Model Watermarking for Image Processing Networks

Jie Zhang, Dongdong Chen*, Jing Liao, Han Fang, Weiming Zhang, Wenbo Zhou, Hao Cui, Nenghai Yu

*Corresponding author for this work

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

124 Citations (Scopus)

Abstract

Deep learning has achieved tremendous success in numerous industrial applications. As training a good model often needs massive high-quality data and computation resources, the learned models often have significant business values. However, these valuable deep models are exposed to a huge risk of infringements. For example, if the attacker has the full information of one target model including the network structure and weights, the model can be easily finetuned on new datasets. Even if the attacker can only access the output of the target model, he/she can still train another similar surrogate model by generating a large scale of input-output training pairs. How to protect the intellectual property of deep models is a very important but seriously under-researched problem. There are a few recent attempts at classification network protection only.
In this paper, we propose the first model watermarking framework for protecting image processing models. To achieve this goal, we leverage the spatial invisible watermarking mechanism. Specifically, given a black-box target model, a unified and invisible watermark is hidden into its outputs, which can be regarded as a special task-agnostic barrier. In this way, when the attacker trains one surrogate model by using the input-output pairs of the target model, the hidden watermark will be learned and extracted afterward. To enable watermarks from binary bits to high-resolution images, both traditional and deep spatial invisible watermarking mechanism are considered. Experiments demonstrate the robustness of the proposed watermarking mechanism, which can resist surrogate models learned with different network structures and objective functions. Besides deep models, the proposed method is also easy to be extended to protect data and traditional image processing algorithms.
Original languageEnglish
Title of host publicationThe Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20)
Place of PublicationCalifornia
PublisherAAAI Press
Pages12805-12812
ISBN (Print)9781577358350 (set)
DOIs
Publication statusPublished - Feb 2020
Event34th AAAI Conference on Artificial Intelligence (AAAI-20) - New York, United States
Duration: 7 Feb 202012 Feb 2020
https://aaai.org/Conferences/AAAI-20/
https://aaai.org/ojs/index.php/AAAI/index

Publication series

NameProceedings of the AAAI Conference on Artificial Intelligence
PublisherAAAI Press
Number7
Volume34
ISSN (Print)2159-5399
ISSN (Electronic)2374-3468

Conference

Conference34th AAAI Conference on Artificial Intelligence (AAAI-20)
PlaceUnited States
CityNew York
Period7/02/2012/02/20
Internet address

Bibliographical note

Research Unit(s) information for this publication is provided by the author(s) concerned.

Fingerprint

Dive into the research topics of 'Model Watermarking for Image Processing Networks'. Together they form a unique fingerprint.

Cite this