SPY-WATERMARK: ROBUST INVISIBLE WATERMARKING FOR BACKDOOR ATTACK

被引:0
作者
Wang, Ruofei [1 ]
Wan, Renjie [2 ]
Guo, Zongyu [1 ]
Guo, Qing [3 ,4 ]
Huang, Rui [1 ]
机构
[1] Civil Aviat Univ China, Coll Comp Sci & Technol, Tianjin, Peoples R China
[2] Hong Kong Baptist Univ, Dept Comp Sci, Hong Kong, Peoples R China
[3] IHPC, Agcy Sci Res & Technol, Singapore, Singapore
[4] CFAR, Agcy Sci Res & Technol, Singapore, Singapore
来源
2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024 | 2024年
关键词
Backdoor attack; backdoor defense; invisible watermarking; robust trigger; trigger extraction;
D O I
10.1109/ICASSP48485.2024.10448363
中图分类号
学科分类号
摘要
Backdoor attack aims to deceive a victim model when facing backdoor instances while maintaining its performance on benign data. Current methods use manual patterns or special perturbations as triggers, while they often overlook the robustness against data corruption, making backdoor attacks easy to defend in practice. To address this issue, we propose a novel backdoor attack method named Spy-Watermark, which remains effective when facing data collapse and back-door defense. Therein, we introduce a learnable watermark embedded in the latent domain of images, serving as the trigger. Then, we search for a watermark that can withstand collapse during image decoding, cooperating with several anti-collapse operations to further enhance the resilience of our trigger against data corruption. Extensive experiments are conducted on CIFAR10, GTSRB, and ImageNet datasets, demonstrating that Spy-Watermark overtakes ten state-of-the-art methods in terms of robustness and stealthiness.
引用
收藏
页码:2700 / 2704
页数:5
相关论文
共 23 条
  • [21] Invisible and Multi-triggers Backdoor Attack Approach on Deep Neural Networks through Frequency Domain
    Sun, Fengxue
    Pei, Bei
    Chen, Guangyong
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 707 - 711
  • [22] Clean-label backdoor attack based on robust feature attenuation for speech recognition
    Cai, Hanbo
    Zhang, Pengcheng
    Xiao, Yan
    Ji, Shunhui
    Xiao, Mingxuan
    Cheng, Letian
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 281
  • [23] Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks
    Mohanty, Saraju P.
    Bhargava, Bharat K.
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2008, 5 (02)