{"id":"https://openalex.org/W4414079637","doi":"https://doi.org/10.1109/tifs.2025.3607234","title":"Division and Union: Latent Model Watermarking","display_name":"Division and Union: Latent Model Watermarking","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414079637","doi":"https://doi.org/10.1109/tifs.2025.3607234"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3607234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3607234","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101066549","display_name":"Zhiyang Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyang Dai","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067969908","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-6029-5064"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["The University of Western Australia, Perth, WA, Australia","University of Western Australia, Perth, Australia"],"raw_orcid":"https://orcid.org/0000-0001-6029-5064","affiliations":[{"raw_affiliation_string":"The University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]},{"raw_affiliation_string":"University of Western Australia, Perth, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021875327","display_name":"Boyu Kuang","orcid":"https://orcid.org/0000-0002-5903-557X"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Boyu Kuang","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-5903-557X","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086945099","display_name":"Yifeng Zheng","orcid":"https://orcid.org/0000-0001-7852-6051"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yifeng Zheng","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, China"],"raw_orcid":"https://orcid.org/0000-0001-7852-6051","affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089986388","display_name":"Ajmal Mian","orcid":"https://orcid.org/0000-0002-5206-3842"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ajmal Mian","raw_affiliation_strings":["The University of Western Australia, Perth, WA, Australia","University of Western Australia, Perth, Australia"],"raw_orcid":"https://orcid.org/0000-0002-5206-3842","affiliations":[{"raw_affiliation_string":"The University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]},{"raw_affiliation_string":"University of Western Australia, Perth, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013660502","display_name":"Ruimin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"government","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]},{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruimin Wang","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China","Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I1327237609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"government","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-1632-5737","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I1327237609"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101066549"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21905436,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"9523","last_page":"9538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12720","display_name":"Multimedia Communication and Technology","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9320999979972839},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7925000190734863},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7055000066757202},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6876000165939331},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5234000086784363},{"id":"https://openalex.org/keywords/subnetwork","display_name":"Subnetwork","score":0.45730000734329224},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.3928000032901764},{"id":"https://openalex.org/keywords/division","display_name":"Division (mathematics)","score":0.3621000051498413},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.36149999499320984}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9320999979972839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8325999975204468},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7925000190734863},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7055000066757202},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6876000165939331},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5234000086784363},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5135999917984009},{"id":"https://openalex.org/C2780186347","wikidata":"https://www.wikidata.org/wiki/Q11414","display_name":"Subnetwork","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40610000491142273},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3928000032901764},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3776000142097473},{"id":"https://openalex.org/C60798267","wikidata":"https://www.wikidata.org/wiki/Q1226939","display_name":"Division (mathematics)","level":2,"score":0.3621000051498413},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.36149999499320984},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31949999928474426},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.31610000133514404},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.31220000982284546},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3010999858379364},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2669999897480011},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.25279998779296875}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3607234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3607234","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8915695182","display_name":null,"funder_award_id":"62402223","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G913869186","display_name":null,"funder_award_id":"62372236","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327794","display_name":"Qinglan