{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:16Z","timestamp":1750309456150,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009592","name":"Beijing Municipal Science and Technology Commission","doi-asserted-by":"publisher","award":["Z231100005923044, and E3Z0261"],"award-info":[{"award-number":["Z231100005923044, and E3Z0261"]}],"id":[{"id":"10.13039\/501100009592","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,3]]},"DOI":"10.1145\/3696409.3700282","type":"proceedings-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T09:55:23Z","timestamp":1735379723000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Flexible Semantic Watermarking for Robust Diffusion Model Detection and Tracing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3141-3084","authenticated-orcid":false,"given":"Zhitong","family":"Zhu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3966-511X","authenticated-orcid":false,"given":"Jing","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Minzu University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-0221","authenticated-orcid":false,"given":"Keke","family":"Gai","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1598-0764","authenticated-orcid":false,"given":"Jiamin","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3533-4874","authenticated-orcid":false,"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4303-5559","authenticated-orcid":false,"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Ali Al-Haj. 2007. Combined DWT-DCT digital image watermarking. Journal of computer science 3 9 (2007) 740\u2013746.","DOI":"10.3844\/jcssp.2007.740.746"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Hai Ci Pei Yang Yiren Song and Mike\u00a0Zheng Shou. 2024. RingID: Rethinking Tree-Ring Watermarking for Enhanced Multi-Key Identification. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.14055 (2024).","DOI":"10.1007\/978-3-031-73390-1_20"},{"key":"e_1_3_3_1_4_2","unstructured":"Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion models beat gans on image synthesis. Advances in neural information processing systems 34 (2021) 8780\u20138794."},{"key":"e_1_3_3_1_5_2","unstructured":"Weitao Feng Jiyan He Jie Zhang Tianwei Zhang Wenbo Zhou Weiming Zhang and Nenghai Yu. 2023. Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.05940 (2023)."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02053"},{"key":"e_1_3_3_1_7_2","unstructured":"Stephanie Fu Netanel Tamir Shobhita Sundaram Lucy Chai Richard Zhang Tali Dekel and Phillip Isola. 2023. Dreamsim: Learning new dimensions of human visual similarity using synthetic data. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.09344 (2023)."},{"key":"e_1_3_3_1_8_2","unstructured":"Martin Heusel Hubert Ramsauer Thomas Unterthiner Bernhard Nessler and Sepp Hochreiter. 2017. Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_3_1_9_2","unstructured":"Jonathan Ho Ajay Jain and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in neural information processing systems 33 (2020) 6840\u20136851."},{"key":"e_1_3_3_1_10_2","unstructured":"Seongmin Hong Kyeonghyun Lee Suh\u00a0Yoon Jeon Hyewon Bae and Se\u00a0Young Chun. 2023. On Exact Inversion of DPM-Solvers. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2311.18387 (2023)."},{"key":"e_1_3_3_1_11_2","unstructured":"Minghui Hu Jianbin Zheng Chuanxia Zheng Chaoyue Wang Dacheng Tao and Tat-Jen Cham. 2023. One More Step: A Versatile Plug-and-Play Module for Rectifying Diffusion Schedule Flaws and Enhancing Low-Frequency Controls. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2311.15744 (2023)."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Li Lin Neeraj Gupta Yue Zhang Hainan Ren Chun-Hao Liu Feng Ding Xin Wang Xin Li Luisa Verdoliva and Shu Hu. 2024. Detecting multimedia generated by large ai models: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.00045 (2024).","DOI":"10.36227\/techrxiv.170723324.44685515\/v1"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00532"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Ruizhen Liu and Tieniu Tan. 2002. An SVD-based watermarking scheme for protecting rightful ownership. IEEE transactions on multimedia 4 1 (2002) 121\u2013128.","DOI":"10.1109\/6046.985560"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554423"},{"key":"e_1_3_3_1_16_2","unstructured":"Alex Nichol Prafulla Dhariwal Aditya Ramesh Pranav Shyam Pamela Mishkin Bob McGrew Ilya Sutskever and Mark Chen. 2021. Glide: Towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2112.10741 (2021)."},{"key":"e_1_3_3_1_17_2","first-page":"8748","volume-title":"International conference on machine learning","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong\u00a0Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et\u00a0al. 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PMLR, 8748\u20138763."},{"key":"e_1_3_3_1_18_2","unstructured":"Aditya Ramesh Prafulla Dhariwal Alex Nichol Casey Chu and Mark Chen. 2022. Hierarchical text-conditional image generation with clip latents. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2204.06125 1 2 (2022) 3."},{"key":"e_1_3_3_1_19_2","unstructured":"Jonas Ricker Simon Damm Thorsten Holz and Asja Fischer. 2022. Towards the detection of diffusion model deepfakes. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2210.14571 (2022)."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_3_1_21_2","unstructured":"Jiaming Song Chenlin Meng and Stefano Ermon. 2020. Denoising diffusion implicit models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.02502 (2020)."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"e_1_3_3_1_23_2","unstructured":"Yuxin Wen John Kirchenbauer Jonas Geiping and Tom Goldstein. 2024. Tree-rings watermarks: Invisible fingerprints for diffusion images. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612448"},{"key":"e_1_3_3_1_25_2","volume-title":"International Conference on Learning Representations","author":"Yu Ning","year":"2022","unstructured":"Ning Yu, Vladislav Skripniuk, Dingfan Chen, Larry\u00a0S Davis, and Mario Fritz. 2022. Responsible Disclosure of Generative Models Using Scalable Fingerprinting. In International Conference on Learning Representations."},{"key":"e_1_3_3_1_26_2","unstructured":"Kevin\u00a0Alex Zhang Lei Xu Alfredo Cuesta-Infante and Kalyan Veeramachaneni. 2019. Robust invisible video watermarking with attention. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1909.01285 (2019)."},{"key":"e_1_3_3_1_27_2","unstructured":"Yichi Zhang and Xiaogang Xu. 2023. Diffusion noise feature: Accurate and fast generated image detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2312.02625 (2023)."},{"key":"e_1_3_3_1_28_2","unstructured":"Yunqing Zhao Tianyu Pang Chao Du Xiao Yang Ngai-Man Cheung and Min Lin. 2023. A recipe for watermarking diffusion models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.10137 (2023)."},{"key":"e_1_3_3_1_29_2","unstructured":"Ye Zhu Yu Wu Zhiwei Deng Olga Russakovsky and Yan Yan. 2024. Boundary guided learning-free semantic control with diffusion models. Advances in Neural Information Processing Systems 36 (2024)."}],"event":{"name":"MMAsia '24: ACM Multimedia Asia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Auckland New Zealand","acronym":"MMAsia '24"},"container-title":["Proceedings of the 6th ACM International Conference on Multimedia in Asia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696409.3700282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696409.3700282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:16Z","timestamp":1750295416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696409.3700282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,3]]},"references-count":28,"alternative-id":["10.1145\/3696409.3700282","10.1145\/3696409"],"URL":"https:\/\/doi.org\/10.1145\/3696409.3700282","relation":{},"subject":[],"published":{"date-parts":[[2024,12,3]]},"assertion":[{"value":"2024-12-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}