{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T21:47:02Z","timestamp":1777153622856,"version":"3.51.4"},"reference-count":63,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055150","type":"journal-article","created":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T08:14:27Z","timestamp":1726733667000},"page":"133-160","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":10,"title":["Robust Deep Image Watermarking: A Survey"],"prefix":"10.32604","volume":"81","author":[{"given":"Yuanjing","family":"Luo","sequence":"first","affiliation":[]},{"given":"Xichen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TCSVT.2023.3295895","article-title":"Fixing the double agent vulnerability of deep watermarking: A patch-level solution against artwork plagiarism","volume":"34","author":"Luo","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s13735-020-00197-9","article-title":"Recent trends in image watermarking techniques for copyright protection: A survey","volume":"9","author":"Ray","year":"2020","journal-title":"Int. J. Multimed. Inf. Retr."},{"key":"ref3","unstructured":"X. H. Jiang, \u201cDigital watermarking and its application in image copyright protection,\u201d presented at 2010 Int. Conf. on Intell. Comput. Techn. Autom., Changsha, China, Autom, May 11\u201312, 2010."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","article-title":"Robust digital watermarking techniques for copyright protection of digital data: A survey","volume":"118","author":"Kadian","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref5","unstructured":"A. Piva, M. Barni, F. Bartolini, and V. Cappellini, \u201cDCT-based watermark recovering without resorting to the uncorrupted original image,\u201d presented at 1997 Int. Conf. on Img. Pro., Santa Barbara, CA, USA, Oct. 26\u201329, 1997, pp. 26\u201329."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1117\/1.1494075","article-title":"Digital watermarking","volume":"11","author":"Cox","year":"2002","journal-title":"J. Electron. Imaging."},{"key":"ref7","unstructured":"J. S. Mei, S. K. Li, and X. M. Tan, \u201cA digital watermarking algorithm based on DCT and DWT,\u201d presented at 2009 6th Web Inf. Syst. App. Conf., Xuzhou, China, Sep. 18\u201320, 2009."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","article-title":"Finding robust domain from attacks: A learning framework for blind watermarking","volume":"337","author":"Mun","year":"2019","journal-title":"Neurocomputing"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"Y. Luo, T. Zhou, F. Liu, and Z. Cai, \u201cIRWArt: Levering watermarking performance for protecting high-quality artwork images,\u201d presented at ACM Web Conf. 2023, Austin, TX, USA, Apr. 30\u2013May 4, 2023.","DOI":"10.1145\/3543507.3583489"},{"key":"ref10","first-page":"831","article-title":"A dual model watermarking framework for copyright protection in image processing networks","volume":"75","author":"Meng","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref12","unstructured":"J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, \u201cHiDDeN: Hiding data with deep networks,\u201d presented at 15th Eur. Conf. Comput. Vis., Munich, Germany, Sep. 8\u201314, 2018, pp. 8\u201314."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","article-title":"Invisible steganography via generative adversarial networks","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref14","doi-asserted-by":"crossref","unstructured":"Y. Liu, M. Guo, J. Zhang, Y. Zhu, and X. Xie, \u201cA novel two-stage separable deep learning framework for practical blind watermarking,\u201d presented at 27th ACM Int. Conf. Multimed., Nice, France, Oct. 21\u201325, 2019.","DOI":"10.1145\/3343031.3351025"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"X. Luo, R. Zhan, H. Chang, F. Yang, and P. Milanfar, \u201cDistortion agnostic deep watermarking,\u201d presented at 2020 IEEE Conf. Comput. Vis. Pattern Recognit., Seattle, WA, USA, Jun. 14\u201319, 2020.","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"C. Yu, \u201cAttention based data hiding with generative adversarial networks,\u201d presented at 34th AAAI Conf. Artif. Intell., New