ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.08457
  4. Cited By
Artificial Fingerprinting for Generative Models: Rooting Deepfake
  Attribution in Training Data
v1v2v3v4v5v6v7 (latest)

Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data

IEEE International Conference on Computer Vision (ICCV), 2020
16 July 2020
Ning Yu
Vladislav Skripniuk
Sahar Abdelnabi
Mario Fritz
    WIGM
ArXiv (abs)PDFHTMLGithub (77★)

Papers citing "Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data"

50 / 164 papers shown
Evaluating Dataset Watermarking for Fine-tuning Traceability of Customized Diffusion Models: A Comprehensive Benchmark and Removal Approach
Evaluating Dataset Watermarking for Fine-tuning Traceability of Customized Diffusion Models: A Comprehensive Benchmark and Removal Approach
X. Wang
Hanchi Sun
Wenjun Sun
Kejun Xue
Wangqiu Zhou
...
Wei Sun
Dandan Zhu
Xiongkuo Min
Jun Jia
Zhijun Fang
WIGM
365
0
0
24 Nov 2025
Proto-LeakNet: Towards Signal-Leak Aware Attribution in Synthetic Human Face Imagery
Proto-LeakNet: Towards Signal-Leak Aware Attribution in Synthetic Human Face Imagery
Claudio Giusti
Luca Guarnera
Sebastiano Battiato
DiffM
363
0
0
06 Nov 2025
NoisePrints: Distortion-Free Watermarks for Authorship in Private Diffusion Models
NoisePrints: Distortion-Free Watermarks for Authorship in Private Diffusion Models
Nir Goren
Oren Katzir
Abhinav Nakarmi
Eyal Ronen
Mahmood Sharif
Or Patashnik
WIGM
300
1
0
15 Oct 2025
SynthID-Image: Image watermarking at internet scale
SynthID-Image: Image watermarking at internet scale
Sven Gowal
Rudy Bunel
Florian Stimberg
David Stutz
Guillermo Ortiz-Jimenez
...
Simon Rosen
Christopher Savčak
Armin Senoner
Nidhi Vyas
Pushmeet Kohli
WIGM
323
14
0
10 Oct 2025
MOLM: Mixture of LoRA Markers
MOLM: Mixture of LoRA Markers
Samar Fares
Nurbek Tastan
Noor Hussein
Karthik Nandakumar
114
0
0
30 Sep 2025
Secure and Robust Watermarking for AI-generated Images: A Comprehensive Survey
Secure and Robust Watermarking for AI-generated Images: A Comprehensive Survey
Jie Cao
Qi Li
Z. Zhang
Jianbing Ni
222
1
0
30 Sep 2025
Zero-Shot Visual Deepfake Detection: Can AI Predict and Prevent Fake Content Before It's Created?
Zero-Shot Visual Deepfake Detection: Can AI Predict and Prevent Fake Content Before It's Created?
