Customized and Robust Deep Neural Network Watermarking

被引:0
作者
Chien, Tzu-Yun [1 ]
Shen, Chih-Ya [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
来源
PROCEEDINGS OF THE 17TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, WSDM 2024 | 2024年
关键词
Deep neural network watermarking; robustness; customized watermarking;
D O I
10.1145/3616855.3635812
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the excellent performance of deep neural networks (DNNs) enhances a wide spectrum of applications, the protection of intellectual property (IP) of DNNs receives increasing attention recently, and DNN watermarking approaches are thus proposed for ownership verification to avoid potential misuses or thefts of DNN models. However, we observe that existing DNN watermark methods suffer from two major weaknesses: i) Incomplete protection to advanced watermark removal attacks, such as fine-tune attack with large learning rates, re-train after pruning, and most importantly, the distillation attack; ii) Limited customization ability, where multiple watermarked models cannot be uniquely identified, especially after removal attacks. To address these critical issues, we propose two new DNN watermarking approaches, Unified Soft-label Perturbation (USP), which provides robust watermark to detect model thefts, and Customized Soft-label Perturbation (CSP), which is able to embed a different watermark in each copy of the DNN model to enable customized watermarking. Experimental results show that our proposed USP and CSP resist all the watermark removal attacks, especially for the distillation attack, and the proposed CSP achieves very promising watermark customization ability, significantly outperforming the other state-of-the-art baselines.
引用
收藏
页码:134 / 142
页数:9
相关论文
共 27 条
  • [1] Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
  • [2] Learning to Extract Expert Teams in Social Networks
    Chang, Chih-Chieh
    Chang, Ming-Yi
    Jhang, Jhao-Yin
    Yeh, Lo-Yao
    Shen, Chih-Ya
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (05) : 1552 - 1562
  • [3] Charette L, 2022, AAAI CONF ARTIF INTE, P9512
  • [4] Fan LX, 2019, ADV NEUR IN, V32
  • [5] Frankle Jonathan, 2019, INT C MACHINE LEARNI
  • [6] MDMaaS: Medical-Assisted Diagnosis Model as a Service With Artificial Intelligence and Trust
    Guo, Kehua
    Ren, Sheng
    Bhuiyan, Md Zakirul Alam
    Li, Ting
    Liu, Dengchao
    Liang, Zhonghe
    Chen, Xiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2102 - 2114
  • [7] Han S, 2016, Arxiv, DOI [arXiv:1510.00149, DOI 10.48550/ARXIV.1510.00149]
  • [8] Hinton G., 2015, ARXIV PREPRINT ARXIV, V2
  • [9] On Minimizing Diagonal Block-Wise Differences for Neural Network Compression
    Hsu, Yun-Jui
    Chang, Yi-Ting
    Shen, Chih-Ya
    Shuai, Hong-Han
    Tseng, Wei-Lun
    Yang, Chen-Hsu
    [J]. ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 1198 - 1206
  • [10] PRADA: Protecting Against DNN Model Stealing Attacks
    Juuti, Mika
    Szyller, Sebastian
    Marchal, Samuel
    Asokan, N.
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 512 - 527