{"id":"https://openalex.org/W4407831783","doi":"https://doi.org/10.1109/tifs.2025.3542992","title":"Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-Parameterization","display_name":"Screen-Shooting Robust Watermark Based on Style Transfer and Structural Re-Parameterization","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407831783","doi":"https://doi.org/10.1109/tifs.2025.3542992"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3542992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3542992","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075830507","display_name":"Guangyong Gao","orcid":"https://orcid.org/0000-0003-3975-737X"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangyong Gao","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, and the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-3975-737X","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, and the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaoan Chen","orcid":"https://orcid.org/0009-0003-8237-139X"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoan Chen","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, and the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0003-8237-139X","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, and the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Li Li","orcid":"https://orcid.org/0009-0005-9824-1631"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, and the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0005-9824-1631","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, and the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005319671","display_name":"Zhihua Xia","orcid":"https://orcid.org/0000-0001-6860-647X"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihua Xia","raw_affiliation_strings":["College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","College of Cyber Security, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-6860-647X","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006504700","display_name":"Jianwei Fei","orcid":"https://orcid.org/0000-0002-1243-3909"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Fei","raw_affiliation_strings":["College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","Engineering Research Center of Trustworthy AI, Ministry of Education, College of CyberSecurity, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-1243-3909","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I159948400"]},{"raw_affiliation_string":"Engineering Research Center of Trustworthy AI, Ministry of Education, College of CyberSecurity, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111404801","display_name":"Yun-Qing Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yun-Qing Shi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5075830507"],"corresponding_institution_ids":["https://openalex.org/I200845125"],"apc_list":null,"apc_paid":null,"fwci":6.7995,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.96586599,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"20","issue":null,"first_page":"2648","last_page":"2663"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7724475264549255},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5992288589477539},{"id":"https://openalex.org/keywords/style","display_name":"Style (visual arts)","score":0.5505691170692444},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4710150957107544},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.43486133217811584},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.4338111877441406},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3479033410549164},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.07719919085502625}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7724475264549255},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5992288589477539},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.5505691170692444},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4710150957107544},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.43486133217811584},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.4338111877441406},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3479033410549164},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.07719919085502625},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3542992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3542992","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2428307698","display_name":null,"funder_award_id":"2022YFB3103100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G331018939","display_name":null,"funder_award_id":"U22B2062","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6258482808","display_name":null,"funder_award_id":"62122032","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7464343989","display_name":null,"funder_award_id":"62172233","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7638396986","display_name":null,"funder_award_id":"2022YFB3103100","funder_id":"https://openalex.org/F4320338173","funder_display_name":"Chinese Polar Environment Comprehensive Investigation and Assessment Programmes"},{"id":"https://openalex.org/G7996433170","display_name":null,"funder_award_id":"62122032,62172233","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320338173","display_name":"Chinese Polar Environment Comprehensive Investigation and Assessment Programmes","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1983615907","https://openalex.org/W2034365297","https://openalex.org/W2057084952","https://openalex.org/W2072906874","https://openalex.org/W2121927366","https://openalex.org/W2616678700","https://openalex.org/W2883233582","https://openalex.org/W2919023666","https://openalex.org/W2944049061","https://openalex.org/W2982163850","https://openalex.org/W2997594966","https://openalex.org/W3015457841","https://openalex.org/W3022873814","https://openalex.org/W3034856584","https://openalex.org/W3040196063","https://openalex.org/W3113009928","https://openalex.org/W3128902306","https://openalex.org/W3167976421","https://openalex.org/W4304092681","https://openalex.org/W4311736699","https://openalex.org/W4381198923","https://openalex.org/W4387445639","https://openalex.org/W4387623702","https://openalex.org/W4387968165","https://openalex.org/W4396667847","https://openalex.org/W4399485237","https://openalex.org/W6622239757","https://openalex.org/W6631190155","https://openalex.org/W6682948231","https://openalex.org/W6746559639","https://openalex.org/W6748582592"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W2361184779"],"abstract_inverted_index":{"In":[0],"real-world":[1],"applications,":[2],"screen":[3],"capturing":[4],"represents":[5],"a":[6,39,52,68,78,84,94],"significant":[7,40],"scenario":[8],"where":[9],"this":[10,101,111],"process":[11],"can":[12],"induce":[13],"substantial":[14],"distortion":[15,25,86,147],"to":[16,43,50,59,82,103,122],"the":[17,118,124,132],"original":[18],"image.":[19],"Previous":[20],"methods":[21,36],"for":[22],"simulating":[23],"screen-shooting":[24,63,75,85,108,146],"often":[26],"involved":[27],"combining":[28],"different":[29],"formulas.":[30],"We":[31],"found":[32],"that":[33],"these":[34],"simulation":[35,87],"still":[37],"have":[38],"gap":[41],"compared":[42],"real":[44],"distortions,":[45],"making":[46],"it":[47],"urgently":[48],"necessary":[49],"develop":[51],"realistic":[53],"and":[54,141],"credible":[55],"comprehensive":[56,95],"noise":[57,96],"layer":[58,97],"achieve":[60,104],"robustness":[61,105,140],"against":[62,106],"distortion.":[64,76,109],"This":[65],"paper":[66,112],"presents":[67],"watermarking":[69],"scheme":[70],"capable":[71],"of":[72,126,139],"withstanding":[73],"severe":[74,107,145],"First,":[77],"dataset":[79],"is":[80,98],"constructed":[81],"train":[83],"network":[88,102],"based":[89],"on":[90],"style":[91],"transfer.":[92],"Subsequently,":[93],"built":[99],"upon":[100],"Additionally,":[110],"incorporates":[113],"structural":[114],"re-parameterization":[115],"techniques":[116],"into":[117],"traditional":[119],"U-shaped":[120],"encoder":[121],"improve":[123],"quality":[125],"encoded":[127],"images.":[128],"Extensive":[129],"experiments":[130],"demonstrate":[131],"proposed":[133],"scheme\u2019s":[134],"superior":[135],"performance":[136],"in":[137],"terms":[138],"generalization,":[142],"especially":[143],"under":[144],"conditions.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