Ayan Sar
Sampurna Roy
Tanupriya Choudhury
Ajith Abraham
186
4
0
22 Sep 2025
PRISM: Phase-enhanced Radial-based Image Signature Mapping framework for fingerprinting AI-generated images
PRISM: Phase-enhanced Radial-based Image Signature Mapping framework for fingerprinting AI-generated images
Emanuele Ricco
Elia Onofri
Lorenzo Cima
S. Cresci
Roberto Di Pietro
188
0
0
18 Sep 2025
The Coding Limits of Robust Watermarking for Generative Models
The Coding Limits of Robust Watermarking for Generative ModelsIACR Cryptology ePrint Archive (IACR ePrint), 2025
Danilo Francati
Yevin Nikhel Goonatilake
Shubham Pawar
Daniele Venturi
G. Ateniese
WaLM
323
1
0
11 Sep 2025
Enhancing Robustness in Post-Processing Watermarking: An Ensemble Attack Network Using CNNs and Transformers
Enhancing Robustness in Post-Processing Watermarking: An Ensemble Attack Network Using CNNs and Transformers
Tzuhsuan Huang
Cheng Yu Yeo
Tsai-Ling Huang
Hong-Han Shuai
Wen-Huang Cheng
Jun-Cheng Chen
AAML
174
1
0
03 Sep 2025
Uncovering and Mitigating Destructive Multi-Embedding Attacks in Deepfake Proactive Forensics
Uncovering and Mitigating Destructive Multi-Embedding Attacks in Deepfake Proactive Forensics
Lixin Jia
Haiyang Sun
Zhiqing Guo
Yunfeng Diao
Dan Ma
Gaobo Yang
AAML
259
4
0
24 Aug 2025
DualMark: Identifying Model and Training Data Origins in Generated Audio
DualMark: Identifying Model and Training Data Origins in Generated Audio
Xuefeng Yang
Jian Guan
Feiyang Xiao
Congyi Fan
Haohe Liu
Qiaoxi Zhu
Dongli Xu
Youtian Lin
186
2
0
21 Aug 2025
Learning Generalizable and Efficient Image Watermarking via Hierarchical Two-Stage Optimization
Learning Generalizable and Efficient Image Watermarking via Hierarchical Two-Stage Optimization
Ke Liu
Xuanhan Wang
Qilong Zhang
Lianli Gao
Jingkuan Song
234
0
0
12 Aug 2025
Untraceable DeepFakes via Traceable Fingerprint Elimination
Untraceable DeepFakes via Traceable Fingerprint Elimination
Jiewei Lai
Lan zhang
Chen Tang
Pengcheng Sun
Xinming Wang
Yunhao Wang
AAML
263
0
0
05 Aug 2025
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for Large-scale Model Distribution
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for Large-scale Model Distribution
Zhicheng Zhang
Peizhuo Lv
Mengke Wan
Jiang Fang
Diandian Guo
Yezeng Chen
Yinlong Liu
Wei Ma
Jiyan Sun
Liru Geng
318
0
0
28 Jul 2025
AEDR: Training-Free AI-Generated Image Attribution via Autoencoder Double-Reconstruction
AEDR: Training-Free AI-Generated Image Attribution via Autoencoder Double-Reconstruction
Chao Wang
Kejiang Chen
Zijin Yang
Yaofei Wang
Weiming Zhang
DiffM
260
1
0
25 Jul 2025
GaussMarker: Robust Dual-Domain Watermark for Diffusion Models
GaussMarker: Robust Dual-Domain Watermark for Diffusion Models
Kecen Li
Zhicong Huang
Xinwen Hou
Cheng Hong
DiffMWIGM
390
10
0
13 Jun 2025
A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks
A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks
Junhua Lin
Marc Juarez
414
1
0
12 Jun 2025
Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives
Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives
Shijing He
Yaxiong Lei
Zihan Zhang
Yuzhou Sun
S. Li
Chi Zhang
Juan Ye
239
7
0
07 Jun 2025
Modelship Attribution: Tracing Multi-Stage Manipulations Across Generative Models
Modelship Attribution: Tracing Multi-Stage Manipulations Across Generative Models
Zhiya Tan
Xin Zhang
Joey Tianyi Zhou
240
0
0
03 Jun 2025
Video Signature: Implicit Watermarking for Video Diffusion Models
Video Signature: Implicit Watermarking for Video Diffusion Models
Yu Huang
Junhao Chen
Shuliang Liu
Hanqian Li
Qi Zheng
Yi R.
