Adversarial watermark: A robust and reliable watermark against removal

被引:0
作者
Wang, Jinwei [1 ]
Huang, Wanyun [1 ]
Zhang, Jiawei [1 ]
Luo, Xiangyang [2 ]
Ma, Bin [3 ,4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp & Software, Minist Educ, Nanjing 210044, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhenzhou 450001, Peoples R China
[3] Shandong Prov Key Lab Comp Networks, Jinan 250353, Peoples R China
[4] Qilu Univ Technol, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
Adversarial watermarks; Watermark removal; Adversarial attack; Copyright protection;
D O I
10.1016/j.jisa.2024.103750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital image watermarking used to be an important tool for copyright protection. However, as neural network -based watermark removal methods have been proposed in recent years, the embedded watermark is increasingly easy to be erased, which poses a great threat to copyright protection. To address this issue, we propose an adversarial visible watermark scheme, which combines the visible watermark with the adversarial perturbation. By attacking the watermark removal network, we maximize the resistance of visible watermark against removal while minimizing the visual distortion. To further improve the robustness against various transformations (e.g. cropping, JPEG compression), we employ the region of interest and random pre-processing to embed the adversarial visible watermark. The experimental results show that the proposed scheme can effectively resist the removal of watermarks on different datasets and network structures while having good transferability and robustness, which enables the watermark to continue to be an effective copyright protection method.
引用
收藏
页数:10
相关论文
共 35 条
  • [1] Visible watermarking based on importance and just noticeable distortion of image regions
    Agarwal, Himanshu
    Sen, Debashis
    Raman, Balasubramanian
    Kankanhalli, Mohan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (13) : 7605 - 7629
  • [2] Almohammad A., 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), P215, DOI 10.1109/IPTA.2010.5586786
  • [3] Bochkovskiy A, 2020, Arxiv, DOI [arXiv:2004.10934, 10.48550/arXiv.2004.10934]
  • [4] Generative adversarial networks model for visible watermark removal
    Cao, Zhiyi
    Niu, Shaozhang
    Zhang, Jiwei
    Wang, Xinyi
    [J]. IET IMAGE PROCESSING, 2019, 13 (10) : 1783 - 1789
  • [5] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [6] Grad-CAM plus plus : Generalized Gradient-based Visual Explanations for Deep Convolutional Networks
    Chattopadhay, Aditya
    Sarkar, Anirban
    Howlader, Prantik
    Balasubramanian, Vineeth N.
    [J]. 2018 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2018), 2018, : 839 - 847
  • [7] Research on Region Selection Strategy for Visible Watermark Embedding
    Cui, Zhongjie
    Qi, Wenfa
    Liu, Yuxin
    Guo, Jia
    [J]. IETE TECHNICAL REVIEW, 2021, 38 (01) : 5 - 16
  • [8] Cun XD, 2021, AAAI CONF ARTIF INTE, V35, P1184
  • [9] On the Effectiveness of Visible Watermarks
    Dekel, Tali
    Rubinstein, Michael
    Liu, Ce
    Freeman, William T.
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 6864 - 6872
  • [10] Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
    Dong, Yinpeng
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4307 - 4316