Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication

被引:0
作者
Mingfu Xue
Shichang Sun
Yushu Zhang
Jian Wang
Weiqiang Liu
机构
[1] Nanjing University of Aeronautics and Astronautics,College of Computer Science and Technology
[2] Nanjing University of Aeronautics and Astronautics,College of Electronic and Information Engineering
来源
Applied Intelligence | 2022年 / 52卷
关键词
Deep neural networks; Intellectual property protection; Backdoor; Users’ fingerprints authentication; Ownership verification;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, the intellectual properties (IP) protection of deep neural networks (DNN) has attracted serious concerns. A number of DNN copyright protection methods have been proposed. However, most of the existing DNN watermarking methods can only verify the ownership of the model after the piracy occurs, which cannot actively prevent the occurrence of the piracy and do not support users’ identities management, thus can not satisfy the requirements of commercial DNN copyright management. In addition, the query modification attack which was proposed recently can invalidate most of the existing backdoor-based DNN watermarking methods. In this paper, we propose an active intellectual properties protection technique for DNN models via stealthy backdoor and users’ identities authentication. For the first time, we use a set of clean images (as the watermark key samples) to embed an additional class into the DNN for ownership verification, and use the image steganography to embed users’ identity information into these watermark key images. Each user will be assigned with a unique identity image for identity authentication and authorization control. Since the backdoor instances are clean images outside the dataset, the backdoor trigger is visually imperceptible and concealed. In addition, we embed the watermark by exploiting an additional class outside the main tasks, which establishes a strong connection for watermark key samples and the corresponding label. As a result, the proposed method is concealed, robust, and can resist common attacks and query modification attack. Experimental results demonstrate that, the proposed method can obtain 100% watermark accuracy and 100% fingerprint authentication success rate on Fashion-MNIST and CIFAR-10 datasets. In addition, the proposed method is demonstrated to be robust against the model fine-tuning attack, model pruning attack, and query modification attack. Compared with three existing DNN watermarking methods, the proposed method has better performance on watermark accuracy and robustness against the query modification attack.
引用
收藏
页码:16497 / 16511
页数:14
相关论文
共 25 条
[1]  
Krizhevsky A(2017)Imagenet classification with deep convolutional neural networks Commun ACM 60 84-90
[2]  
Sutskever I(2021)A weakly supervised semantic segmentation network by aggregating seed cues: The multi-object proposal generation perspective ACM Trans Multimid Comput Commun Appl 17 1-19
[3]  
Hinton GE(2021)SSUR: An approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center IEEE Trans Green Commun Netw 5 670-681
[4]  
Xiao J(2020)Adversarial frontier stitching for remote neural network watermarking Neural Comput Appl 32 9233-9244
[5]  
Xu H(2004)Image quality assessment: From error visibility to structural similarity IEEE Trans Image Process 13 600-612
[6]  
Gao H(1998)Gradient-based learning applied to document recognition Proc IEEE 86 2278-2324
[7]  
Bian M(1991)Stochastic gradient learning in neural networks Proc Neuro-Nımes 91 1-12
[8]  
Li Y(undefined)undefined undefined undefined undefined-undefined
[9]  
Huang Y(undefined)undefined undefined undefined undefined-undefined
[10]  
Xu H(undefined)undefined undefined undefined undefined-undefined