Fung
Yi R. Fung
Xuming Hu
DiffMWIGMVGen
638
1
0
31 May 2025
KGMark: A Diffusion Watermark for Knowledge Graphs
KGMark: A Diffusion Watermark for Knowledge Graphs
H. Peng
Haolang Lu
Yuanlong Yu
Weiye Fu
Jen-tse Huang
Guoshun Nan
413
3
0
29 May 2025
PALADIN : Robust Neural Fingerprinting for Text-to-Image Diffusion Models
PALADIN : Robust Neural Fingerprinting for Text-to-Image Diffusion Models
Murthy L
Subarna Tripathi
274
0
0
28 May 2025
DOGe: Defensive Output Generation for LLM Protection Against Knowledge Distillation
DOGe: Defensive Output Generation for LLM Protection Against Knowledge Distillation
Pingzhi Li
Zhen Tan
Huaizhi Qu
Huan Liu
Tianlong Chen
Tianlong Chen
AAML
370
6
0
26 May 2025
Deepfake Forensic Analysis: Source Dataset Attribution and Legal Implications of Synthetic Media Manipulation
Deepfake Forensic Analysis: Source Dataset Attribution and Legal Implications of Synthetic Media Manipulation
Massimiliano Cassia
Luca Guarnera
Mirko Casu
Ignazio Zangara
Sebastiano Battiato
369
3
0
16 May 2025
WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks
WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks
Ziyuan He
Zhiqing Guo
Liejun Wang
Gaobo Yang
Yunfeng Diao
Dan Ma
706
3
0
13 May 2025
DATA: Multi-Disentanglement based Contrastive Learning for Open-World Semi-Supervised Deepfake Attribution
DATA: Multi-Disentanglement based Contrastive Learning for Open-World Semi-Supervised Deepfake AttributionIEEE transactions on multimedia (TMM), 2025
Ming-Hui Liu
Xiao-Qian Liu
Xin Luo
Xin-Shun Xu
308
4
0
07 May 2025
TriniMark: A Robust Generative Speech Watermarking Method for Trinity-Level Traceability
TriniMark: A Robust Generative Speech Watermarking Method for Trinity-Level Traceability
Yue Li
Wen Liu
Dongdong Lin
Dongdong Lin
Kassem Kallas
361
1
0
29 Apr 2025
Protecting Your Voice: Temporal-aware Robust Watermarking
Protecting Your Voice: Temporal-aware Robust Watermarking
Yue Li
Weizhi Liu
Dongdong Lin
Hui Tian
Hongxia Wang
511
0
0
21 Apr 2025
WMCopier: Forging Invisible Image Watermarks on Arbitrary Images
WMCopier: Forging Invisible Image Watermarks on Arbitrary Images
Ziping Dong
Chao Shuai
Zhongjie Ba
Jun Zhou
Zhan Qin
Qinglong Wang
Kui Ren
WIGM
302
0
0
28 Mar 2025
Instance-Level Data-Use Auditing of Visual ML Models
Instance-Level Data-Use Auditing of Visual ML Models
Zonghao Huang
Neil Zhenqiang Gong
Michael K. Reiter
MLAU
517
2
0
28 Mar 2025
Adoption of Watermarking for Generative AI Systems in Practice and Implications under the new EU AI Act
Adoption of Watermarking for Generative AI Systems in Practice and Implications under the new EU AI Act
Bram Rijsbosch
Gijs van Dijck
Konrad Kollnig
346
1
0
23 Mar 2025
Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models
Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion ModelsComputer Vision and Pattern Recognition (CVPR), 2025
Zhenguang Liu
Chao Shuai
Shaojing Fan
Ziping Dong
Jinwu Hu
Zhongjie Ba
Kui Ren
WIGM
485
1
0
14 Mar 2025
Safe-VAR: Safe Visual Autoregressive Model for Text-to-Image Generative Watermarking
Safe-VAR: Safe Visual Autoregressive Model for Text-to-Image Generative Watermarking
Ziyi Wang
Songbai Tan
Gang Xu
Xuerui Qiu
Hongbin Xu
Xin Meng
Ming Li
Fei Richard Yu
WIGM
423
3
0
14 Mar 2025
Robust Watermarks Leak: Channel-Aware Feature Extraction Enables Adversarial Watermark Manipulation
Robust Watermarks Leak: Channel-Aware Feature Extraction Enables Adversarial Watermark Manipulation