York, NY, USA, Feb. 7\u201312, 2020.","DOI":"10.1609\/aaai.v34i01.5463"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1109\/TCYB.2020.3037208","article-title":"RIHOOP: Robust invisible hyperlinks in offline and online photographs","volume":"52","author":"Jia","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2019.113157","article-title":"ReDMark: Framework for residual diffusion watermarking based on deep networks","volume":"146","author":"Ahmadi","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref19","series-title":"presented at the 2022 9th IEEE Int. Conf. Behav. Social Comput.","article-title":"Digital watermarking via inverse gradient attention","author":"Zhang","year":"2022"},{"key":"ref20","unstructured":"C. Zhang, P. Benz, A. Karjauv, G. Sun, and I. S. Kweon, \u201cUDH: Universal deep hiding for steganography, watermarking, and light field messaging,\u201d presented at 34th Adv. Neural Inf. Process. Syst., Dec. 6\u201312, 2020."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"9451","DOI":"10.1109\/TNNLS.2022.3175627","article-title":"Composition aware image steganography through adversarial self-generated supervision","volume":"34","author":"Zheng","year":"2023","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"A. C. Gilbert, Y. Zhang, K. Lee, Y. Zhang, and H. Lee, \u201cTowards understanding the invertibility of convolutional neural networks,\u201d presented at 26th Int. Joint Conf. Artif. Intell., Melbourne, Australia, Aug. 19\u201325, 2017.","DOI":"10.24963\/ijcai.2017\/236"},{"key":"ref23","doi-asserted-by":"crossref","unstructured":"T. F. van der Ouderaa and D. E. Worrall, \u201cReversible GANs for memory efficient image-to-image translation,\u201d presented at 2019 IEEE Conf. Comput. Vis. Pattern Recognit., Long Beach, CA, USA, Jun. 15\u201320, 2019.","DOI":"10.1109\/CVPR.2019.00485"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"Y. Xu, C. Mou, Y. Hu, J. Xie, and J. Zhang, \u201cRobust invertible image steganography,\u201d presented at 2022 IEEE Conf. Comput. Vis. Pattern Recognit., New Orleans, LA, USA, Jun. 18\u201324, 2022.","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"ref25","unstructured":"S. -P. Lu, R. Wang, T. Zhong, and P. L. Rosin, \u201cLarge-capacity image steganography based on invertible neural networks,\u201d presented at 2021 IEEE Conf. Comput. Vis. Pattern Recognit., Nashville, TN, USA, Jun. 20\u201325, 2021."},{"key":"ref26","doi-asserted-by":"crossref","unstructured":"J. Jing, X. Deng, M. Xu, J. Wang, and Z. Guan, \u201cHiNet: Deep image hiding by invertible network,\u201d presented at 2021 IEEE Int. Conf. Comput. Vis., Montreal, QC, Canada, Oct. 10\u201317, 2021.","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"ref27","doi-asserted-by":"crossref","unstructured":"H. Fang, Y. Qiu, K. Chen, J. Zhang, W. Zhang, and E. -C. Chang, \u201cFlow-based robust watermarking with invertible noise layer for blackbox distortions,\u201d presented at 37th AAAI Conf. Artif. Intell., Washington, DC, USA, Feb. 7\u201314, 2023.","DOI":"10.1609\/aaai.v37i4.25633"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"3137","DOI":"10.1109\/TMM.2023.3307970","article-title":"iSCMIS: Spatial-channel attention based deep invertible network for multi-image steganography","volume":"26","author":"Li","year":"2023","journal-title":"IEEE Trans. Multimed."},{"key":"ref29","unstructured":"R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, \u201cA digital watermark,\u201d presented at 1st Int. Conf. Img. Pro., Austin, TX, USA, Nov. 13\u201316, 1994."},{"key":"ref30","unstructured":"N. Nikolaidis and I. Pitas, \u201cDigital image watermarking: An overview,\u201d presented at 6th IEEE Int. Conf. Multimed. Comput. Syst., Florence, Italy, Jun. 7\u201311, 1999."},{"key":"ref31","first-page":"1183","article-title":"A text image watermarking algorithm based on image enhancement","volume":"77","author":"Wang","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1016\/j.jvcir.2014.01.008","article-title":"Visual-psnr measure of image quality","volume":"25","author":"Tanchenko","year":"2014","journal-title":"J. Vis. Commun. Image R."