Robust Watermarking for Neural Network Models Using Residual Network

被引:1
作者
Wang, Lecong [1 ]
Wang, Zichi [2 ]
Li, Xinran [1 ]
Qin, Chuan [1 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
来源
2022 IEEE 24TH INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP) | 2022年
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Digital watermarking; robustness; neural networks; residual block;
D O I
10.1109/MMSP55362.2022.9949601
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The training process of a neural network model requires plenty of costs, and so the intellectual property of neural network models should be protected. To this end, we propose a robust watermarking scheme for neural network models in this paper. In our scheme, an independent network is specially designed to help embedding watermarks into a given host network, and also be used for watermark extraction. The independent network is designed based on the residual structure which is sensitive to the parameter changes of the host network and conducive to finding suitable embedding locations. In addition, some residual blocks are randomly discarded during watermark embedding, which can increase the robustness against popular model attacks. Experimental results show that our scheme achieves satisfactory watermark verification performance without decreasing the original performance of the host network, even if the host network has been maliciously tampered.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Customized and Robust Deep Neural Network Watermarking
    Chien, Tzu-Yun
    Shen, Chih-Ya
    PROCEEDINGS OF THE 17TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, WSDM 2024, 2024, : 134 - 142
  • [2] A robust image watermarking scheme using Arnold transform and BP neural network
    Sun, Lin
    Xu, Jiucheng
    Liu, Shangwang
    Zhang, Shiguang
    Li, Yuan
    Shen, Chang'an
    NEURAL COMPUTING & APPLICATIONS, 2018, 30 (08) : 2425 - 2440
  • [3] A robust adaptive control using neural network
    Mekki, Hassen
    Chtourou, Mohamed
    Derbel, Nabil
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2007, 2 (01) : 58 - 65
  • [4] A robust approach of watermarking in contourlet domain based on probabilistic neural network
    Liu, Jia-Xing
    Wen, Xian-Bin
    Yuan, Li-Ming
    Xu, Hai-Xia
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) : 24009 - 24026
  • [5] A robust approach of watermarking in contourlet domain based on probabilistic neural network
    Jia-Xing Liu
    Xian-bin Wen
    Li-Ming Yuan
    Hai-Xia Xu
    Multimedia Tools and Applications, 2017, 76 : 24009 - 24026
  • [6] Copyright protection of deep neural network models using digital watermarking: a comparative study
    Fkirin, Alaa
    Attiya, Gamal
    El-Sayed, Ayman
    Shouman, Marwa A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (11) : 15961 - 15975
  • [7] Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency
    Yadollahi, Mohammad Mehdi
    Shoeleh, Farzaneh
    Dadkhah, Sajjad
    Ghorbani, Ali A.
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 574 - 581
  • [8] A Generalized Deep Neural Network Approach for Digital Watermarking Analysis
    Ding, Weiping
    Ming, Yurui
    Cao, Zehong
    Lin, Chin-Teng
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (03): : 613 - 627
  • [9] Copyright protection of deep neural network models using digital watermarking: a comparative study
    Alaa Fkirin
    Gamal Attiya
    Ayman El-Sayed
    Marwa A. Shouman
    Multimedia Tools and Applications, 2022, 81 : 15961 - 15975
  • [10] SoK: How Robust is Image Classification Deep Neural Network Watermarking?
    Lukas, Nils
    Jiang, Edward
    Li, Xinda
    Kerschbaum, Florian
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 787 - 804