A Systematic Review on Model Watermarking for Neural Networks

被引:19
作者
Boenisch, Franziska [1 ,2 ]
机构
[1] Fraunhofer AISEC, Berlin, Germany
[2] Freie Univ, Berlin, Germany
来源
FRONTIERS IN BIG DATA | 2021年 / 4卷
关键词
neural networks; intellectual property protection; watermarking; machine learning; model stealing;
D O I
10.3389/fdata.2021.729663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) models are applied in an increasing variety of domains. The availability of large amounts of data and computational resources encourages the development of ever more complex and valuable models. These models are considered the intellectual property of the legitimate parties who have trained them, which makes their protection against stealing, illegitimate redistribution, and unauthorized application an urgent need. Digital watermarking presents a strong mechanism for marking model ownership and, thereby, offers protection against those threats. This work presents a taxonomy identifying and analyzing different classes of watermarking schemes for ML models. It introduces a unified threat model to allow structured reasoning on and comparison of the effectiveness of watermarking methods in different scenarios. Furthermore, it systematizes desired security requirements and attacks against ML model watermarking. Based on that framework, representative literature from the field is surveyed to illustrate the taxonomy. Finally, shortcomings and general limitations of existing approaches are discussed, and an outlook on future research directions is given.
引用
收藏
页数:16
相关论文
共 61 条
  • [1] Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
  • [2] Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
    Aiken, William
    Kim, Hyoungshick
    Woo, Simon
    Ryoo, Jungwoo
    [J]. COMPUTERS & SECURITY, 2021, 106
  • [3] [Anonymous], 2013, ARXIV13064447
  • [4] Pruning algorithms of neural networks - a comparative study
    Augasta, M. Gethsiyal
    Kathirvalavakumar, T.
    [J]. OPEN COMPUTER SCIENCE, 2013, 3 (03) : 105 - 115
  • [5] Batina S., 2018, IACR CRYPTOL EPRINT, V2018, P477
  • [6] Behzadan V, 2019, ARXIV190601126, P1
  • [7] Carlini Nicholas, 2020, Advances in Cryptology - CRYPTO 2020. 40th Annual International Cryptology Conference, CRYPTO 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12172), P189, DOI 10.1007/978-3-030-56877-1_7
  • [8] Chan C.S., 2021, P IEEECVF C COMPUTER, P3630
  • [9] Chan C.S., 2020, ARXIV PREPRINT ARXIV
  • [10] Chen H., ARXIV PREPRINT ARXIV