{"id":"https://openalex.org/W7125007662","doi":"https://doi.org/10.1109/lsp.2026.3655346","title":"Semantic-Aware and Semi-Fragile Diffusion Watermarking for Proactive Deepfake Detection","display_name":"Semantic-Aware and Semi-Fragile Diffusion Watermarking for Proactive Deepfake Detection","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125007662","doi":"https://doi.org/10.1109/lsp.2026.3655346"},"language":null,"primary_location":{"id":"doi:10.1109/lsp.2026.3655346","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2026.3655346","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123435945","display_name":"Rui Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rui Sun","raw_affiliation_strings":["Key Laboratory of Knowledge Engineering with Big Data (Ministry of Education), School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Knowledge Engineering with Big Data (Ministry of Education), School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115590655","display_name":"Zhang Ye","orcid":"https://orcid.org/0000-0003-3495-5596"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifan Zhang","raw_affiliation_strings":["School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123425529","display_name":"Xiaolu Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolu Yu","raw_affiliation_strings":["School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123441062","display_name":"Yuwei Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwei Dai","raw_affiliation_strings":["School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123426638","display_name":"Yaofei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaofei Wang","raw_affiliation_strings":["School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123435945"],"corresponding_institution_ids":["https://openalex.org/I16365422"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16233649,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":null,"first_page":"688","last_page":"692"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.46970000863075256,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.46970000863075256,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.14059999585151672,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11019","display_name":"Image Enhancement Techniques","score":0.11219999939203262,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7968000173568726},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.699400007724762},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5248000025749207},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.491100013256073},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4205999970436096},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.38940000534057617},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.38600000739097595},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37450000643730164},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.36489999294281006}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8174999952316284},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7968000173568726},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.699400007724762},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5817000269889832},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5248000025749207},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.491100013256073},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4153999984264374},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.38600000739097595},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37450000643730164},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34369999170303345},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3312000036239624},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3116999864578247},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3043999969959259},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3009999990463257},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.2881999909877777},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.2831000089645386},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C2987933465","wikidata":"https://www.wikidata.org/wiki/Q141130","display_name":"Image manipulation","level":3,"score":0.27970001101493835},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.2720000147819519},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.27149999141693115},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.2669999897480011},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C80191262","wikidata":"https://www.wikidata.org/wiki/Q5477668","display_name":"Fragility","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2026.3655346","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2026.3655346","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2883233582","https://openalex.org/W2962770929","https://openalex.org/W2962785568","https://openalex.org/W2963626105","https://openalex.org/W3034600949","https://openalex.org/W3037650204","https://openalex.org/W3092709185","https://openalex.org/W3175552437","https://openalex.org/W3184306024","https://openalex.org/W3193750732","https://openalex.org/W4214622647","https://openalex.org/W4312388562","https://openalex.org/W4313127140","https://openalex.org/W4377231695","https://openalex.org/W4385283689","https://openalex.org/W4386071484","https://openalex.org/W4387968109","https://openalex.org/W4390841259","https://openalex.org/W4390872921","https://openalex.org/W4391999685","https://openalex.org/W4393159397","https://openalex.org/W4393379880","https://openalex.org/W4399729888","https://openalex.org/W4400205545","https://openalex.org/W4401325719","https://openalex.org/W4402534290","https://openalex.org/W4402715910","https://openalex.org/W4402727205","https://openalex.org/W4403792060","https://openalex.org/W4404914434","https://openalex.org/W4408099456","https://openalex.org/W4410004705","https://openalex.org/W4410393871","https://openalex.org/W4412464683","https://openalex.org/W4412802410","https://openalex.org/W4414693593","https://openalex.org/W4414826439","https://openalex.org/W4415707145"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"progress":[2],"of":[3,60,100,149,156],"deepfake":[4,84,150],"technology,":[5],"which":[6],"primarily":[7],"manipulates":[8],"facial":[9,74,88],"identity":[10],"and":[11,17],"image":[12,157],"semantics,":[13],"has":[14],"made":[15],"detection":[16,148],"defense":[18],"critically":[19],"important.":[20],"Conventional":[21],"global":[22],"watermarking":[23],"methods":[24],"offer":[25],"limited":[26],"capacity":[27],"for":[28],"protecting":[29],"key":[30],"semantic":[31,58,158],"content,":[32,75],"as":[33,53],"they":[34],"typically":[35],"rely":[36],"on":[37,120],"uniformly":[38],"distributed":[39],"watermarks":[40,52],"across":[41],"the":[42,57,65,92,101,136],"entire":[43],"image.":[44],"This":[45],"letter":[46],"presents":[47],"a":[48],"method":[49],"that":[50,86,131],"weave":[51],"intrinsic":[54],"components":[55],"into":[56],"content":[59],"images":[61],"(facial":[62],"regions)":[63],"in":[64],"latent":[66],"space.":[67],"By":[68],"aligning":[69],"watermark":[70],"embedding":[71,117],"regions":[72],"with":[73],"we":[76],"establish":[77],"an":[78],"inherent":[79],"fragility":[80],"mechanism":[81],"wherein":[82],"any":[83],"manipulation":[85],"modifies":[87],"semantics":[89],"inevitably":[90],"disrupts":[91],"watermark,":[93],"enabling":[94,153],"precise":[95,154],"detection.":[96],"Simultaneously,":[97],"adversarial":[98],"training":[99],"extractor":[102],"ensures":[103],"robustness":[104,140],"against":[105,141],"conventional":[106,142],"signal":[107],"processing":[108],"operations.":[109],"A":[110],"local":[111],"entropy":[112],"perception":[113],"module":[114],"dynamically":[115],"adjusts":[116],"intensity":[118],"based":[119],"regional":[121],"texture":[122],"complexity,":[123],"maintaining":[124],"high":[125],"perceptual":[126],"fidelity.":[127],"Extensive":[128],"experiments":[129],"indicate":[130],"compared":[132],"to":[133],"advanced":[134],"methods,":[135],"proposed":[137],"approach":[138],"maintains":[139],"benign":[143],"operations":[144],"while":[145],"achieving":[146],"reliable":[147],"forgeries,":[151],"thereby":[152],"protection":[155],"content.":[159]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-21T00:00:00"}
