Dynamic Black-Box Model Watermarking for Heterogeneous Federated Learning

被引:2
作者
Liao, Yuying [1 ]
Jiang, Rong [1 ]
Zhou, Bin [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp Sci & Technol, Changsha 410073, Peoples R China
基金
中国国家自然科学基金;
关键词
federated learning; ownership demonstration; watermarking; deep learning;
D O I
10.3390/electronics13214306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heterogeneous federated learning, as an innovative variant of federated learning, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity in mobile computing scenarios. It introduces heterogeneous and personalized local models, which effectively accommodates the heterogeneous data distributions and hardware resource constraints of individual clients, and thus improves computation and communication efficiency. However, it poses a challenge to model ownership protection, as watermarks embedded in the global model are corrupted to varying degrees when they are migrated to a user's heterogeneous model and cannot continue to provide complete ownership protection in the local models. To tackle these issues, we propose a dynamic black-box model watermarking method for heterogeneous federated learning, PWFed. Specifically, we design an innovative dynamic watermark generation method which is based on generative adversarial network technology and is capable of generating watermark samples that are virtually indistinguishable from the original carriers. This approach effectively solves the limitation of the traditional black-box watermarking technique, which only considers static watermarks, and makes the generated watermarks significantly improved in terms of stealthiness and difficult to detect by potential model thieves, thus enhancing the robustness of the watermarks. In addition, we design two watermark embedding strategies with different granularities in the heterogeneous federated learning environment. During the watermark extraction and validation phase, PWFed accesses watermark samples claiming ownership of the model through an API interface and analyzes the differences between their output and the expected labels. Our experimental results show that PWFed achieves a 99.9% watermark verification rate with only a 0.1-4.8% sacrifice of main task accuracy on the CIFAR10 dataset.
引用
收藏
页数:18
相关论文
共 52 条
[1]   Aspect Category Detection of Mobile Edge Customer Reviews: A Distributed and Trustworthy Restaurant Recommendation System [J].
Abbas, Sidra ;
Boulila, Wadii ;
Driss, Maha ;
Victor, Nancy ;
Sampedro, Gabriel Avelino ;
Abisado, Mideth ;
Gadekallu, Thippa Reddy .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) :2170-2177
[2]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[3]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[4]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[5]  
Chen B., 2019, CEUR WORKSHOP P, V2301
[6]   SPEECH PATTERN BASED BLACK-BOX MODEL WATERMARKING FOR AUTOMATIC SPEECH RECOGNITION [J].
Chen, Haozhe ;
Zhang, Weiming ;
Liu, Kunlin ;
Chen, Kejiang ;
Fang, Han ;
Yu, Nenghai .
2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, :3059-3063
[7]   SpecMark: A Spectral Watermarking Framework for IP Protection of Speech Recognition Systems [J].
Chen, Huili ;
Darvish, Bita ;
Koushanfar, Farinaz .
INTERSPEECH 2020, 2020, :2312-2316
[8]   FedRight: An effective model copyright protection for federated learning [J].
Chen, Jinyin ;
Li, Mingjun ;
Cheng, Yao ;
Zheng, Haibin .
COMPUTERS & SECURITY, 2023, 135
[9]   Universal adversarial backdoor attacks to fool vertical federated learning [J].
Chen, Peng ;
Du, Xin ;
Lu, Zhihui ;
Chai, Hongfeng .
COMPUTERS & SECURITY, 2024, 137
[10]  
Deng L., 2012, IEEE Signal Processing Magazine, V29, P141, DOI [10.1109/MSP.2012.2211477, DOI 10.1109/MSP.2012.2211477]