{"id":"https://openalex.org/W3087931608","doi":"https://doi.org/10.2352/issn.2470-1173.2020.4.mwsf-022","title":"Watermarking in Deep Neural Networks via Error Back-propagation","display_name":"Watermarking in Deep Neural Networks via Error Back-propagation","publication_year":2020,"publication_date":"2020-01-26","ids":{"openalex":"https://openalex.org/W3087931608","doi":"https://doi.org/10.2352/issn.2470-1173.2020.4.mwsf-022","mag":"3087931608"},"language":"en","primary_location":{"id":"doi:10.2352/issn.2470-1173.2020.4.mwsf-022","is_oa":false,"landing_page_url":"https://doi.org/10.2352/issn.2470-1173.2020.4.mwsf-022","pdf_url":null,"source":{"id":"https://openalex.org/S4210227276","display_name":"Electronic Imaging","issn_l":"2470-1173","issn":["2470-1173"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Imaging","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100621503","display_name":"Jiangfeng Wang","orcid":"https://orcid.org/0000-0003-4991-2193"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jiangfeng Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049733139","display_name":"Hanzhou Wu","orcid":"https://orcid.org/0000-0002-1599-7232"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanzhou Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071724015","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0001-5867-1315"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5065630251","display_name":"Yuwei Yao","orcid":"https://orcid.org/0000-0003-4429-2319"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuwei Yao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100621503"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.4339,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.9400246,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"32","issue":"4","first_page":"22","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7423906922340393},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6145564317703247},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5953742265701294},{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.570542573928833},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5615618824958801},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4711897373199463},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.46537157893180847},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37350308895111084},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.1579781472682953}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7423906922340393},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6145564317703247},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5953742265701294},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.570542573928833},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5615618824958801},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4711897373199463},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.46537157893180847},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37350308895111084},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.1579781472682953}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.2352/issn.2470-1173.2020.4.mwsf-022","is_oa":false,"landing_page_url":"https://doi.org/10.2352/issn.2470-1173.2020.4.mwsf-022","pdf_url":null,"source":{"id":"https://openalex.org/S4210227276","display_name":"Electronic Imaging","issn_l":"2470-1173","issn":["2470-1173"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Imaging","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2894173309","https://openalex.org/W4387932263","https://openalex.org/W2157746493","https://openalex.org/W1495379181","https://openalex.org/W2371065793","https://openalex.org/W4377865163","https://openalex.org/W3193857078","https://openalex.org/W3208304128","https://openalex.org/W3000197790"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,11,107],"deep":[3,75],"learning":[4],"(DL)":[5],"have":[6,122],"led":[7],"to":[8,28,47,54,62,74,81,94],"great":[9],"success":[10],"tasks":[12],"of":[13,33,38,58,127,171],"computer":[14],"vision":[15],"and":[16,36,111,115,146,162,169],"pattern":[17],"recognition.":[18],"Sharing":[19],"pre-trained":[20],"DL":[21,39,60],"models":[22,61],"has":[23,165],"been":[24],"an":[25,87],"important":[26],"means":[27],"promote":[29],"the":[30,56,59,108,125,140,156,167,172],"rapid":[31],"progress":[32],"research":[34],"community":[35],"development":[37],"based":[40],"systems.":[41],"However,":[42],"it":[43],"also":[44],"raises":[45],"challenges":[46],"model":[48,160],"authentication.":[49],"It":[50],"is":[51,104],"quite":[52],"necessary":[53],"protect":[55],"ownership":[57],"be":[63,118,136,143],"released.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68],"present":[69],"a":[70,83,149],"digital":[71],"watermarking":[72],"technique":[73],"neural":[76,89,102,151],"networks":[77],"(DNNs).":[78],"We":[79],"propose":[80],"mark":[82],"DNN":[84,129],"by":[85],"inserting":[86],"independent":[88,101],"network":[90,103,152],"that":[91],"allows":[92],"us":[93],"use":[95],"selective":[96],"weights":[97],"for":[98],"watermarking.":[99],"The":[100],"only":[105],"used":[106],"training":[109],"phase":[110],"watermark":[112,141],"verification":[113],"phase,":[114],"will":[116,134],"not":[117,135],"released":[119],"publicly.":[120],"Experiments":[121],"shown":[123,166],"that,":[124],"performance":[126],"marked":[128],"on":[130],"its":[131],"original":[132],"task":[133],"degraded":[137],"significantly.":[138],"Meantime,":[139],"can":[142],"successfully":[144],"embedded":[145],"extracted":[147],"with":[148],"low":[150],"loss":[153],"even":[154],"under":[155],"common":[157],"attacks":[158],"including":[159],"fine-tuning":[161],"compression,":[163],"which":[164],"superiority":[168],"applicability":[170],"proposed":[173],"work.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
