{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T12:54:07Z","timestamp":1726491247974},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103662","type":"journal-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T10:44:04Z","timestamp":1701859444000},"page":"103662","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["AdvEWM: Generating image adversarial examples by embedding digital watermarks"],"prefix":"10.1016","volume":"80","author":[{"given":"Yuexin","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Tiantian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Jie","family":"He","sequence":"additional","affiliation":[]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2013","series-title":"Intriguing properties of neural networks","author":"Szegedy","key":"10.1016\/j.jisa.2023.103662_b1"},{"year":"2014","series-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","key":"10.1016\/j.jisa.2023.103662_b2"},{"key":"10.1016\/j.jisa.2023.103662_b3","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016, p. 2574\u201382.","DOI":"10.1109\/CVPR.2016.282"},{"year":"2018","series-title":"Maximal jacobian-based saliency map attack","author":"Wiyatno","key":"10.1016\/j.jisa.2023.103662_b4"},{"year":"2016","series-title":"Simple black-box adversarial perturbations for deep networks","author":"Narodytska","key":"10.1016\/j.jisa.2023.103662_b5"},{"year":"2017","series-title":"Adversarial transformation networks: Learning to generate adversarial examples","author":"Baluja","key":"10.1016\/j.jisa.2023.103662_b6"},{"key":"10.1016\/j.jisa.2023.103662_b7","doi-asserted-by":"crossref","unstructured":"Chen P-Y, Zhang H, Sharma Y, Yi J, Hsieh C-J. Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM workshop on artificial intelligence and security. 2017, p. 15\u201326.","DOI":"10.1145\/3128572.3140448"},{"year":"2018","series-title":"Generating adversarial examples with adversarial networks","author":"Xiao","key":"10.1016\/j.jisa.2023.103662_b8"},{"key":"10.1016\/j.jisa.2023.103662_b9","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.patrec.2019.06.028","article-title":"Generate adversarial examples by spatially perturbing on the meaningful area","volume":"125","author":"Deng","year":"2019","journal-title":"Pattern Recognit Lett"},{"year":"2019","series-title":"Semanticadv: Generating adversarial examples via attribute-conditional image editing","author":"Qiu","key":"10.1016\/j.jisa.2023.103662_b10"},{"key":"10.1016\/j.jisa.2023.103662_b11","doi-asserted-by":"crossref","unstructured":"Tu C-C, Ting P, Chen P-Y, Liu S, Zhang H, Yi J, Hsieh C-J, Cheng S-M. Autozoom: Autoencoder-based zeroth order optimization method for attacking black-box neural networks. In: Proceedings of the AAAI conference on artificial intelligence. vol. 33, 2019, p. 742\u20139, (01).","DOI":"10.1609\/aaai.v33i01.3301742"},{"key":"10.1016\/j.jisa.2023.103662_b12","series-title":"2020 IEEE symposium on security and privacy (Sp)","first-page":"1277","article-title":"Hopskipjumpattack: A query-efficient decision-based attack","author":"Chen","year":"2020"},{"key":"10.1016\/j.jisa.2023.103662_b13","series-title":"European conference on computer vision","first-page":"19","article-title":"SemanticAdv: Generating adversarial examples via attribute-conditioned image editing","author":"Qiu","year":"2020"},{"key":"10.1016\/j.jisa.2023.103662_b14","series-title":"International conference on machine learning","first-page":"2196","article-title":"Minimally distorted adversarial examples with a fast adaptive boundary attack","author":"Croce","year":"2020"},{"year":"2020","series-title":"Skip connections matter: On the transferability of adversarial examples generated with resnets","author":"Wu","key":"10.1016\/j.jisa.2023.103662_b15"},{"key":"10.1016\/j.jisa.2023.103662_b16","doi-asserted-by":"crossref","unstructured":"Kong Z, Guo J, Li A, Liu C. Physgan: Generating physical-world-resilient adversarial examples for autonomous driving. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2020, p. 14254\u201363.","DOI":"10.1109\/CVPR42600.2020.01426"},{"key":"10.1016\/j.jisa.2023.103662_b17","series-title":"2021 26th Asia and south pacific design automation conference (ASP-DAC)","first-page":"885","article-title":"Attacking a CNN-based layout hotspot detector using group gradient method","author":"Yang","year":"2021"},{"year":"2021","series-title":"Local black-box adversarial attacks: A query efficient approach","author":"Xiang","key":"10.1016\/j.jisa.2023.103662_b18"},{"key":"10.1016\/j.jisa.2023.103662_b19","doi-asserted-by":"crossref","unstructured":"Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy I. Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia conference on computer and communications security. 2018, p. 159\u201372.","DOI":"10.1145\/3196494.3196550"},{"key":"10.1016\/j.jisa.2023.103662_b20","first-page":"1","article-title":"Adversarial frontier stitching for remote neural network watermarking","author":"Le Merrer","year":"2019","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.jisa.2023.103662_b21","series-title":"2018 26th European signal processing conference (EUSIPCO)","first-page":"519","article-title":"Adversarial machine learning against digital watermarking","author":"Quiring","year":"2018"},{"year":"2019","series-title":"Romark: A robust watermarking system using adversarial training","author":"Wen","key":"10.1016\/j.jisa.2023.103662_b22"},{"key":"10.1016\/j.jisa.2023.103662_b23","series-title":"Advances in neural information processing systems","first-page":"6103","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","author":"Shafahi","year":"2018"},{"year":"2020","series-title":"Attacking optical character recognition (OCR) systems with adversarial watermarks","author":"Chen","key":"10.1016\/j.jisa.2023.103662_b24"},{"key":"10.1016\/j.jisa.2023.103662_b25","doi-asserted-by":"crossref","unstructured":"Jia X, Wei X, Cao X, Han X. Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples. In: Proceedings of the 28th ACM international conference on multimedia. 