{"id":"https://openalex.org/W7131400716","doi":"https://doi.org/10.48550/arxiv.2602.19097","title":"SiGRRW: A Single-Watermark Robust Reversible Watermarking Framework with Guiding Strategy","display_name":"SiGRRW: A Single-Watermark Robust Reversible Watermarking Framework with Guiding Strategy","publication_year":2026,"publication_date":"2026-02-22","ids":{"openalex":"https://openalex.org/W7131400716","doi":"https://doi.org/10.48550/arxiv.2602.19097"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.19097","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19097","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.19097","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126785184","display_name":"Zikai Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xu, Zikai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126838207","display_name":"Bin Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Bin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108473821","display_name":"Weihai Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Weihai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126719030","display_name":"Lijunxian Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Lijunxian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126829830","display_name":"Nenghai Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu, Nenghai","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5126785184"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8305000066757202},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.820900022983551},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7760999798774719},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4894999861717224},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.47999998927116394},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4302000105381012},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4291999936103821}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8305000066757202},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.820900022983551},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7760999798774719},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.760200023651123},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4894999861717224},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.47999998927116394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43529999256134033},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4302000105381012},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4291999936103821},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4115000069141388},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3772999942302704},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.36390000581741333},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3517000079154968},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3176000118255615},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2694999873638153},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.25769999623298645},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.19097","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19097","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.19097","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19097","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Robust":[0],"reversible":[1],"watermarking":[2,123],"(RRW)":[3],"enables":[4],"copyright":[5],"protection":[6],"for":[7,89],"images":[8,109],"while":[9,153],"overcoming":[10],"the":[11,43,87,99,126],"limitation":[12],"of":[13,129,157],"distortion":[14],"introduced":[15],"by":[16],"watermark":[17,94,111],"itself.":[18],"Current":[19],"RRW":[20,63,151],"schemes":[21,152],"typically":[22],"employ":[23],"a":[24,36,61,77,121],"two-stage":[25],"framework,":[26,64],"which":[27,65,102],"fails":[28],"to":[29,68,81,135,149],"achieve":[30],"simultaneous":[31],"robustness":[32,147],"and":[33,39,56,72,91,110,146],"reversibility":[34],"within":[35],"single":[37],"watermarking,":[38],"functional":[40],"interference":[41],"between":[42],"two":[44],"watermarks":[45],"results":[46],"in":[47,50],"performance":[48],"degradation":[49],"multiple":[51],"terms":[52],"such":[53],"as":[54,86,120],"capacity":[55,163],"imperceptibility.":[57],"We":[58,75],"propose":[59],"SiGRRW,":[60],"single-watermark":[62],"is":[66,95],"applicable":[67],"both":[69,107],"generative":[70,130],"models":[71],"natural":[73,136],"images.":[74,112,137],"introduce":[76],"novel":[78],"guiding":[79,83,100],"strategy":[80],"generate":[82],"images,":[84,159],"serving":[85],"guidance":[88],"embedding":[90],"recovery.":[92],"The":[93,113],"reversibly":[96],"embedded":[97],"with":[98,160],"residual,":[101],"can":[103,116],"be":[104,117],"calculated":[105],"from":[106],"cover":[108,158],"proposed":[114],"framework":[115],"deployed":[118],"either":[119],"plug-and-play":[122],"layer":[124],"at":[125],"output":[127],"stage":[128],"models,":[131],"or":[132],"directly":[133],"applied":[134],"Extensive":[138],"experiments":[139],"demonstrate":[140],"that":[141],"SiGRRW":[142],"effectively":[143],"enhances":[144],"imperceptibility":[145],"compared":[148],"existing":[150],"maintaining":[154],"lossless":[155],"recovery":[156],"significantly":[161],"higher":[162],"than":[164],"conventional":[165],"schemes.":[166]},"counts_by_year":[],"updated_date":"2026-02-26T06:34:08.959763","created_date":"2026-02-26T00:00:00"}
