title":"Nature","volume":"550","author":"Silver David","year":"2017","unstructured":"David Silver, Julian Schrittwieser, Karen Simonyan, et al. 2017. Mastering the game of go without human knowledge. Nature, Vol. 550, 7676 (2017), 354--359."},{"key":"e_1_3_2_1_32_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv Preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv Preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9413062"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-1313.1992.tb00296.x"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2020.4.MWSF-022"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450000"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030619"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3030671"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.12.008"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2556585"},{"key":"e_1_3_2_1_46_1","volume-title":"Empirical evaluation of rectified activations in convolutional network. arXiv Preprint arXiv:1505.00853","author":"Xu Bing","year":"2015","unstructured":"Bing Xu, Naiyan Wang, Tianqi Chen, and Mu Li. 2015. Empirical evaluation of rectified activations in convolutional network. arXiv Preprint arXiv:1505.00853 (2015)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2895793"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01616"},{"key":"e_1_3_2_1_49_1","first-page":"10223","article-title":"Udh: Universal deep hiding for steganography, watermarking, and light field messaging","volume":"33","author":"Zhang Chaoning","year":"2020","unstructured":"Chaoning Zhang, Philipp Benz, Adil Karjauv, Geng Sun, and In So Kweon. 2020a. Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Proc. Neural Information Processing Systems , Vol. 33 (2020), 10223--10234.","journal-title":"Proc. Neural Information Processing Systems"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6976"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3064850"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"e_1_3_2_1_53_1","volume-title":"Generative Model Watermarking Based on Human Visual System. arXiv Preprint arXiv:2209.15268","author":"Zhang Li","year":"2022","unstructured":"Li Zhang, Yong Liu, Shaoteng Liu, Tianshu Yang, Yexin Wang, Xinpeng Zhang, and Hanzhou Wu. 2022. Generative Model Watermarking Based on Human Visual System. arXiv Preprint arXiv:2209.15268 (2022)."},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. International Conference on Machine Learning. 7324--7334","author":"Zhang Richard","year":"2019","unstructured":"Richard Zhang. 2019. Making convolutional networks shift-invariant again. In Proc. International Conference on Machine Learning. 7324--7334."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS52919.2021.9486352"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS53200.2021.9648376"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"}],"event":{"name":"IH&MMSEC '24: ACM Workshop on Information Hiding and Multimedia Security","location":"Baiona Spain","acronym":"IH&MMSEC '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658664.3659634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:43:10Z","timestamp":1755906190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":57,"alternative-id":["10.1145\/3658664.3659634","10.1145\/3658664"],"URL":"https:\/\/doi.org\/10.1145\/3658664.3659634","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]},"assertion":[{"value":"2024-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}