Zhongjie Ba
Yujiao Shi
Jun Zhou
Bin Gong
Xinyu Zhang
Qinglong Wang
Kui Ren
AAML
590
1
0
10 Feb 2025
LampMark: Proactive Deepfake Detection via Training-Free Landmark
  Perceptual Watermarks
LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual WatermarksACM Multimedia (MM), 2024
Tianyi Wang
Mengxiao Huang
Harry Cheng
Xiao Zhang
Zhiqi Shen
436
33
0
26 Nov 2024
Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion
  Models for Unauthorized Data Usage
Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Soumil Datta
Shih-Chieh Dai
Leo Yu
Guanhong Tao
WIGM
365
0
0
22 Nov 2024
CDI: Copyrighted Data Identification in Diffusion Models
CDI: Copyrighted Data Identification in Diffusion ModelsComputer Vision and Pattern Recognition (CVPR), 2024
Jan Dubiñski
Antoni Kowalczuk
Franziska Boenisch
Adam Dziedzic
550
6
0
19 Nov 2024
CLUE-MARK: Watermarking Diffusion Models using CLWE
Kareem Shehata
Aashish Kolluri
P. Saxena
DiffM
605
2
0
18 Nov 2024
Watermark Anything with Localized Messages
Watermark Anything with Localized MessagesInternational Conference on Learning Representations (ICLR), 2024
Tom Sander
Pierre Fernandez
Alain Durmus
Teddy Furon
Matthijs Douze
VLM
510
50
0
11 Nov 2024
ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization
ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial OptimizationNeural Information Processing Systems (NeurIPS), 2024
Huayang Huang
Yu Wu
Qian Wang
DiffMWIGM
735
47
0
06 Nov 2024
Fingerprints of Super Resolution Networks
Fingerprints of Super Resolution Networks
Jeremy Vonderfecht
Feng Liu
305
1
0
29 Oct 2024
The Cat and Mouse Game: The Ongoing Arms Race Between Diffusion Models
  and Detection Methods
The Cat and Mouse Game: The Ongoing Arms Race Between Diffusion Models and Detection Methods
Linda Laurier
Ave Giulietta
Arlo Octavia
Meade Cleti
511
7
0
24 Oct 2024
SLIC: Secure Learned Image Codec through Compressed Domain Watermarking
  to Defend Image Manipulation
SLIC: Secure Learned Image Codec through Compressed Domain Watermarking to Defend Image ManipulationACM Multimedia Asia (MMAsia), 2024
Chen-Hsiu Huang
Ja-Ling Wu
210
3
0
19 Oct 2024
Towards Reliable Verification of Unauthorized Data Usage in Personalized
  Text-to-Image Diffusion Models
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion ModelsIEEE Symposium on Security and Privacy (S&P), 2024
Boheng Li
Yanhao Wei
Yankai Fu
Ziyi Wang
Yiming Li
Jie Zhang
Run Wang
Minlie Huang
DiffMAAML
272
23
0
14 Oct 2024
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Vishal Asnani
Xi Yin
Xiaoming Liu
AAML
431
2
0
24 Sep 2024
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
322
2
0
10 Sep 2024
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the
  Shadow of Text-To-Image Model Evolution
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model EvolutionConference on Computer and Communications Security (CCS), 2024
Yixin Wu
Yun Shen
Michael Backes
Yang Zhang
323
9
0
30 Aug 2024
Watermarking Techniques for Large Language Models: A Survey
Watermarking Techniques for Large Language Models: A Survey
Yuqing Liang
Jiancheng Xiao
Wensheng Gan
Philip S. Yu
OffRL
391
26
0
26 Aug 2024
Are CLIP features all you need for Universal Synthetic Image Origin
  Attribution?
Are CLIP features all you need for Universal Synthetic Image Origin Attribution?
Dario Cioni
Christos Tzelepis
Lorenzo Seidenari
Ioannis Patras
294
10
0
17 Aug 2024
1234
Next
Page 1 of 4