{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T08:10:49Z","timestamp":1744272649118,"version":"3.37.3"},"reference-count":24,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Shaanxi Province Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016112","name":"Xi'an Science and Technology Association","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100016112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1016\/j.eswa.2022.118529","type":"journal-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T18:03:44Z","timestamp":1660759424000},"page":"118529","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":25,"special_numbering":"C","title":["An invisible and robust watermarking scheme using convolutional neural networks"],"prefix":"10.1016","volume":"210","author":[{"given":"Gang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ruotong","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Ziyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"146","key":"10.1016\/j.eswa.2022.118529_b0005","article-title":"ReDMark: Framework for residual diffusion watermarking based on deep networks","volume":"2019","author":"Ahmadi","year":"2019","journal-title":"Expert Systems with Applications"},{"issue":"9","key":"10.1016\/j.eswa.2022.118529_b0010","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","article-title":"An Overview of digital video watermarking","volume":"28","author":"Asikuzzaman","year":"2018","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"7","key":"10.1016\/j.eswa.2022.118529_b0015","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1016\/j.jss.2007.07.036","article-title":"Adaptive watermark mechanism for rightful ownership protection","volume":"81","author":"Chang","year":"2008","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.eswa.2022.118529_b0020","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/TIE.2004.841083","article-title":"A publicly verifiable copyright-proving schemes resistant to malicious attacks","volume":"52","author":"Chen","year":"2005","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"10.1016\/j.eswa.2022.118529_b0030","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/s11042-013-1701-8","article-title":"Bessel-Fourier moment-based robust image zero-watermarking","volume":"74","author":"Gao","year":"2015","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2022.118529_b0035","article-title":"A neural algorithm of artistic style","author":"Gatys","year":"2015","journal-title":"Journal of Vision"},{"key":"10.1016\/j.eswa.2022.118529_b0040","series-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","article-title":"Image style transfer using convolutional neural networks","author":"Gatys","year":"2016"},{"key":"10.1016\/j.eswa.2022.118529_b0045","series-title":"European Conference on Computer Vision (ECCV)","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"Johnson","year":"2016"},{"key":"10.1016\/j.eswa.2022.118529_b0050","series-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","article-title":"Combining markov random fields and convolutional neural networks for image synthesis","author":"Li","year":"2016"},{"key":"10.1016\/j.eswa.2022.118529_b0055","series-title":"ACM on Multimedia Conference","article-title":"Laplacian-steered neural style transfer","author":"Li","year":"2017"},{"year":"2017","series-title":"Deep photo style transfer","author":"Luan","key":"10.1016\/j.eswa.2022.118529_b0060"},{"issue":"2","key":"10.1016\/j.eswa.2022.118529_b0065","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/TIP.2016.2631888","article-title":"Waterloo exploration database: New challenges for image quality assessment models","volume":"26","author":"Ma","year":"2017","journal-title":"IEEE Transactions on Image Processing"},{"issue":"9","key":"10.1016\/j.eswa.2022.118529_b0070","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","article-title":"A reversible data hiding scheme based on code division multiplexing","volume":"11","author":"Ma","year":"2017","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"10.1016\/j.eswa.2022.118529_b0075","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","article-title":"A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection","volume":"417","author":"Makbol","year":"2017","journal-title":"Information Sciences"},{"issue":"14","key":"10.1016\/j.eswa.2022.118529_b0080","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","article-title":"Finding robust domain from attacks: A learning framework for blind watermarking","volume":"337","author":"Mun","year":"2019","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2022.118529_b0085","unstructured":"Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556 [cs]."},{"key":"10.1016\/j.eswa.2022.118529_b0090","first-page":"2023","article-title":"A novel generalized Arnold transform-based zero-watermarking scheme","volume":"4","author":"Sun","year":"2015","journal-title":"Applied Mathematics & Information Sciences"},{"key":"10.1016\/j.eswa.2022.118529_b0095","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.jss.2012.08.040","article-title":"A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection","volume":"86","author":"Tsai","year":"2013","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.eswa.2022.118529_b0100","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1049\/iet-ipr.2013.0558","article-title":"Inversion attack resilient zero-watermarking scheme for medical image authentication","volume":"8","author":"Vellaisamy","year":"2014","journal-title":"IET Image Processing"},{"key":"10.1016\/j.eswa.2022.118529_b0105","series-title":"The NIPS Workshop on Machine Learning for Creativity and Design","article-title":"Neural style transfer for audio spectrograms","author":"Verma","year":"2017"},{"key":"10.1016\/j.eswa.2022.118529_b0110","doi-asserted-by":"crossref","first-page":"26355","DOI":"10.1007\/s11042-016-4130-7","article-title":"Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping","volume":"76","author":"Wang","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.eswa.2022.118529_b0115","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.jvcir.2016.10.004","article-title":"Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments","volume":"41","author":"Wang","year":"2016","journal-title":"Journal of Visual Communication & Image Representation"},{"key":"10.1016\/j.eswa.2022.118529_b0125","first-page":"214","article-title":"Concept and application of zero-watermark","volume":"31","author":"Wen","year":"2003","journal-title":"Acta Electronic Sinica"},{"key":"10.1016\/j.eswa.2022.118529_b0135","series-title":"The Asian Conference on Pattern Recognition","article-title":"Style transfer for anime sketches with enhanced residual u-net and auxiliary classifier GAN","author":"Zhang","year":"2017"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417422016050?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417422016050?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T05:33:20Z","timestamp":1714541600000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417422016050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":24,"alternative-id":["S0957417422016050"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2022.118529","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An invisible and robust watermarking scheme using convolutional neural networks","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2022.118529","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"118529"}}