Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks

被引:27
作者
Cortinas-Lorenzo, Betty [1 ]
Perez-Gonzalez, Fernando [1 ]
机构
[1] Univ Vigo, Atlanttic Res Ctr, Vigo 36310, Spain
关键词
watermarking; deep neural networks; optimization algorithms; Adam; stochastic gradient descent; detectability; INFORMATION;
D O I
10.3390/e22121379
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
As training Deep Neural Networks (DNNs) becomes more expensive, the interest in protecting the ownership of the models with watermarking techniques increases. Uchida et al. proposed a digital watermarking algorithm that embeds the secret message into the model coefficients. However, despite its appeal, in this paper, we show that its efficacy can be compromised by the optimization algorithm being used. In particular, we found through a theoretical analysis that, as opposed to Stochastic Gradient Descent (SGD), the update direction given by Adam optimization strongly depends on the sign of a combination of columns of the projection matrix used for watermarking. Consequently, as observed in the empirical results, this makes the coefficients move in unison giving rise to heavily spiked weight distributions that can be easily detected by adversaries. As a way to solve this problem, we propose a new method called Block-Orthonormal Projections (BOP) that allows one to combine watermarking with Adam optimization with a minor impact on the detectability of the watermark and an increased robustness.
引用
收藏
页码:1 / 39
页数:36
相关论文
共 30 条
[1]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]  
[Anonymous], 2015, IEEE I CONF COMP VIS, DOI DOI 10.1109/ICCV.2015.123
[3]  
[Anonymous], 1998, Online Algorithms and Stochastic Approximations
[4]  
[Anonymous], 1992, Statistical science
[5]  
Balles L., 2018, P 2018 INT C MACH LE
[6]   The Source Identification Game: An Information-Theoretic Perspective [J].
Barni, Mauro ;
Tondi, Benedetta .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :450-463
[7]  
Burden R. L., 2015, Cengage learning
[8]  
Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
[9]  
Comesaña P, 2012, IEEE INT WORKS INFOR, P211, DOI 10.1109/WIFS.2012.6412651
[10]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687