{"id":"https://openalex.org/W4416067435","doi":"https://doi.org/10.1109/iccv51701.2025.01743","title":"Semantic Watermarking Reinvented: Enhancing Robustness and Generation Quality with Fourier Integrity","display_name":"Semantic Watermarking Reinvented: Enhancing Robustness and Generation Quality with Fourier Integrity","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W4416067435","doi":"https://doi.org/10.1109/iccv51701.2025.01743"},"language":"en","primary_location":{"id":"doi:10.1109/iccv51701.2025.01743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccv51701.2025.01743","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/CVF International Conference on Computer Vision (ICCV)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2509.07647","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sung Ju Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123907","display_name":"National University College","ror":"https://ror.org/02hs8e066","country_code":"PR","type":"education","lineage":["https://openalex.org/I4210123907"]}],"countries":["PR"],"is_corresponding":true,"raw_author_name":"Sung Ju Lee","raw_affiliation_strings":["Seoul National University,Dept. of ECE &#x0026; INMC,Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Seoul National University,Dept. of ECE &#x0026; INMC,Korea","institution_ids":["https://openalex.org/I4210123907"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055171648","display_name":"Nam Ik Cho","orcid":"https://orcid.org/0000-0001-5297-4649"},"institutions":[{"id":"https://openalex.org/I4210123907","display_name":"National University College","ror":"https://ror.org/02hs8e066","country_code":"PR","type":"education","lineage":["https://openalex.org/I4210123907"]}],"countries":["PR"],"is_corresponding":false,"raw_author_name":"Nam Ik Cho","raw_affiliation_strings":["Seoul National University,Dept. of ECE &#x0026; INMC,Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Seoul National University,Dept. of ECE &#x0026; INMC,Korea","institution_ids":["https://openalex.org/I4210123907"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210123907"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31139016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"18759","last_page":"18769"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.4124000072479248,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.4124000072479248,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2973000109195709,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.11270000040531158,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8809999823570251},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8371000289916992},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7239999771118164},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.41290000081062317},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.34459999203681946},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.3352000117301941},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.326200008392334}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8809999823570251},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8371000289916992},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734000027179718},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7239999771118164},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5091999769210815},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41290000081062317},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34860000014305115},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.34459999203681946},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33730000257492065},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3352000117301941},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.326200008392334},{"id":"https://openalex.org/C102519508","wikidata":"https://www.wikidata.org/wiki/Q6520159","display_name":"Fourier transform","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.30709999799728394},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2888000011444092},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C1893757","wikidata":"https://www.wikidata.org/wiki/Q3653001","display_name":"Inversion (geology)","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C166423231","wikidata":"https://www.wikidata.org/wiki/Q1891170","display_name":"Semantic search","level":3,"score":0.257999986410141},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iccv51701.2025.01743","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccv51701.2025.01743","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/CVF International Conference on Computer Vision (ICCV)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2509.07647","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.07647","pdf_url":"https://arxiv.org/pdf/2509.07647","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2509.07647","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2509.07647","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2509.07647","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.07647","pdf_url":"https://arxiv.org/pdf/2509.07647","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322065","display_name":"National IT Industry Promotion Agency","ror":"https://ror.org/026v53e29"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Semantic":[0],"watermarking":[1,64,85],"techniques":[2,81],"for":[3,91,172],"latent":[4],"diffusion":[5],"models":[6],"(LDMs)":[7],"are":[8],"robust":[9,71],"against":[10,132],"regeneration":[11],"attacks,":[12],"but":[13],"often":[14],"suffer":[15],"from":[16],"detection":[17,124,147],"performance":[18],"degradation":[19],"due":[20,65],"to":[21,66,82,167],"the":[22,60,119,126,129,145,179],"loss":[23],"of":[24,62,121,128],"frequency":[25,45],"integrity.":[26],"To":[27,74],"tackle":[28],"this":[29],"problem,":[30],"we":[31,52,78],"propose":[32],"a":[33,54],"novel":[34],"embedding":[35,56,131],"method":[36,143],"called":[37],"Hermitian":[38,49],"Symmetric":[39],"Fourier":[40],"Watermarking":[41],"(SFW),":[42],"which":[43],"maintains":[44],"integrity":[46],"by":[47,69,156],"enforcing":[48],"symmetry.":[50],"Additionally,":[51],"introduce":[53],"center-aware":[55,130],"strategy":[57],"that":[58,100],"reduces":[59],"vulnerability":[61],"semantic":[63,84,183],"cropping":[67],"attacks":[68],"ensuring":[70],"information":[72],"retention.":[73],"validate":[75],"our":[76,101,142,162],"approach,":[77],"apply":[79],"these":[80],"existing":[83],"schemes,":[86],"enhancing":[87],"their":[88],"frequency-domain":[89],"structures":[90],"better":[92],"robustness":[93,174],"and":[94,106,134,158,175],"retrieval":[95],"accuracy.":[96,140],"Extensive":[97],"experiments":[98],"demonstrate":[99],"methods":[102],"achieve":[103],"state-of-the-art":[104],"verification":[105],"identification":[107,139],"performance,":[108],"surpassing":[109],"previous":[110],"approaches":[111],"across":[112],"various":[113],"attack":[114],"scenarios.":[115],"Ablation":[116],"studies":[117],"confirm":[118],"impact":[120],"SFW":[122,164],"on":[123],"capabilities,":[125],"effectiveness":[127],"cropping,":[133],"how":[135],"message":[136],"capacity":[137],"influences":[138],"Notably,":[141],"achieves":[144],"highest":[146],"accuracy":[148],"while":[149],"maintaining":[150],"superior":[151],"image":[152,176],"fidelity,":[153,177],"as":[154],"evidenced":[155],"FID":[157],"CLIP":[159],"scores.":[160],"Conclusively,":[161],"proposed":[163],"is":[165],"shown":[166],"be":[168],"an":[169],"effective":[170],"framework":[171],"balancing":[173],"addressing":[178],"inherent":[180],"trade-offs":[181],"in":[182],"watermarking.":[184],"Code":[185],"available":[186],"at":[187],"https://github.com/thomas11809/SFWMark":[188]},"counts_by_year":[],"updated_date":"2026-05-06T06:03:25.996018","created_date":"2025-10-10T00:00:00"}
