{"id":"https://openalex.org/W4393178779","doi":"https://doi.org/10.1109/tpami.2024.3381543","title":"Robust Model Watermarking for Image Processing Networks via Structure Consistency","display_name":"Robust Model Watermarking for Image Processing Networks via Structure Consistency","publication_year":2024,"publication_date":"2024-03-25","ids":{"openalex":"https://openalex.org/W4393178779","doi":"https://doi.org/10.1109/tpami.2024.3381543","pmid":"https://pubmed.ncbi.nlm.nih.gov/38526903"},"language":"en","primary_location":{"id":"doi:10.1109/tpami.2024.3381543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpami.2024.3381543","pdf_url":null,"source":{"id":"https://openalex.org/S199944782","display_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","issn_l":"0162-8828","issn":["0162-8828","1939-3539","2160-9292"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100436740","display_name":"Jie Zhang","orcid":"https://orcid.org/0000-0002-4230-1077"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Zhang","raw_affiliation_strings":["School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100364587","display_name":"Dongdong Chen","orcid":"https://orcid.org/0000-0002-4642-4373"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongdong Chen","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013972536","display_name":"Jing Liao","orcid":"https://orcid.org/0000-0001-7014-5377"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK","US"],"is_corresponding":false,"raw_author_name":"Jing Liao","raw_affiliation_strings":["Department of Computer Science, City University of Hong, Kowloon Tong, Hong Kong","Microsoft Research, Redmond, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Microsoft Research, Redmond, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036060690","display_name":"Zehua Ma","orcid":"https://orcid.org/0000-0002-8153-341X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zehua Ma","raw_affiliation_strings":["School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032465074","display_name":"Han Fang","orcid":"https://orcid.org/0000-0001-9635-9859"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Fang","raw_affiliation_strings":["School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067689180","display_name":"Weiming Zhang","orcid":"https://orcid.org/0000-0001-5576-6108"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiming Zhang","raw_affiliation_strings":["School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101473164","display_name":"Huamin Feng","orcid":"https://orcid.org/0009-0008-3469-8802"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huamin Feng","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081114810","display_name":"Gang Hua","orcid":"https://orcid.org/0000-0001-9522-6157"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gang Hua","raw_affiliation_strings":["Wormpex AI Research LLC, Bellevue, WA, USA"],"affiliations":[{"raw_affiliation_string":"Wormpex AI Research LLC, Bellevue, WA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064573190","display_name":"Nenghai Yu","orcid":"https://orcid.org/0000-0003-4417-9316"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Security, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5100436740"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":5.5603,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96252498,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"46","issue":"10","first_page":"6985","last_page":"6992"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9025226831436157},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8463247418403625},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7521219253540039},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7460727095603943},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6478576064109802},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5452739000320435},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5376976132392883},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4555032551288605},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4449286460876465},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.42236223816871643},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.40962666273117065},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.334853857755661},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3334769606590271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22658437490463257}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9025226831436157},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8463247418403625},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7521219253540039},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7460727095603943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6478576064109802},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5452739000320435},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5376976132392883},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4555032551288605},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4449286460876465},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.42236223816871643},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40962666273117065},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.334853857755661},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3334769606590271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22658437490463257},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tpami.2024.3381543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpami.2024.3381543","pdf_url":null,"source":{"id":"https://openalex.org/S199944782","display_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","issn_l":"0162-8828","issn":["0162-8828","1939-3539","2160-9292"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","raw_type":"journal-article"},{"id":"pmid:38526903","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/38526903","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on pattern analysis and machine intelligence","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G175089312","display_name":null,"funder_award_id":"U20B2047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3828173677","display_name":null,"funder_award_id":"62121002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4538375728","display_name":null,"funder_award_id":"U2336206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4838404910","display_name":null,"funder_award_id":"62102386","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6040923174","display_name":null,"funder_award_id":"62372423","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W2117130368","https://openalex.org/W2119112357","https://openalex.org/W2579318729","https://openalex.org/W2904276469","https://openalex.org/W2934843808","https://openalex.org/W2947527202","https://openalex.org/W2950689937","https://openalex.org/W2962793481","https://openalex.org/W2962974533","https://openalex.org/W2963073614","https://openalex.org/W2963303354","https://openalex.org/W2997717738","https://openalex.org/W3127260909","https://openalex.org/W3133747496","https://openalex.org/W3135872251","https://openalex.org/W3179216274","https://openalex.org/W4225999490","https://openalex.org/W4288000237","https://openalex.org/W6684191040","https://openalex.org/W6747838042","https://openalex.org/W6763527923","https://openalex.org/W6770411749","https://openalex.org/W6774150056","https://openalex.org/W6790544463"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"The":[0],"intellectual":[1],"property":[2],"of":[3,36,192,199],"deep":[4,57,140],"networks":[5,60],"can":[6],"be":[7,88,154],"easily":[8],"\"stolen\"":[9],"by":[10],"surrogate":[11,93,110],"model":[12,22,54,111,142],"attack.":[13],"There":[14],"has":[15,30],"been":[16,31],"significant":[17],"progress":[18],"in":[19,24,65,81,178],"protecting":[20],"the":[21,34,46,73,91,97,117,148,176,187],"IP":[23],"classification":[25],"tasks.":[26,68],"However,":[27,95],"little":[28],"attention":[29],"devoted":[32],"to":[33,153,195],"protection":[35],"image":[37,58,159],"processing":[38,59],"models.":[39],"By":[40],"utilizing":[41],"consistent":[42,78,158],"invisible":[43],"spatial":[44],"watermarks,":[45],"work":[47],"(Zhang":[48],"et":[49],"al.":[50],"2020)":[51],"first":[52],"considered":[53],"watermarking":[55,131,143],"for":[56],"and":[61,107,190],"demonstrated":[62],"its":[63],"efficacy":[64],"many":[66],"downstream":[67],"Its":[69],"success":[70],"depends":[71],"on":[72,136],"hypothesis":[74],"that":[75,85,169],"if":[76],"a":[77,129,138,196],"watermark":[79,86,119],"exists":[80],"all":[82],"prediction":[83],"outputs,":[84],"will":[87,114],"learned":[89],"into":[90],"attacker's":[92],"model.":[94],"when":[96],"attacker":[98],"uses":[99],"common":[100],"data":[101,180],"augmentation":[102,181],"attacks":[103],"(e.g.,":[104],"rotate,":[105],"crop,":[106],"resize)":[108],"during":[109],"training,":[112],"it":[113],"fail":[115],"because":[116],"underlying":[118],"consistency":[120],"is":[121,145,172],"destroyed.":[122],"To":[123],"mitigate":[124],"this":[125],"issue,":[126],"we":[127,185],"propose":[128],"new":[130,139],"methodology,":[132],"\"structure":[133],"consistency\",":[134],"based":[135],"which":[137],"structure-aligned":[141],"algorithm":[144],"designed.":[146],"Specifically,":[147],"embedded":[149],"watermarks":[150],"are":[151],"designed":[152],"aligned":[155],"with":[156],"physically":[157],"structures,":[160],"such":[161],"as":[162],"edges":[163],"or":[164],"semantic":[165],"regions.":[166],"Experiments":[167],"demonstrate":[168],"our":[170,193],"method":[171,194],"more":[173],"robust":[174],"than":[175],"baseline":[177],"resisting":[179],"attacks.":[182,201],"Besides":[183],"that,":[184],"test":[186],"generalization":[188],"ability":[189],"robustness":[191],"broader":[197],"range":[198],"adaptive":[200]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
