A Systematic Review on Model Watermarking for Neural Networks

被引:32
作者
Boenisch, Franziska [1 ,2 ]
机构
[1] Fraunhofer AISEC, Berlin, Germany
[2] Freie Univ, Berlin, Germany
来源
FRONTIERS IN BIG DATA | 2021年 / 4卷
关键词
neural networks; intellectual property protection; watermarking; machine learning; model stealing;
D O I
10.3389/fdata.2021.729663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) models are applied in an increasing variety of domains. The availability of large amounts of data and computational resources encourages the development of ever more complex and valuable models. These models are considered the intellectual property of the legitimate parties who have trained them, which makes their protection against stealing, illegitimate redistribution, and unauthorized application an urgent need. Digital watermarking presents a strong mechanism for marking model ownership and, thereby, offers protection against those threats. This work presents a taxonomy identifying and analyzing different classes of watermarking schemes for ML models. It introduces a unified threat model to allow structured reasoning on and comparison of the effectiveness of watermarking methods in different scenarios. Furthermore, it systematizes desired security requirements and attacks against ML model watermarking. Based on that framework, representative literature from the field is surveyed to illustrate the taxonomy. Finally, shortcomings and general limitations of existing approaches are discussed, and an outlook on future research directions is given.
引用
收藏
页数:16
相关论文
共 61 条
[1]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]   Neural network laundering: Removing black-box backdoor watermarks from deep neural networks [J].
Aiken, William ;
Kim, Hyoungshick ;
Woo, Simon ;
Ryoo, Jungwoo .
COMPUTERS & SECURITY, 2021, 106
[3]  
[Anonymous], 2018, A survey on methods and theories of quantized neural networks
[4]  
[Anonymous], 2013, ARXIV13064447
[5]  
[Anonymous], 2007, AISTATS
[6]   Pruning algorithms of neural networks - a comparative study [J].
Augasta, M. Gethsiyal ;
Kathirvalavakumar, T. .
OPEN COMPUTER SCIENCE, 2013, 3 (03) :105-115
[7]  
Batina S., 2018, IACR CRYPTOL EPRINT, V2018, P477
[8]  
Behzadan V, 2019, ARXIV PREPRINT ARXIV, P1
[9]   Cryptanalytic Extraction of Neural Network Models [J].
Carlini, Nicholas ;
Jagielski, Matthew ;
Mironov, Ilya .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III, 2020, 12172 :189-218
[10]  
Chan C.S., 2021, P IEEECVF C COMPUTER, P3630