[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3196494.3196550acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Protecting Intellectual Property of Deep Neural Networks with Watermarking

Published: 29 May 2018 Publication History

Abstract

Deep learning technologies, which are the key components of state-of-the-art Artificial Intelligence (AI) services, have shown great success in providing human-level capabilities for a variety of tasks, such as visual analysis, speech recognition, and natural language processing and etc. Building a production-level deep learning model is a non-trivial task, which requires a large amount of training data, powerful computing resources, and human expertises. Therefore, illegitimate reproducing, distribution, and the derivation of proprietary deep learning models can lead to copyright infringement and economic harm to model creators. Therefore, it is essential to devise a technique to protect the intellectual property of deep learning models and enable external verification of the model ownership.
In this paper, we generalize the "digital watermarking'' concept from multimedia ownership verification to deep neural network (DNNs) models. We investigate three DNN-applicable watermark generation algorithms, propose a watermark implanting approach to infuse watermark into deep learning models, and design a remote verification mechanism to determine the model ownership. By extending the intrinsic generalization and memorization capabilities of deep neural networks, we enable the models to learn specially crafted watermarks at training and activate with pre-specified predictions when observing the watermark patterns at inference. We evaluate our approach with two image recognition benchmark datasets. Our framework accurately (100%) and quickly verifies the ownership of all the remotely deployed deep learning models without affecting the model accuracy for normal input data. In addition, the embedded watermarks in DNN models are robust and resilient to different counter-watermark mechanisms, such as fine-tuning, parameter pruning, and model inversion attacks.