Project of Jiangsu Province of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2119112357","https://openalex.org/W2145287260","https://openalex.org/W2194775991","https://openalex.org/W2579318729","https://openalex.org/W2806082141","https://openalex.org/W2934843808","https://openalex.org/W2935349488","https://openalex.org/W2952608669","https://openalex.org/W2964128659","https://openalex.org/W2985954225","https://openalex.org/W2988916019","https://openalex.org/W2990270730","https://openalex.org/W2990980946","https://openalex.org/W3053555102","https://openalex.org/W3092793669","https://openalex.org/W3109094166","https://openalex.org/W3152758407","https://openalex.org/W3154581591","https://openalex.org/W3156011647","https://openalex.org/W3159771755","https://openalex.org/W3161325720","https://openalex.org/W3164111940","https://openalex.org/W3164878287","https://openalex.org/W3173922709","https://openalex.org/W3175121854","https://openalex.org/W3179216274","https://openalex.org/W3181304926","https://openalex.org/W3192504716","https://openalex.org/W3211278025","https://openalex.org/W4200182258","https://openalex.org/W4200633448","https://openalex.org/W4221155126","https://openalex.org/W4285603108","https://openalex.org/W4288057770","https://openalex.org/W4290945651","https://openalex.org/W4292993844","https://openalex.org/W4304091654","https://openalex.org/W4311623198","https://openalex.org/W4383221380","https://openalex.org/W4384948590","https://openalex.org/W4386495194","https://openalex.org/W4391725280","https://openalex.org/W4393147763","https://openalex.org/W4402263668","https://openalex.org/W4407360741","https://openalex.org/W4408750139"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1846726187","https://openalex.org/W1593964766","https://openalex.org/W2387614453","https://openalex.org/W2365808414"],"abstract_inverted_index":{"Model":[0],"watermarking":[1,18,38,93],"is":[2,118,133,270],"a":[3,72,107,138,238,251,278],"widely":[4],"adopted":[5],"mechanism":[6],"for":[7,31],"protecting":[8],"deep":[9],"learning":[10],"(DL)":[11],"model":[12,26,74,79,102,111,117,153,181,215,230,234,287],"intellectual":[13],"property":[14],"(IP).":[15],"Black-box":[16],"verifiable":[17,37],"typically":[19],"involves":[20],"injecting":[21],"backdoors":[22],"that":[23,296],"cause":[24],"the":[25,52,59,78,89,101,110,115,123,129,144,151,160,176,179,195,306,310,316],"to":[27,42,128,227,265,315],"produce":[28],"predetermined":[29],"outputs":[30],"specific":[32],"inputs.":[33],"In":[34,67],"contrast,":[35],"white-box":[36],"uses":[39],"steganographic":[40],"techniques":[41],"embed":[43],"watermarks":[44],"into":[45,109,120],"weight":[46],"parameters":[47,312],"or":[48,104],"activation":[49],"values.":[50],"However,":[51],"former":[53],"poses":[54],"new":[55],"security":[56,191],"risks,":[57,192],"while":[58,96],"latter":[60],"often":[61],"lacks":[62],"robustness":[63],"against":[64,300],"removal":[65],"techniques.":[66],"this":[68],"paper,":[69],"we":[70],"propose":[71],"latent":[73,267],"watermarking,":[75],"constructing":[76],"upon":[77],"Division":[80],"and":[81,132,137,154,186,211,220,273,289,294,309],"Union":[82],"operating":[83],"concept,":[84],"dubbed":[85],"as":[86],"DUO,":[87],"leveraging":[88],"strengths":[90],"of":[91,178,197,276,281],"two":[92,121],"methods":[94],"above":[95],"eliminating":[97],"each":[98],"shortcoming.":[99],"Once":[100],"owner":[103],"provider":[105],"embeds":[106],"watermark":[108,113,147,198,283,307],"using":[112,213],"data,":[114],"watermarked":[116],"divided":[119],"parts:":[122],"main":[124,152,180],"model,":[125],"which":[126],"corresponds":[127],"primary":[130,184],"task":[131,185],"made":[134],"publicly":[135],"available,":[136],"small":[139],"sub-network":[140,162],"privately":[141],"reserved":[142,164,311],"by":[143],"owner.":[145],"The":[146,222],"resides":[148],"latently":[149],"within":[150],"can":[155],"only":[156],"be":[157],"activated":[158],"through":[159],"private":[161],"(the":[163],"parameters)":[165],"when":[166,304],"they":[167],"are":[168,248,262,313],"united.":[169],"Consequently,":[170],"DUO":[171,203,269,297],"does":[172,187],"not":[173,188],"adversely":[174],"affect":[175],"performance":[177],"on":[182,204,242,256],"its":[183,225,266],"induce":[189],"any":[190],"even":[193,303],"in":[194],"presence":[196],"data.":[199],"We":[200,291],"extensively":[201],"validate":[202],"four":[205],"benchmark":[206],"datasets":[207],"(CIFAR-10,":[208],"ImageNette,":[209],"CIFAR-100,":[210],"Tiny-ImageNet)":[212],"various":[214],"architectures,":[216],"including":[217,285],"standardized":[218],"ResNet":[219],"VGG.":[221],"results":[223],"affirm":[224],"capability":[226],"accurately":[228],"verify":[229],"ownership":[231],"without":[232],"compromising":[233],"accuracy.":[235],"It":[236],"exhibits":[237],"100%":[239],"detection":[240],"accuracy":[241],"pirated/positive":[243],"testing":[244,258],"models":[245,247,259,261],"(96":[246],"tested)":[249],"with":[250],"0%":[252],"false":[253],"positive":[254],"rate":[255],"normal/negative":[257],"(64":[260],"tested).":[263],"Due":[264],"nature,":[268],"both":[271,305],"effective":[272],"robust,":[274],"capable":[275],"withstanding":[277],"wide":[279],"range":[280],"state-of-the-art":[282],"laundering":[284],"severe":[286],"fine-tuning":[288],"pruning.":[290],"further":[292],"evaluate":[293],"demonstrate":[295],"remains":[298],"robust":[299],"adaptive":[301],"attacks,":[302],"data":[308],"known":[314],"adversary.":[317]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
