{"id":"https://openalex.org/W7134901357","doi":"https://doi.org/10.48550/arxiv.2603.09454","title":"ShapeMark: Robust and Diversity-Preserving Watermarking for Diffusion Models","display_name":"ShapeMark: Robust and Diversity-Preserving Watermarking for Diffusion Models","publication_year":2026,"publication_date":"2026-03-10","ids":{"openalex":"https://openalex.org/W7134901357","doi":"https://doi.org/10.48550/arxiv.2603.09454"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.09454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.09454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.09454","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047282271","display_name":"Yuqi Qian","orcid":"https://orcid.org/0000-0001-7119-5501"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qian, Yuqi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128789116","display_name":"Yun Cao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cao, Yun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014724514","display_name":"Haocheng Fu","orcid":"https://orcid.org/0000-0001-9088-0571"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fu, Haocheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128789275","display_name":"Meiyang Lv","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lv, Meiyang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5075403716","display_name":"Meineng Zhu","orcid":"https://orcid.org/0000-0001-6800-7952"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhu, Meineng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047282271"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.28540000319480896,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.28540000319480896,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.1932000070810318,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.16840000450611115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8727999925613403},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7818999886512756},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7646999955177307},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.5958999991416931},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.46650001406669617},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.40299999713897705},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.3700999915599823}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8727999925613403},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7818999886512756},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7646999955177307},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.664900004863739},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.5958999991416931},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.46650001406669617},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40779998898506165},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4066999852657318},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.40299999713897705},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.385699987411499},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.3700999915599823},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.3407999873161316},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33309999108314514},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32350000739097595},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.30660000443458557},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.29820001125335693},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.2635999917984009},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2517000138759613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.09454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.09454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.09454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.09454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Diffusion":[0],"models":[1],"have":[2,22],"made":[3],"substantial":[4],"advances":[5],"in":[6,26,87],"recent":[7,42],"years,":[8],"enabling":[9],"high-quality":[10],"image":[11],"synthesis;":[12],"however,":[13],"the":[14,55,99,105,128,138],"widespread":[15],"dissemination":[16],"and":[17,30,41,66],"reuse":[18],"of":[19,130,166],"their":[20,135],"outputs":[21],"introduced":[23],"new":[24],"challenges":[25],"intellectual":[27],"property":[28],"protection":[29],"content":[31],"provenance.":[32],"Image":[33],"watermarking":[34,52],"offers":[35],"a":[36,122,163],"solution":[37],"to":[38,63,72],"these":[39],"challenges,":[40],"work":[43],"has":[44],"increasingly":[45],"explored":[46],"Noise-as-Watermark":[47],"(NaW)":[48],"approaches":[49],"that":[50,104,126,151],"integrate":[51],"directly":[53],"into":[54,79,98],"diffusion":[56],"process.":[57],"However,":[58],"existing":[59],"NaW":[60],"methods":[61],"fail":[62],"balance":[64],"robustness":[65,156],"diversity.":[67],"We":[68],"attribute":[69],"this":[70],"weakness":[71],"value":[73],"encoding,":[74],"which":[75],"encodes":[76],"watermark":[77,96,106,139],"bits":[78,97],"individual":[80,111],"sampled":[81],"values.":[82],"It":[83],"is":[84,107],"extremely":[85],"fragile":[86],"practical":[88],"application":[89],"scenarios.":[90,168],"To":[91,115],"address":[92],"this,":[93],"we":[94,120],"encode":[95],"structured":[100],"noise":[101,131,143],"pattern,":[102],"so":[103],"preserved":[108],"even":[109],"when":[110],"values":[112],"are":[113],"perturbed.":[114],"further":[116],"ensure":[117],"generation":[118,160],"diversity,":[119],"introduce":[121],"dedicated":[123],"randomization":[124],"design":[125],"reshuffles":[127],"positions":[129],"elements":[132],"without":[133],"changing":[134],"values,":[136],"preventing":[137],"from":[140],"inducing":[141],"fixed":[142],"patterns":[144],"or":[145],"spatial":[146],"locations.":[147],"Extensive":[148],"experiments":[149],"demonstrate":[150],"our":[152],"method":[153],"achieves":[154],"state-of-the-art":[155],"while":[157],"maintaining":[158],"high":[159],"quality":[161],"across":[162],"wide":[164],"range":[165],"lossy":[167]},"counts_by_year":[],"updated_date":"2026-03-12T06:18:43.230356","created_date":"2026-03-12T00:00:00"}