References

[1]
Martín Abadi et almbox. 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. In arXiv:1603.04467.
[2]
Ali Al-Haj. 2007. Combined DWT-DCT Digital Image Watermarking. In Journal of Computer Science.
[3]
Mustafa Osman Ali, Elamir Abu Abaida Ali Osman, and Rameshwar Row. 2012. Invisible Digital Image Watermarking in Spatial Domain with Random Localization International Journal of Engineering and Innovative Technology.
[4]
Sajid Anwar and Wonyong Sung. 2016. Compact Deep Convolutional Neural Networks With Coarse Pruning arXiv:1610.09639.
[5]
Mauro Barni, Franco Bartolini, and Alessandro Piva. 2001. Improved wavelet-based watermarking through pixel-wise masking IEEE Transactions on Image Processing.
[6]
Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks IEEE Symposium on Security and Privacy (S&P '17).
[7]
Munesh Chandra and Shikha Pandey. 2010. A DWT domain visible watermarking techniques for digital images International Conference On Electronics and Information Engineering (ICEIE '10).
[8]
Franccois Chollet. 2015. Keras. In https://github.com/fchollet/keras.
[9]
Gregory Cohen, Saeed Afshar, Jonathan Tapson, and André van Schaik. 2017. EMNIST: an extension of MNIST to handwritten letters. arXiv:1702.05373.
[10]
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, and Ton Kalker. 2007. Digital Watermarking and Steganography. In Morgan Kaufmann Publishers Inc.
[11]
Y. Le Cun, I. Guyon, L. D. Jackel, D. Henderson, B. Boser, R. E. Howard, J. S. Denker, W. Hubbard, and H. P. Graf . 1989. Handwritten digit recognition: applications of neural network chips and automatic learning. In IEEE Communications Magazine.
[12]
Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures ACM SIGSAC Conference on Computer and Communications Security.
[13]
Yoav Goldberg. 2015. A primer on neural network models for natural language processing Journal of Artificial Intelligence Research.
[14]
Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http://www.deeplearningbook.org
[15]
Alex Graves, Abdel-rahman Mohamed, and Geoffrey E. Hinton. 2013. Speech Recognition with Deep Recurrent Neural Networks IEEE International Conference on Acoustics, Speech and Signal Processing ( ICASSP '13).
[16]
Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. In arXiv:1708.06733.
[17]
Song Han, Jeff Pool, John Tran, and William J. Dally. 2015. Learning both Weights and Connections for Efficient Neural Networks Proceedings of Neural Information Processing Systems(NIPS'15).
[18]
Awni Hannun, Carl Case, Jared Casper, Bryan Catanzaro, Greg Diamos, Erich Elsen, Ryan Prenger, Sanjeev Satheesh, Shubho Sengupta, Adam Coates, and Andrew Y. Ng. 2012. Deep Speech: Scaling up end-to-end speech recognition arXiv:1412.5567.
[19]
Frank Hartung and Martin Kutter. 1999. Multimedia watermarking techniques. In Proceedings of the IEEE.
[20]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16).
[21]
J.R. Hernandez, M. Amado, and F. Perez-Gonzalez. 2000. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. In IEEE Transactions on Image Processing.
[22]
Geoffrey Hinton, Li Deng, Dong Yu, George E. Dahl, Abdel rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N. Sainath, and Brian Kingsbury. 2012. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups. In IEEE Signal Processing Magazine.
[23]
Briland Hitaj, Giuseppe Ateniese, and Ravi K ShethFernando Perez-Cruz. 2017. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. ACM Conference on Computer and Communications Security.
[24]
Sepp Hochreiter and Jurgen Schmidhuber. 1997. Long short-term memory. In Neural computation.
[25]
Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093 (2014).
[26]
Neil F. Johnson and Sushil Jajodia. 1998. Exploring Steganography: Seeing the Unseen. In IEEE Computer.
[27]
Nikita Kashyap and G. R. SINHA. 2012. Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT) International Journal of Modern Education and Computer Science (IJMECS '12).
[28]
Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images Master's thesis, Department of Computer Science, University of Toronto.
[29]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks Proceedings of the 25th International Conference on Neural Information Processing Systems (NIPS '12).
[30]
Gerhard C. Langelaar, Iwan Setyawan, and Reginald L. Lagendijk. 2000. Watermarking digital image and video data. A state-of-the-art overview IEEE Signal Processing Magazine.
[31]
Yann LeCun, Leon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition Proceedings of the IEEE.
[32]
Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang, Ran-Zan Wang, and Shyong-Jian Shyu. 2009. An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding Proceedings of the 3rd Pacific-Rim Symposium on Image and Video Technology(PSIVT '09).
[33]
Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS '18).
[34]
Jiansheng Mei, Sukang Li, and Xiaomei Tan. 2009. A Digital Watermarking Algorithm Based On DCT and DWT Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA '09).
[35]
Dongyu Meng and Hao Chen. 2017. MagNet: a Two-Pronged Defense against Adversarial Examples. ACM Conference on Computer and Communications Security.
[36]
Erwan Le Merrer, Patrick Perez, and Gilles Trédan. 2017. Adversarial Frontier Stitching for Remote Neural Network Watermarking arXiv:1711.01894.
[37]
Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. 2017. Pruning Convolutional Neural Networks for Resource Efficient Inference International Conference on Learning Representations (ICLR '17).
[38]
Shelby Pereira and Thierry Pun. 2000. Robust template matching for affine resistant image watermarks IEEE Transactions on Image Processing.
[39]
Nikiforos Pittaras, Foteini Markatopoulou, Vasileios Mezaris, and Ioannis Patras. 2017. Comparison of Fine-Tuning and Extension Strategies for Deep Convolutional Neural Networks. In International Conference on Multimedia Modeling.
[40]
A. Piva, M. Barni, E Bartolini, and V. Cappellini. 1997. DCT-based watermark recovering without resorting to the uncorrupted original image International Conference on Image Processing.
[41]
Lalit Kumar Saini and Vishal Shrivastava. 2014. A Survey of Digital Watermarking Techniques and its Applications International Journal of Computer Science Trends and Technology (IJCST '14).
[42]
Ravi K Sheth and V. V. Nath. 2016. Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method. In International Conference on Advances in Computing, Communication, and Automation.
[43]
Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models IEEE Symposium on Security and Privacy (SP '17).
[44]
Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition International Conference on Learning Representations (ICLR '15).
[45]
Suraj Srinivas and R. Venkatesh Babu. 2015. Data-free Parameter Pruning for Deep Neural Networks BMVA Press.
[46]
Mitchell D. Swanson, Mei Kobayashi, and Ahmed H. Tewfik. 1988. Multimedia data-embedding and watermarking technologies Proceedings of the IEEE.
[47]
Vivienne Sze, Yu-Hsin Chen, Tien-Ju Yang, and Joel Emer. 2017. Efficient Processing of Deep Neural Networks: A Tutorial and Survey arXiv:1703.09039.
[48]
Jun Tian. 2003. Reversible Data Embedding Using a Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology.
[49]
Florian Tramer, Fan Zhang, Ari Juels, Michael Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs Proceedings of the 25th USENIX Security Symposium (Security '16).
[50]
Yusuke Uchida, Yuki Nagai, Shigeyuki Sakazawa, and Shin'ichi Satoh. 2017. Embedding Watermarks into Deep Neural Networks. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval (ICMR '17).
[51]
Matthieu Urvoy, Dalila Goudia, and Florent Autrusseau. 2014. Perceptual DFT Watermarking With Improved Detection and Robustness to Geometrical Distortions IEEE Transactions on Information Forensics and Security (TIFS '14).
[52]
Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How transferable are features in deep neural networks? Neural Information Processing Systems.
[53]
Matthew D Zeiler and Rob Fergus. 2014. Visualizing and understanding convolutional networks European conference on computer vision. Springer, 818--833.
[54]
Lijing Zhang and Aihua Li. 2009. Robust Watermarking Scheme Based on Singular Value of Decomposition in DWT Domain Asia-Pacific Conference on Information Processing.

