Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection

被引:4
作者
Wang, Jinwei [1 ]
Wang, Haihua [2 ]
Zhang, Jiawei [2 ]
Wu, Hao [2 ]
Luo, Xiangyang [3 ]
Ma, Bin [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp & Software, Minist Educ,Ctr Digital Forens, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[3] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[4] Qilu Univ Technol, Jinan 250323, Peoples R China
基金
中国国家自然科学基金;
关键词
Adversarial examples; invisible watermarking; copyright protection; IMAGE;
D O I
10.1145/3652608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Invisible watermarking can be used as an important tool for copyright certification in the Metaverse. However, with the advent of deep learning, Deep Neural Networks (DNNs) have posed new threats to this technique. For example, artificially trained DNNs can perform unauthorized content analysis and achieve illegal access to protected images. Furthermore, some specially crafted DNNs may even erase invisible watermarks embedded within the protected images, which eventually leads to the collapse of this protection and certification mechanism. To address these issues, inspired by the adversarial attack, we introduce Invisible Adversarial Watermarking (IAW), a novel security mechanism to enhance the copyright protection efficacy of watermarks. Specifically, we design an Adversarial Watermarking Fusion Model (AWFM) to efficiently generate Invisible Adversarial Watermark Images (IAWIs). By modeling the embedding of watermarks and adversarial perturbations as a unified task, the generated IAWIs can effectively defend against unauthorized identification, access, and erase via DNNs and identify the ownership by extracting the embedded watermark. Experimental results show that the proposed IAW presents superior extraction accuracy, attack ability, and robustness on different DNNs, and the protected images maintain good visual quality, which ensures its effectiveness as an image protection mechanism.
引用
收藏
页数:22
相关论文
共 50 条
[31]   A New Audio Watermarking for Copyright Protection and Content Authentication [J].
Chen, Yonghong ;
Chen, Jiancong .
PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, :1424-1428
[32]   A Survey on Robust Video Watermarking Algorithms for Copyright Protection [J].
Yu, Xiaoyan ;
Wang, Chengyou ;
Zhou, Xiao .
APPLIED SCIENCES-BASEL, 2018, 8 (10) :1891
[33]   Copyright protection of database system based on digital watermarking [J].
Sheng, Gang ;
Cui, Xinchun .
ADVANCING SCIENCE THROUGH COMPUTATION, 2008, :325-328
[34]   An adaptive digital image watermarking technique for copyright protection [J].
Lee, CH ;
Lee, YK .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (04) :1005-1015
[35]   Statistical analysis of watermarking schemes for copyright protection of images [J].
Hernández, JR ;
Pérez-González, F .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1142-1166
[36]   Secure and robust audio watermarking system for copyright protection [J].
Yassine, Himeur ;
Bachir, Boudraa .
2012 24TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2012,
[37]   Watermarking Technique for Duple Copyright Protection of Digital Images [J].
Tao, Liang ;
Li, Zhenhua ;
Zuo, Kai ;
Zhang, Zhenbin ;
Sun, Tongjing .
2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 1, 2011, :117-120
[38]   Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples [J].
Li, Ming ;
Yang, Zhaoli ;
Wang, Tao ;
Zhang, Yushu ;
Wen, Wenying .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (12) :13401-13412
[39]   A MULTIPURPOSE AUDIO WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND CONTENT AUTHENTICATION [J].
Chen, Ning ;
Zhu, Jie .
2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, :221-224
[40]   Medical Image Watermarking for Copyright Protection Based on Visual Cryptography [J].
Benyoussef, Meryem ;
Mabtoul, Samira ;
El Marraki, Mohamed ;
Aboutajdine, Driss .
2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, :93-98