{"id":"https://openalex.org/W7127089719","doi":"https://doi.org/10.1109/trustcom66490.2025.00109","title":"Robustness Assessment and Enhancement of Text Watermarking for Google\u2019s SynthID","display_name":"Robustness Assessment and Enhancement of Text Watermarking for Google\u2019s SynthID","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7127089719","doi":"https://doi.org/10.1109/trustcom66490.2025.00109"},"language":null,"primary_location":{"id":"doi:10.1109/trustcom66490.2025.00109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124760909","display_name":"Xia Han","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Xia Han","raw_affiliation_strings":["Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350223","display_name":"Qi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Queen&#x2019;s University,School of Computing,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,School of Computing,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120318443","display_name":"Jianbing Ni","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Department of Electrical and Computer Engineering,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005563986","display_name":"Mohammad Zulkernine","orcid":"https://orcid.org/0000-0003-1697-4101"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Zulkernine","raw_affiliation_strings":["Queen&#x2019;s University,School of Computing,Kingston,Canada,K7L 3N6"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,School of Computing,Kingston,Canada,K7L 3N6","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124760909"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.73316992,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"942","last_page":"949"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3944000005722046,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.3944000005722046,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.10270000249147415,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.09690000116825104,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9580000042915344},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7886000275611877},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7520999908447266},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6040999889373779},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.5411999821662903}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9580000042915344},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7886000275611877},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7520999908447266},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7261000275611877},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6040999889373779},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.5411999821662903},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5023999810218811},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.45399999618530273},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.37290000915527344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3564999997615814},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.34599998593330383},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.2924000024795532}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom66490.2025.00109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2935349488","https://openalex.org/W2952608669","https://openalex.org/W3133747496","https://openalex.org/W4224215750","https://openalex.org/W4315929005","https://openalex.org/W4383751019","https://openalex.org/W4385245566","https://openalex.org/W4390841259","https://openalex.org/W4401042803","https://openalex.org/W4402169037","https://openalex.org/W4402671946","https://openalex.org/W4403680773","https://openalex.org/W4404783813","https://openalex.org/W4412886730"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,112,126],"LLM":[3],"watermarking":[4,71,125],"methods":[5],"such":[6,34],"as":[7,35],"SynthID-Text":[8,28],"by":[9,107],"Google":[10],"DeepMind":[11],"offer":[12],"promising":[13],"solutions":[14],"for":[15],"tracing":[16],"the":[17,59,69,92,121],"provenance":[18,88],"of":[19,63,73,110,123],"AI-generated":[20],"text.":[21],"However,":[22],"our":[23],"robustness":[24],"assessment":[25],"reveals":[26],"that":[27,57,102],"is":[29],"vulnerable":[30],"to":[31,116],"meaning-preserving":[32],"attacks,":[33],"paraphrasing,":[36],"copy-paste":[37],"modifications,":[38],"and":[39,83,133],"back-translation,":[40],"which":[41],"can":[42],"significantly":[43],"degrade":[44],"watermark":[45,105],"detectability.":[46],"To":[47],"address":[48],"these":[49],"limitations,":[50],"we":[51],"propose":[52],"SynGuard,":[53],"a":[54],"hybrid":[55],"framework":[56],"combines":[58],"semantic":[60,84],"alignment":[61],"strength":[62],"Semantic":[64],"Invariant":[65],"Robust":[66],"(SIR)":[67],"with":[68],"probabilistic":[70],"mechanism":[72],"SynthID-Text.":[74,117],"Our":[75],"approach":[76],"jointly":[77],"embeds":[78],"watermarks":[79],"at":[80],"both":[81],"lexical":[82],"levels,":[85],"enabling":[86],"robust":[87],"tracking":[89],"while":[90],"preserving":[91],"original":[93],"meaning.":[94],"Experimental":[95],"results":[96],"across":[97],"multiple":[98],"attack":[99],"scenarios":[100],"show":[101],"SynGuard":[103],"improves":[104],"recovery":[106],"an":[108],"average":[109],"11.1%":[111],"F1":[113],"score":[114],"compared":[115],"These":[118],"findings":[119],"demonstrate":[120],"effectiveness":[122],"semantic-aware":[124],"resisting":[127],"real-world":[128],"tampering.":[129],"All":[130],"code,":[131],"datasets,":[132],"evaluation":[134],"scripts":[135],"are":[136],"publicly":[137],"available":[138],"at:":[139],"https://github.com/githshine/SynGuard.":[140]},"counts_by_year":[],"updated_date":"2026-02-06T02:01:19.302388","created_date":"2026-02-03T00:00:00"}
