KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models

被引:15
作者
Jebreel, Najeeb Moharram [1 ]
Domingo-Ferrer, Josep [1 ]
Sanchez, David [1 ]
Blanco-Justicia, Alberto [1 ]
机构
[1] Univ Rovira & Virgili, CYBERCAT Ctr Cybersecur Res Catalonia, Dept Comp Engn & Math, UNESCO Chair Data Privacy, Av Paisos Catalans 26, Tarragona 43007, Catalonia, Spain
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 03期
基金
欧盟地平线“2020”;
关键词
deep learning models; ownership; intellectual property; watermarking; security and privacy; private model;
D O I
10.3390/app11030999
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Many organizations devote significant resources to building high-fidelity deep learning (DL) models. Therefore, they have a great interest in making sure the models they have trained are not appropriated by others. Embedding watermarks (WMs) in DL models is a useful means to protect the intellectual property (IP) of their owners. In this paper, we propose KeyNet, a novel watermarking framework that satisfies the main requirements for an effective and robust watermarking. In KeyNet, any sample in a WM carrier set can take more than one label based on where the owner signs it. The signature is the hashed value of the owner's information and her model. We leverage multi-task learning (MTL) to learn the original classification task and the watermarking task together. Another model (called the private model) is added to the original one, so that it acts as a private key. The two models are trained together to embed the WM while preserving the accuracy of the original task. To extract a WM from a marked model, we pass the predictions of the marked model on a signed sample to the private model. Then, the private model can provide the position of the signature. We perform an extensive evaluation of KeyNet's performance on the CIFAR10 and FMNIST5 data sets and prove its effectiveness and robustness. Empirical results show that KeyNet preserves the utility of the original task and embeds a robust WM.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 48 条
  • [1] Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
  • [2] Adiwardana D, 2020, Towards a Human-like Open-Domain Chatbot
  • [3] Aiken William, 2020, ARXIV200411368
  • [4] Boenisch F., 2020, ARXIV200912153
  • [5] Cao X., 2019, ARXIV191012903
  • [6] Multitask learning
    Caruana, R
    [J]. MACHINE LEARNING, 1997, 28 (01) : 41 - 75
  • [7] DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models
    Chen, Huili
    Rouhani, Bita Darvish
    Fu, Cheng
    Zhao, Jishen
    Koushanfar, Farinaz
    [J]. ICMR'19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, 2019, : 105 - 113
  • [8] Coates A, 2011, P AISTATS 2011 FORT
  • [9] A Survey of Deep Learning and Its Applications: A New Paradigm to Machine Learning
    Dargan, Shaveta
    Kumar, Munish
    Ayyagari, Maruthi Rohit
    Kumar, Gulshan
    [J]. ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2020, 27 (04) : 1071 - 1092
  • [10] Deng L., 2014, Foundations and Trends in Signal Processing, V7, P197, DOI [DOI 10.1561/2000000039, 10.1561/]