When There Is No Decoder: Removing Watermarks from Stable Diffusion Models in a No-box Setting
Xiaodong Wu, Tianyi Tang, Xiangman Li, Jianbing Ni, Yong Yu
https://arxiv.org/abs/2507.03646
WAKE: Watermarking Audio with Key Enrichment
Yaoxun Xu, Jianwei Yu, Hangting Chen, Zhiyong Wu, Xixin Wu, Dong Yu, Rongzhi Gu, Yi Luo
https://arxiv.org/abs/2506.05891
Each week, Metacurity offers our free and paid subscribers a rundown of the top infosec-related long reads.
Don't miss this week's selection, which includes
--How the Huione Group launders billions in scams and crypto heists,
--Fears of China spying on the UK financial system,
--How stolen iPhones travel around,
--Cyber played only an incremental role in the Israel-Iran conflict,
--CISA 2015 must be reauthorized,
--Watermarks to weed out deepfa…
Optimization-Free Universal Watermark Forgery with Regenerative Diffusion Models
Chaoyi Zhu, Zaitang Li, Renyi Yang, Robert Birke, Pin-Yu Chen, Tsung-Yi Ho, Lydia Y. Chen
https://arxiv.org/abs/2506.06018
StealthInk: A Multi-bit and Stealthy Watermark for Large Language Models
Ya Jiang, Chuxiong Wu, Massieh Kordi Boroujeny, Brian Mark, Kai Zeng
https://arxiv.org/abs/2506.05502
Disappearing Ink: Obfuscation Breaks N-gram Code Watermarks in Theory and Practice
Gehao Zhang, Eugene Bagdasarian, Juan Zhai, Shiqing Ma
https://arxiv.org/abs/2507.05512
README: Robust Error-Aware Digital Signature Framework via Deep Watermarking Model
Hyunwook Choi, Sangyun Won, Daeyeon Hwang, Junhyeok Choi
https://arxiv.org/abs/2507.04495