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"8423","DOI":"10.1007\/s11042-020-10035-z","article-title":"PSNR vs SSIM: Imperceptibility quality assessment for image steganography","volume":"80","author":"Setiadi","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref34","doi-asserted-by":"crossref","unstructured":"R. Zhang, P. Isola, A. A. Efros, E. Shechtman, and O. Wang, \u201cThe unreasonable effectiveness of deep features as a perceptual metric,\u201d presented at 2018 IEEE Conf. Comput. Vis. Pattern Recognit., Salt Lake City, UT, USA, Jun. 18\u201322, 2018.","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref35","unstructured":"J. Liu and X. He, \u201cA review study on digital watermarking,\u201d presented at 2005 Int. Conf. on Intell. Comput. Techn. Autom., Karachi, Pakistan, Aug. 27\u201328, 2005."},{"key":"ref36","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/TIM.2007.911585","article-title":"Fragility and robustness of binary-phaseonly-filter-based fragile\/semifragile digital image watermarking","volume":"57","author":"Sang","year":"2008","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref37","doi-asserted-by":"crossref","unstructured":"S. Tyagi, H. V. Singh, R. Agarwal, and S. K. Gangwar, \u201cDigital watermarking techniques for security applications,\u201d presented at 2016 Int. Conf. Emerg. Trends Elect. Elec. Sustainable Eng. Syst., Sultanpur, India, Mar. 11\u201312, 2016.","DOI":"10.1109\/ICETEESES.2016.7581413"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/TCSVT.2003.815948","article-title":"Novel blind multiple watermarking technique for images","volume":"13","author":"Wong","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref39","first-page":"165","article-title":"A survey of digital watermarking techniques, applications and attacks","volume":"2","author":"Singh","year":"2013","journal-title":"Int. J. Eng. Techno."},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.3390\/electronics8121403","article-title":"A high capacity watermarking technique for the printed document","volume":"8","author":"Huang","year":"2019","journal-title":"Electronics"},{"key":"ref41","series-title":"Security and Watermarking of Multimedia Contents IV","first-page":"691","article-title":"Security of fragile authentication watermarks with localization","volume":"4675","author":"Fridrich","year":"2002"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","article-title":"Robust image watermarking theories and techniques: A review","volume":"12","author":"Tao","year":"2014","journal-title":"J. Appl. Res. Tech."},{"key":"ref43","unstructured":"M. S. Kankanhalli, Rajmohan, and K. Ramakrishnan, \u201cAdaptive visible watermarking of images,\u201d presented at 6th IEEE Int. Conf. Multimedia Comput. Syst., Florence, Italy, Jun. 7\u201311, 1999."},{"key":"ref44","unstructured":"M. M. Yeung and F. Mintzer, \u201cAn invisible watermarking technique for image verification,\u201d presented at 1997 Int. Conf. Img. Pro., Santa Barbara, CA, USA, Oct. 26\u201329, 1997."},{"key":"ref45","doi-asserted-by":"crossref","unstructured":"F. M. Boland, J. J. O\u2019Ruanaidh, and C. Dautzenberg, \u201cWatermarking digital images for copyright protection,\u201d presented at 15th Int. Conf. on Img. Pro. App., Edinburgh, Scotland, Jul. 4\u20136, 1995.","DOI":"10.1049\/ip-vis:19960711"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","article-title":"Information hiding using least significant bit steganography and cryptography","volume":"4","author":"Gupta","year":"2012","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"key":"ref47","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MMUL.2020.2985973","article-title":"Joint watermarking-encryption-ecc for patient record security in wavelet domain","volume":"27","author":"Anand","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref48","unstructured":"D. R. Huang, J. F. Liu, J. W. Huang, and H. M. Liu, \u201cA DWT-based image watermarking algorithm,\u201d presented at IEEE Int. Conf. Multimed. Expo, Tokyo, Japan, Aug. 22\u201325, 2001."