Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection

被引:1
作者
Wang, Jinwei [1 ]
Wang, Haihua [2 ]
Zhang, Jiawei [2 ]
Wu, Hao [2 ]
Luo, Xiangyang [3 ]
Ma, Bin [4 ]
机构
[1] School of Computer and Software, Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing
[2] School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing
[3] State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou
[4] Qilu University of Technology, Jinan
基金
中国国家自然科学基金;
关键词
Adversarial examples; copyright protection; invisible watermarking;
D O I
10.1145/3652608
中图分类号
学科分类号
摘要
Invisible watermarking can be used as an important tool for copyright certification in the Metaverse. However, with the advent of deep learning, Deep Neural Networks (DNNs) have posed new threats to this technique. For example, artificially trained DNNs can perform unauthorized content analysis and achieve illegal access to protected images. Furthermore, some specially crafted DNNs may even erase invisible watermarks embedded within the protected images, which eventually leads to the collapse of this protection and certification mechanism. To address these issues, inspired by the adversarial attack, we introduce Invisible Adversarial Watermarking (IAW), a novel security mechanism to enhance the copyright protection efficacy of watermarks. Specifically, we design an Adversarial Watermarking Fusion Model (AWFM) to efficiently generate Invisible Adversarial Watermark Images (IAWIs). By modeling the embedding of watermarks and adversarial perturbations as a unified task, the generated IAWIs can effectively defend against unauthorized identification, access, and erase via DNNs and identify the ownership by extracting the embedded watermark. Experimental results show that the proposed IAW presents superior extraction accuracy, attack ability, and robustness on different DNNs, and the protected images maintain good visual quality, which ensures its effectiveness as an image protection mechanism. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM.
引用
收藏
相关论文
共 50 条
  • [21] Wavelet tree quantization for copyright protection watermarking
    Wang, SH
    Lin, YP
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (02) : 154 - 165
  • [22] A new asymmetric watermarking scheme for copyright protection
    Gui, GF
    Jiang, LG
    He, C
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (02) : 611 - 614
  • [23] Multipurpose Digital Watermarking for Copyright Notification and Protection
    Wu, Dan
    Wang, Guozhao
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 68 - +
  • [24] Copyright Protection Using A Computational Watermarking Scheme
    Jiang, Qi
    Han, Dongfeng
    Li, Yi
    Li, Wenhui
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2050 - 2054
  • [25] Watermarking chinese text documents for copyright protection
    Zhou, Xinmin
    Tan, Lina
    Pan, Li
    Information Technology Journal, 2013, 12 (19) : 4946 - 4952
  • [26] A novel digital image watermarking scheme on copyright protection based on network manufacture environment
    Liu Quan
    Wang Jin
    1ST INTERNATIONAL SYMPOSIUM ON DIGITAL MANUFACTURE, VOLS 1-3, 2006, : 552 - 556
  • [27] A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment
    LIU Quan WANG Jin School of Information EngineeringWuhan University of TechnologyWuhan China
    武汉理工大学学报, 2006, (S2) : 552 - 556
  • [28] Watermarking-based copyright protection of sequential functions
    Torunoglu, I
    Charbon, E
    IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2000, 35 (03) : 434 - 440
  • [29] Metadata-based image watermarking for copyright protection
    Huang, Hsiang-Cheh
    Fang, Wai-Chi
    SIMULATION MODELLING PRACTICE AND THEORY, 2010, 18 (04) : 436 - 445
  • [30] Biological Infectious Watermarking Model for Video Copyright Protection
    Jang, Bong-Joo
    Lee, Suk-Hwan
    Lim, Sang Hun
    Kwon, Ki-Ryong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2015, 11 (02): : 280 - 294