Structural Watermarking to Deep Neural Networks via Network Channel Pruning

被引:11
作者
Zhao, Xiangyu [1 ]
Yao, Yinzhe [1 ]
Wu, Hanzhou [1 ]
Zhang, Xinpeng [1 ]
机构
[1] Shanghai Univ, Shanghai 200444, Peoples R China
来源
2021 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) | 2021年
基金
中国国家自然科学基金;
关键词
Watermarking; deep neural networks; ownership protection; deep learning; security;
D O I
10.1109/WIFS53200.2021.9648376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect the intellectual property (IP) of deep neural networks (DNNs), many existing DNN watermarking techniques either embed watermarks directly into the DNN parameters or insert backdoor watermarks by fine-tuning the DNN parameters, which, however, cannot resist against various attack methods that remove watermarks by altering DNN parameters. In this paper, we bypass such attacks by introducing a structural watermarking scheme that utilizes channel pruning to embed the watermark into the host DNN architecture instead of crafting the DNN parameters. To be specific, during watermark embedding, we prune the internal channels of the host DNN with the channel pruning rates controlled by the watermark. During watermark extraction, the watermark is retrieved by identifying the channel pruning rates from the architecture of the target DNN model. Due to the superiority of pruning mechanism, the performance of the DNN model on its original task is reserved during watermark embedding. Experimental results have shown that, the proposed work enables the embedded watermark to be reliably recovered and provides a sufficient payload, without sacrificing the usability of the DNN model. It is also demonstrated that the proposed work is robust against common transforms and attacks designed for conventional watermarking approaches.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 30 条
  • [1] Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
  • [2] Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) : 1423 - 1443
  • [3] DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models
    Chen, Huili
    Rouhani, Bita Darvish
    Fu, Cheng
    Zhao, Jishen
    Koushanfar, Farinaz
    [J]. ICMR'19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, 2019, : 105 - 113
  • [4] Chen X., 2021, P 2021 ACM AS C COMP, P321
  • [5] Chen X., 2019, ICML WORKSH SEC PRIV
  • [6] Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks
    Cortinas-Lorenzo, Betty
    Perez-Gonzalez, Fernando
    [J]. ENTROPY, 2020, 22 (12) : 1 - 39
  • [7] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
  • [8] Fan L., 2019, ARXIV PREPRINT ARXIV
  • [9] Guo S., 2020, ARXIV PREPRINT ARXIV
  • [10] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778