},{"key":"ref49","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1109\/TIFS.2014.2322497","article-title":"Perceptual dft watermarking with improved detection and robustness to geometrical distortions","volume":"9","author":"Urvoy","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref50","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based digital image watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recogn. Lett."},{"key":"ref51","doi-asserted-by":"crossref","first-page":"8320","DOI":"10.1109\/TMM.2023.3234812","article-title":"Constructing immunized stego-image for secure steganography via artificial immune system","volume":"25","author":"Li","year":"2023","journal-title":"IEEE Trans. Multimed."},{"key":"ref52","unstructured":"S. Baluja, \u201cHiding images in plain sight: Deep steganography,\u201d presented at 31st Adv. Neural Inf. Process. Syst., Long Beach, CA, USA, Dec. 4\u20139, 2017."},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","article-title":"Hiding images within images","volume":"42","author":"Baluja","year":"2019","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref54","doi-asserted-by":"crossref","unstructured":"T. Bui, S. Agarwal, N. Yu, and J. Collomosse, \u201cRoSteALS: Robust steganography using autoencoder latent space,\u201d presented at 2023 IEEE Conf. Comput. Vis. Pattern Recognit., Vancouver, BC, Canada, Jun. 17\u201324, 2023.","DOI":"10.1109\/CVPRW59228.2023.00100"},{"key":"ref55","doi-asserted-by":"crossref","unstructured":"E. Wengrowski and K. Dana, \u201cLight field messaging with deep photographic steganography,\u201d presented at 2019 IEEE Conf. Comput. Vis. Pattern Recognit., Long Beach, CA, USA, Jun. 15\u201320, 2019.","DOI":"10.1109\/CVPR.2019.00161"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TCSVT.2020.3009349","article-title":"Deep template-based watermarking","volume":"31","author":"Fang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref57","doi-asserted-by":"crossref","unstructured":"M. Tancik, B. Mildenhall, and R. Ng, \u201cStegaStamp: Invisible hyperlinks in physical photographs,\u201d presented at 2020 IEEE Conf. Comput. Vis. Pattern Recognit., Seattle, WA, USA, Jun. 14\u201319, 2020.","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/TMM.2021.3061801","article-title":"Tera: Screen-to-camera image code with transparency, efficiency, robustness and adaptability","volume":"24","author":"Fang","year":"2021","journal-title":"IEEE Trans. Multimed."},{"key":"ref59","doi-asserted-by":"crossref","unstructured":"J. Jia, Z. Gao, D. Zhu, X. Min, G. Zhai, and X. Yang, \u201cLearning invisible markers for hidden codes in offline-to-online photography,\u201d presented at 2022 IEEE Conf. Comput. Vis. Pattern Recognit., New Orleans, LA, USA, Jun. 18\u201324, 2022.","DOI":"10.1109\/CVPR52688.2022.00231"},{"key":"ref60","doi-asserted-by":"crossref","unstructured":"H. Fang, Z. Jia, Z. Ma, E. -C. Chang, and W. Zhang, \u201cPIMoG: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network,\u201d presented at 30th ACM Int. Conf. on Multimed., Lisboa, Portugal, Oct. 10\u201314, 2022.","DOI":"10.1145\/3503161.3548049"},{"key":"ref61","unstructured":"T. Teshima, I. Ishikawa, K. Tojo, K. Oono, M. Ikeda and M. Sugiyama, \u201cCoupling-based invertible neural networks are universal diffeomorphism approximators,\u201d presented at 34th Adv. Neural Inf. Process. Syst., Dec. 6\u201312, 2020."},{"key":"ref62","article-title":"Solving inverse problems using conditional invertible neural networks","volume":"433","author":"Padmanabha","year":"2021","journal-title":"J. Comput. Phys."},{"key":"ref63","doi-asserted-by":"crossref","unstructured":"Y. Lan, F. Shang, J. Yang, X. Kang, and E. Li, \u201cRobust image steganography: Hiding messages in frequency coefficients,\u201d presented at 37th AAAI Conf. Artif. Intell., Washington, DC, USA, Feb. 7\u201314, 2023.","DOI":"10.1609\/aaai.v37i12.26746"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_55150\/TSP_CMC_55150.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:37:54Z","timestamp":1741315074000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":63,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055150","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}