2020, p. 1579\u201387.","DOI":"10.1145\/3394171.3413976"},{"key":"10.1016\/j.jisa.2023.103662_b26","series-title":"European conference on computer vision","first-page":"152","article-title":"WaveTransform: Crafting adversarial examples via input decomposition","author":"Anshumaan","year":"2020"},{"key":"10.1016\/j.jisa.2023.103662_b27","doi-asserted-by":"crossref","first-page":"33855","DOI":"10.1109\/ACCESS.2020.2974525","article-title":"Probabilistic analysis of targeted attacks using transform-domain adversarial examples","volume":"8","author":"Yahya","year":"2020","journal-title":"IEEE Access"},{"issue":"3.4","key":"10.1016\/j.jisa.2023.103662_b28","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender","year":"1996","journal-title":"IBM Syst J"},{"key":"10.1016\/j.jisa.2023.103662_b29","series-title":"Proceedings. the 2009 international symposium on web information systems and applications (WISA 2009)","first-page":"104","article-title":"A digital watermarking algorithm based on DCT and DWT","author":"Jiansheng","year":"2009"},{"key":"10.1016\/j.jisa.2023.103662_b30","series-title":"2009 2nd international congress on image and signal processing","first-page":"1","article-title":"Blind watermarking algorithm based on DCT for color images","author":"Zhou","year":"2009"},{"key":"10.1016\/j.jisa.2023.103662_b31","doi-asserted-by":"crossref","unstructured":"Zhang T, Du Y. A Digital Watermarking Algorithm for Color Images Based on DCT. In: 2009 international conference on information engineering and computer science. 2009, p. 1\u20134.","DOI":"10.1109\/ICIECS.2009.5364628"},{"year":"2014","series-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","key":"10.1016\/j.jisa.2023.103662_b32"},{"key":"10.1016\/j.jisa.2023.103662_b33","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016, p. 770\u20138.","DOI":"10.1109\/CVPR.2016.90"},{"key":"10.1016\/j.jisa.2023.103662_b34","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A. Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2015, p. 1\u20139.","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"10.1016\/j.jisa.2023.103662_b35","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger KQ. Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2017, p. 4700\u20138.","DOI":"10.1109\/CVPR.2017.243"},{"year":"2017","series-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","key":"10.1016\/j.jisa.2023.103662_b36"},{"key":"10.1016\/j.jisa.2023.103662_b37","series-title":"International conference on machine learning","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019"},{"key":"10.1016\/j.jisa.2023.103662_b38","series-title":"2010 20th International conference on pattern recognition","first-page":"2366","article-title":"Image quality metrics: PSNR vs. SSIM","author":"Hore","year":"2010"},{"issue":"3","key":"10.1016\/j.jisa.2023.103662_b39","doi-asserted-by":"crossref","first-page":"8","DOI":"10.4236\/jcc.2019.73002","article-title":"Image quality assessment through FSIM, SSIM, MSE and PSNR\u2014a comparative study","volume":"7","author":"Sara","year":"2019","journal-title":"J Comput Commun"},{"key":"10.1016\/j.jisa.2023.103662_b40","series-title":"2012 fourth international workshop on quality of multimedia experience","first-page":"37","article-title":"Peak signal-to-noise ratio revisited: Is simple beautiful?","author":"Korhonen","year":"2012"},{"issue":"4","key":"10.1016\/j.jisa.2023.103662_b41","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2023.103662_b42","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Fawzi O, Frossard P. Universal adversarial perturbations. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2017, p. 1765\u201373.","DOI":"10.1109\/CVPR.2017.17"},{"key":"10.1016\/j.jisa.2023.103662_b43","doi-asserted-by":"crossref","unstructured":"Alzantot M, Sharma Y, Chakraborty S, Zhang H, Hsieh C-J, Srivastava MB. Genattack: Practical black-box attacks with gradient-free optimization. In: Proceedings of the genetic and evolutionary computation conference. 2019, p. 1111\u20139.","DOI":"10.1145\/3321707.3321749"},{"key":"10.1016\/j.jisa.2023.103662_b44","series-title":"2021 IEEE international conference on image processing (ICIP)","first-page":"2543","article-title":"Ai-gan: Attack-inspired generation of adversarial examples","author":"Bai","year":"2021"},{"key":"10.1016\/j.jisa.2023.103662_b45","article-title":"AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples","volume":"68","author":"Wang","year":"2022","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"10.1016\/j.jisa.2023.103662_b46","doi-asserted-by":"crossref","first-page":"412","DOI":"10.3390\/e24030412","article-title":"Abcattack: A gradient-free optimization black-box attack for fooling deep image classifiers","volume":"24","author":"Cao","year":"2022","journal-title":"Entropy"},{"year":"2020","series-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","key":"10.1016\/j.jisa.2023.103662_b47"},{"key":"10.1016\/j.jisa.2023.103662_b48","doi-asserted-by":"crossref","unstructured":"Feng S, Feng F, Xu X, Wang Z, Hu Y, Xie L. Digital Watermark Perturbation for Adversarial Examples to Fool Deep Neural Networks. In: 2021 international joint conference on neural networks (IJCNN). 2021, p. 1\u20138.","DOI":"10.1109\/IJCNN52387.2021.9534119"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002466?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002466?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T22:57:06Z","timestamp":1709074626000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":48,"alternative-id":["S2214212623002466"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103662","relation":{},"ISSN":["2214-2126"],"issn-type":[{"type":"print","value":"2214-2126"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AdvEWM: Generating image adversarial examples by embedding digital watermarks","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103662","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103662"}}