Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
RAN: A randomness-anchored watermark attacking network with stealth and effectiveness
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 09 May 2026

RAN: A randomness-anchored watermark attacking network with stealth and effectiveness

  • Fan Li1 na1,
  • Du Li2 na1,
  • Kunqi Li3 na1,
  • Yanyu Jiang4,
  • Yanlin Leng5,
  • Kai Zhou6 &
  • …
  • Yong Tang5,7 

Scientific Reports (2026) Cite this article

  • 418 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Research on watermark attacking is essential to reinforce robust watermarking methods by providing new attacking benchmarks. Recently, there is an emergence of attacking methods based on deep learning, in which perceptual loss and watermark loss are utilized to train the neural networks for the imperceptibility of watermarked images and the disruption of attacked watermarks. In this work, we propose a novel randomness-anchored attacking network (RAN) based on deep learning. In RAN, we introduce an alternative watermark loss to attack the watermarks into random noises by anchoring to randomness rather than the original watermarks. Extensive attacking experiments of comparisons with attacking schemes show that the proposed RAN models can achieve satisfying performance in preserving the visual fidelity of attacked watermarked images with competitive attacking ability. The proposed methods add new inspirations to the design of stealthy and effective attacking models based on deep learning, with significant implications for developing robust watermarking. The source code and data is shared at https://github.com/kq409/Watermark-Attack.

Similar content being viewed by others

Screen shooting resistant watermarking based on cross attention

Article Open access 16 May 2025

Robust zero-watermarking for color images using hybrid deep learning models and encryption

Article Open access 07 August 2025

Convolutional neural network and wavelet composite against geometric attacks a watermarking approach

Article Open access 26 August 2025

Funding

This work was supported by the Key Research and Development Project of Science & Technology Department of Sichuan Province (2024YFFK0119, 2024YFFK0122).

Author information

Author notes
  1. These authors contributed equally to this work: Fan Li, Du Li and Kunqi Li.

Authors and Affiliations

  1. College of Artificial Intelligence, Chengdu University of Information Technology, Chengdu, 610225, China

    Fan Li

  2. Sichuan Research Center of Public Security, Chengdu, 610000, China

    Du Li

  3. Department of Electrical and Computer Engineering, State University of New York at Stony Brook, Stony Brook, 11794, USA

    Kunqi Li

  4. Institute of Health Informatics, University College London, London, WC1H 0AX, UK

    Yanyu Jiang

  5. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, China

    Yanlin Leng & Yong Tang

  6. Department of Public Security, Deyang, 618000, China

    Kai Zhou

  7. International Research Center for Complexity Sciences, Hangzhou International Innovation Institute, Beihang University, 311115, China

    Yong Tang

Authors
  1. Fan Li
    View author publications

    Search author on:PubMed Google Scholar

  2. Du Li
    View author publications

    Search author on:PubMed Google Scholar

  3. Kunqi Li
    View author publications

    Search author on:PubMed Google Scholar

  4. Yanyu Jiang
    View author publications

    Search author on:PubMed Google Scholar

  5. Yanlin Leng
    View author publications

    Search author on:PubMed Google Scholar

  6. Kai Zhou
    View author publications

    Search author on:PubMed Google Scholar

  7. Yong Tang
    View author publications

    Search author on:PubMed Google Scholar

Corresponding author

Correspondence to Yong Tang.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, F., Li, D., Li, K. et al. RAN: A randomness-anchored watermark attacking network with stealth and effectiveness. Sci Rep (2026). https://doi.org/10.1038/s41598-026-52298-w

Download citation

  • Received: 12 February 2026

  • Accepted: 04 May 2026

  • Published: 09 May 2026

  • DOI: https://doi.org/10.1038/s41598-026-52298-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Watermark attacking
  • Imperceptibility
  • Randomness
Download PDF

Associated content

Collection

AI-driven threat detection and response

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics