{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T20:53:20Z","timestamp":1774904000072,"version":"3.50.1"},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1587\/transinf.2019mup0007","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T22:06:54Z","timestamp":1577830014000},"page":"33-41","source":"Crossref","is-referenced-by-count":21,"title":["Neural Watermarking Method Including an Attack Simulator against Rotation and Compression Attacks"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Ippei","family":"HAMAMOTO","sequence":"first","affiliation":[{"name":"Graduate School of Sciences and Technology for Innovation, Yamaguchi University"}]},{"given":"Masaki","family":"KAWAMURA","sequence":"additional","affiliation":[{"name":"Graduate School of Sciences and Technology for Innovation, Yamaguchi University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, \u201cInformation hiding \u2014 A survey,\u201d Proc. IEEE, vol.87, no.7, pp.1062-1078, 1999. 10.1109\/5.771065","DOI":"10.1109\/5.771065"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] K. Iwamura, M. Kawamura, M. Kuribayashi, M. Iwata, H. Kang, S. Gohshi, and A. Nishimura, \u201cInformation hiding and its criteria for evaluation,\u201d IEICE Trans. Inf. &amp; Syst., vol.E100-D, no.1, pp.2-12, Jan. 2017. 10.1587\/transinf.2016mui0001","DOI":"10.1587\/transinf.2016MUI0001"},{"key":"3","unstructured":"[3] H. Luo, X. Sun, H. Yang, and Z. Xia, \u201cA robust image watermarking based on image restoration using SIFT,\u201d Radio Engineering, vol.20, no.2, pp.525-532, 2011."},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] X. Zhou H. Zhang, and C. Wang, \u201cA robust image watermarking technique based on DWT, APDCBT, and SVD,\u201d Symmetry, vol.10, no.3, 77, 2018. 10.3390\/sym10030077","DOI":"10.3390\/sym10030077"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] D.G. Lowe, \u201cDistinctive image features from scale-invariant keypoints,\u201d Int. J. Comput. Vis., vol.60, no.2, pp.91-110, 2004. 10.1023\/b:visi.0000029664.99615.94","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] H.-Y. Lee, H. Kim, and H.-K. Lee, \u201cRobust image watermarking using local invariant features,\u201d Optical Engineering, vol.45, no.3, 037002, 2006. 10.1117\/1.2181887","DOI":"10.1117\/1.2181887"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Kawamura and K. Uchida, \u201cSIFT feature-based watermarking method aimed at achieving IHC ver.5,\u201d Advances in Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, Smart Innovation, Systems and Technologies, vol.81, pp.381-389, Springer, Cham, 2017. 10.1007\/978-3-319-63856-0_46","DOI":"10.1007\/978-3-319-63856-0_46"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] P. Dong, J.G. Brankov, N.P. Galatsanos, Y. Yang, and F. Davoine, \u201cDigital watermarking robust to geometric distortions,\u201d IEEE Trans. Image Process., vol.14, no.12, pp.2140-2150, 2005. 10.1109\/tip.2005.857263","DOI":"10.1109\/TIP.2005.857263"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] L. Li, X. Yuan, Z. Lu, and J.-S. Pan, \u201cRotation invariant watermark embedding based on scale-adapted characteristic regions,\u201d Information Sciences, vol.180, no.15, pp.2875-2888, 2010. 10.1016\/j.ins.2010.04.009","DOI":"10.1016\/j.ins.2010.04.009"},{"key":"10","unstructured":"[10] J. O&apos;Ruanaidh and T. Pun, \u201cRotation, scale and translation invariant digital image watermarking,\u201d Int. Conf. Image Processing, vol.1, p.536, IEEE Computer Society, 1997. 10.1109\/ICIP.1997.647968"},{"key":"11","unstructured":"[11] M. Tone and N. Hamada, \u201cScale and rotation invariant digital image watermarking method,\u201d IEICE Trans. Inf. &amp; Syst. (Japanese Edition), vol.J88-D1, no.12, pp.1750-1759, Dec. 2005."},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] L. Mao, Y.-Y. Fan, H.-Q. Wang, and G.-Y. Lv, \u201cFractal and neural networks based watermark identification,\u201d Multimedia Tools and Applications, vol.52, no.1, pp.201-219, 2011. 10.1007\/s11042-010-0467-5","DOI":"10.1007\/s11042-010-0467-5"},{"key":"13","unstructured":"[13] M. Vafaei, H. Mahdavi-Nasab, and H. Pourghassem, \u201cA new robust blind watermarking method based on neural networks in wavelet transform domain,\u201d World Applied Sciences Journal, vol.22, no.11, pp.1572-1580, 2013."},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] M.-S. Hwang, C.-C. Chang, and K.-F. Hwang, \u201cDigital watermarking of images using neural networks,\u201d J. Electronic Imaging, vol.9, no.4, pp.548-555, 2000. 10.1117\/1.1289357","DOI":"10.1117\/1.1289357"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] L.-Y. Hsu and H.-T. Hu, \u201cBlind image watermarking via exploitation of inter-block prediction and visibility threshold in DCT domain,\u201d J. Visual Communication and Image Representation, vol.32, pp.130-143, 2015. 10.1016\/j.jvcir.2015.07.017","DOI":"10.1016\/j.jvcir.2015.07.017"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] C.-T. Yen and Y.-J. Huan, \u201cFrequency domain digital watermark recognition using image code sequences with a back-propagation neural network,\u201d Multimedia Tools and Applications, vol.75, no.16, pp.9745-9755, 2016. 10.1007\/s11042-015-2718-y","DOI":"10.1007\/s11042-015-2718-y"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] I. Hamamoto and M. Kawamura, \u201cImage watermarking technique using embedder and extractor neural networks,\u201d IEICE Trans. Inf. &amp; Syst., vol.E102-D, no.1, pp.19-30, Jan. 2019. 10.1587\/transinf.2018mup0006","DOI":"10.1587\/transinf.2018MUP0006"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, \u201cHiDDeN: Hiding data with deep networks,\u201d European Conf. Computer Vision, Lecture Notes in Computer Science, vol.11219, pp.682-697, Springer, Cham, 2018. 10.1007\/978-3-030-01267-0_40","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"19","unstructured":"[19] Information hiding and its criteria for evaluation, IEICE, http:\/\/www.ieice.org\/iss\/emm\/ihc\/en\/ (accessed Jan. 27, 2019)."},{"key":"20","unstructured":"[20] S. Ioffe and C. Szegedy, \u201cBatch normalization: Accelerating deep network training by reducing internal covariate shift,\u201d Proc. Int. Conf. Machine Learning, pp.448-456, 2015."},{"key":"21","unstructured":"[21] D.P. Kingma and J.L. Ba, \u201cAdam: A method for stochastic optimization,\u201d Proc. 3rd International Conference on Learning Representations, 2015."},{"key":"22","unstructured":"[22] TensorFlow, https:\/\/www.tensorflow.org\/ (accessed Jan. 27, 2019)."},{"key":"23","unstructured":"[23] Microsoft COCO: Common Objects in Context, http:\/\/cocodataset.org\/ (accessed Aug. 4, 2019)."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/1\/E103.D_2019MUP0007\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T05:20:34Z","timestamp":1578288034000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/1\/E103.D_2019MUP0007\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019mup0007","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}