Copyright protection of deep neural network models using digital watermarking: a comparative study

被引:21
作者
Fkirin, Alaa [1 ]
Attiya, Gamal [2 ]
El-Sayed, Ayman [2 ]
Shouman, Marwa A. [2 ]
机构
[1] Fayoum Univ, Fac Engn, Dept Elect Engn, Al Fayyum, Egypt
[2] Menoufia Univ, Fac Elect Engn, Comp Sci & Engn Dept, Menoufia Govemorate, Menouf, Egypt
关键词
DNN; Black-box; White-box; Deep learning; Copyright protection; Digital watermarking; IMAGE; SCHEME; DCT; SVD;
D O I
10.1007/s11042-022-12566-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, deep learning achieves higher levels of accuracy than ever before. This evolution makes deep learning crucial for applications that care for safety, like self-driving cars and helps consumers to meet most of their expectations. Further, Deep Neural Networks (DNNs) are powerful approaches that employed to solve several issues. These issues include healthcare, advertising, marketing, computer vision, speech processing, natural language processing. The DNNs have marvelous progress in these different fields, but training such DNN models requires a lot of time, a vast amount of data and in most cases a lot of computational steps. Selling such pre-trained models is a profitable business model. But, sharing them without the owner permission is a serious threat. Unfortunately, once the models are sold, they can be easily copied and redistributed. This paper first presents a review of how digital watermarking technologies are really very helpful in the copyright protection of the DNNs. Then, a comparative study between the latest techniques is presented. Also, several optimizers are proposed to improve the accuracy against the fine-tuning attack. Finally, several experiments are performed with black-box settings using several optimizers and the results are compared with the SGD optimizer.
引用
收藏
页码:15961 / 15975
页数:15
相关论文
共 65 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[3]  
AL-Mansoori S, 2012, INT J COMPUT SCI NET, V12, P1
[4]   A robust image watermarking technique using SVD and differential evolution in DCT domain [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
OPTIK, 2014, 125 (01) :428-434
[5]  
[Anonymous], 2015, P BRIT MACH VIS C 20, DOI DOI 10.5244/C.29.31
[6]  
Bordes A., 2014, P 2014 C EMP METH NA, P615
[7]   Online particle detection with Neural Networks based on topological calorimetry information [J].
Ciodaro, T. ;
Deva, D. ;
de Seixas, J. M. ;
Damazio, D. .
14TH INTERNATIONAL WORKSHOP ON ADVANCED COMPUTING AND ANALYSIS TECHNIQUES IN PHYSICS RESEARCH (ACAT 2011), 2012, 368
[8]  
Collobert R, 2011, J MACH LEARN RES, V12, P2493
[9]  
Deeba Farah, 2020, International Journal of Machine Learning and Computing, P277, DOI 10.18178/ijmlc.2020.10.2.932
[10]  
Fkirin A., 2016, COMMUN APPL ELECT, V5, P13, DOI [10.5120/cae2016652384, DOI 10.5120/CAE2016652384]