A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection

被引:20
作者
Zheng, Yue [1 ]
Wang, Si [1 ]
Chang, Chip-Hong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Feature extraction; Watermarking; Training; Data models; Convolution; Computational modeling; Predictive models; DNN IP protection; fingerprinting; random projection; cross application; ownership; DEVICE HASH;
D O I
10.1109/TIFS.2022.3198267
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A high-performance Deep Neural Network (DNN) model is a valuable intellectual property (IP) since designing and training such a model from scratch is very costly. Model transfer learning, compression and retraining are commonly used by pirates to evade detection or even redeploy the pirated models for new applications without compromising performance. This paper presents a novel non-intrusive DNN IP fingerprinting method that can detect pirated models and provide a non-repudiable and irrevocable ownership proof simultaneously. The fingerprint is derived from projecting a subset of front-layer weights onto a model owner identity defined random space to enable a distinguisher to differentiate pirated models that are used in the same application or retrained for a different task from originally designed DNN models. The proposed method generates compact and irrevocable fingerprints against model IP misappropriation and ownership fraud. It requires no retraining and makes no modification to the original model. The proposed fingerprinting method is evaluated on nine original DNN models trained on CIFAR-10, CIFAR-100, and ImageNet-10. It is demonstrated to have the highest discriminative power among existing fingerprinting methods in detecting pirated models deployed for the same and different applications, and fraudulent model IP ownership claims.
引用
收藏
页码:2977 / 2989
页数:13
相关论文
共 26 条
[1]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]  
Baraniuk R., 2006, PREPRINT
[3]  
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[4]   IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary [J].
Cao, Xiaoyu ;
Jia, Jinyuan ;
Gong, Neil Zhenqiang .
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :14-25
[5]   DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks [J].
Chen, Huili ;
Fu, Cheng ;
Rouhani, Bita Darvish ;
Zhao, Jishen ;
Koushanfar, Farinaz .
PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, :487-498
[6]   An elementary proof of a theorem of Johnson and Lindenstrauss [J].
Dasgupta, S ;
Gupta, A .
RANDOM STRUCTURES & ALGORITHMS, 2003, 22 (01) :60-65
[7]  
DeVries T, 2017, Arxiv, DOI [arXiv:1708.04552, DOI 10.48550/ARXIV.1708.04552]
[8]  
Gongye C., 2020, Design Automation Conference, P1
[9]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[10]   Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks [J].
Hua, Weizhe ;
Zhang, Zhiru ;
Suh, G. Edward .
2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,