
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection
Xiaoshuai Wu, Xin Liao, Bo Ou
(2023), pp. 1190-1201
Open Access | Times Cited: 13
Xiaoshuai Wu, Xin Liao, Bo Ou
(2023), pp. 1190-1201
Open Access | Times Cited: 13
Showing 13 citing articles:
Learning-based image steganography and watermarking: A survey
Kun Hu, Mingpei Wang, MA Xiao-hui, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123715-123715
Closed Access | Times Cited: 16
Kun Hu, Mingpei Wang, MA Xiao-hui, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123715-123715
Closed Access | Times Cited: 16
EditGuard: Versatile Image Watermarking for Tamper Localization and Copyright Protection
Xuanyu Zhang, Runyi Li, Jiwen Yu, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 11964-11974
Closed Access | Times Cited: 12
Xuanyu Zhang, Runyi Li, Jiwen Yu, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 11964-11974
Closed Access | Times Cited: 12
Geometrical invariant generative invisible hyperlinks based on feature points
Zecheng Peng, Bingwen Feng, Xiaotao Xu, et al.
Applied Soft Computing (2025), pp. 112959-112959
Closed Access
Zecheng Peng, Bingwen Feng, Xiaotao Xu, et al.
Applied Soft Computing (2025), pp. 112959-112959
Closed Access
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping
Yunming Zhang, Dengpan Ye, Caiyun Xie, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4628-4641
Open Access | Times Cited: 3
Yunming Zhang, Dengpan Ye, Caiyun Xie, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4628-4641
Open Access | Times Cited: 3
V 2 A-Mark: Versatile Deep Visual-Audio Watermarking for Manipulation Localization and Copyright Protection
Xuanyu Zhang, Youmin Xu, Runyi Li, et al.
(2024), pp. 9818-9827
Closed Access | Times Cited: 1
Xuanyu Zhang, Youmin Xu, Runyi Li, et al.
(2024), pp. 9818-9827
Closed Access | Times Cited: 1
Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization
Yisu Liu, Jinyang An, Wanqian Zhang, et al.
(2024), pp. 3587-3596
Closed Access | Times Cited: 1
Yisu Liu, Jinyang An, Wanqian Zhang, et al.
(2024), pp. 3587-3596
Closed Access | Times Cited: 1
Towards robust image watermarking via random distortion assignment based meta-learning
Shenglie Zhou, Peisong He, Jiayong Liu, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 103, pp. 104238-104238
Closed Access
Shenglie Zhou, Peisong He, Jiayong Liu, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 103, pp. 104238-104238
Closed Access
Dual-Task Mutual Learning with QPHFM Watermarking for Deepfake Detection
Chunpeng Wang, Chaoyi Shi, Simiao Wang, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2740-2744
Closed Access
Chunpeng Wang, Chaoyi Shi, Simiao Wang, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2740-2744
Closed Access
Robust-Wide: Robust Watermarking Against Instruction-Driven Image Editing
Runyi Hu, Jie Zhang, Ting Xu, et al.
Lecture notes in computer science (2024), pp. 20-37
Closed Access
Runyi Hu, Jie Zhang, Ting Xu, et al.
Lecture notes in computer science (2024), pp. 20-37
Closed Access
A destructive active defense algorithm for deepfake face images
Yang Yang, Norisma Idris, Chang Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2356-e2356
Open Access
Yang Yang, Norisma Idris, Chang Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2356-e2356
Open Access
Federated Morozov Regularization for Shortcut Learning in Privacy Preserving Learning with Watermarked Image Data
Tao Ling, Siping Shi, Hao Wang, et al.
(2024), pp. 4899-4908
Closed Access
Tao Ling, Siping Shi, Hao Wang, et al.
(2024), pp. 4899-4908
Closed Access
LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual Watermarks
Tianyi Wang, Mengxiao Huang, Harry H. Cheng, et al.
(2024), pp. 10515-10524
Closed Access
Tianyi Wang, Mengxiao Huang, Harry H. Cheng, et al.
(2024), pp. 10515-10524
Closed Access
Dual-Task Cascaded for Proactive Deepfake Detection Using QPCET Watermarking
C. Wang, Chaoyi Shi, Yunan Liu, et al.
Lecture notes in computer science (2024), pp. 132-147
Closed Access
C. Wang, Chaoyi Shi, Yunan Liu, et al.
Lecture notes in computer science (2024), pp. 132-147
Closed Access