Cited By

View all
  • (2024)Artificial Intelligence in Intellectual Property Protection: Application of Deep Learning ModelEAI Endorsed Transactions on Internet of Things10.4108/eetiot.538810Online publication date: 12-Mar-2024
  • (2024)An Imperceptible and Owner-unique Watermarking Method for Graph Neural NetworksProceedings of the ACM Turing Award Celebration Conference - China 202410.1145/3674399.3674443(108-113)Online publication date: 5-Jul-2024
  • (2024)ModelLock: Locking Your Model With a SpellProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3685507(11156-11165)Online publication date: 28-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications Security
May 2018
866 pages
ISBN:9781450355766
DOI:10.1145/3196494
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. deep neural network
  2. ownership verification
  3. watermarking

Qualifiers

  • Research-article

Conference

ASIA CCS '18
Sponsor:

Acceptance Rates

ASIACCS '18 Paper Acceptance Rate 52 of 310 submissions, 17%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)522
  • Downloads (Last 6 weeks)69
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Artificial Intelligence in Intellectual Property Protection: Application of Deep Learning ModelEAI Endorsed Transactions on Internet of Things10.4108/eetiot.538810Online publication date: 12-Mar-2024
  • (2024)An Imperceptible and Owner-unique Watermarking Method for Graph Neural NetworksProceedings of the ACM Turing Award Celebration Conference - China 202410.1145/3674399.3674443(108-113)Online publication date: 5-Jul-2024
  • (2024)ModelLock: Locking Your Model With a SpellProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3685507(11156-11165)Online publication date: 28-Oct-2024
  • (2024)Safe-SD: Safe and Traceable Stable Diffusion with Text Prompt Trigger for Invisible Generative WatermarkingProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681418(7113-7122)Online publication date: 28-Oct-2024
  • (2024)Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-AliasingProceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security10.1145/3658664.3659634(223-234)Online publication date: 24-Jun-2024
  • (2024)Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited DataProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690334(675-689)Online publication date: 2-Dec-2024
  • (2024)Watermarking Recommender SystemsProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679617(3217-3226)Online publication date: 21-Oct-2024
  • (2024)Customized and Robust Deep Neural Network WatermarkingProceedings of the 17th ACM International Conference on Web Search and Data Mining10.1145/3616855.3635812(134-142)Online publication date: 4-Mar-2024
  • (2024)DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile AppsProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623325(1-13)Online publication date: 20-May-2024
  • (2024)Optimized and secured AI for the tactical edgeAssurance and Security for AI-enabled Systems10.1117/12.3014167(25)Online publication date: 7-Jun-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media