skip to main content
10.1145/3531536.3532961acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Sparse Trigger Pattern Guided Deep Learning Model Watermarking

Authors Info & Claims
Published:23 June 2022Publication History

ABSTRACT

Watermarking neural networks (NNs) for ownership protection has received considerable attention recently. Resisting both model pruning and fine-tuning is commonly considered to evaluate the robustness of a watermarked NN. However, the rationale behind such a robustness is still relatively unexplored in the literature. In this paper, we study this problem to propose a so-called sparse trigger pattern (STP) guided deep learning model watermarking method. We provide empirical evidence to show that trigger patterns are able to make the distribution of model parameters compact, and thus exhibit interpretable resilience to model pruning and fine-tuning. We find the effect of STP can also be technically interpreted as the first layer dropout. Extensive experiments demonstrate the robustness of our method.

References

  1. Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. In 27th USENIX Security Symposium (USENIX Security). 1615--1631.Google ScholarGoogle Scholar
  2. Tom B. Brown, Dandelion Mané, Aurko Roy, Martín Abadi, and Justin Gil. 2017. Adversarial Patch. In NIPS Workshop.Google ScholarGoogle Scholar
  3. Huili Chen, Bita Darvish Rouhani, and Farinaz Koushanfar. 2019. BlackMarks: Blackbox Multibit Watermarking for Deep Neural Networks. In Asia CCS.Google ScholarGoogle Scholar
  4. Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, and Dawn Song. 2021. REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data. In Asia CCS. 321--335.Google ScholarGoogle Scholar
  5. A. Cui, J. Peng, H. Li, M. Wen, and J. Jia. 2019. Iterative thresholding algorithm based on non-convex method for modified ℓp-norm regularization minimization. J. Comput. Appl. Math. 347 (Feb. 2019), 173--180.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei. 2009. ImageNet: A Large-Scale Hierarchical Image Database. In IEEE Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle Scholar
  7. D. L. Donoho. 2006. Compressed sensing. IEEE Trans. Inf. Theory 52, 4 (2006), 1289--1306.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lixin Fan, Kam Woh Ng, and Chee Seng Chan. 2019. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. In NIPS.Google ScholarGoogle Scholar
  9. T. Gu, B. Dolan-Gavitt, and S. Garg. 2017. Badnets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. In CoRR abs/1708.06733.Google ScholarGoogle Scholar
  10. S. Han, H. Mao, and W. J. Dally. 2015. Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding. In ICLR.Google ScholarGoogle Scholar
  11. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. In CVPR. 770--778.Google ScholarGoogle Scholar
  12. Alex Krizhevsky. 2009. Learning Multiple Layers of Features from Tiny Images. In https://www.cs.toronto.edu/~kriz/learning-features-2009-TR.pdf.Google ScholarGoogle Scholar
  13. Hanwen Liu, Zhenyu Weng, and Yuesheng Zhu. 2021. Watermarking Deep Neural Networks with Greedy Residuals. In ICML.Google ScholarGoogle Scholar
  14. Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal Adversarial Perturbations. In CVPR. 1765--1773.Google ScholarGoogle Scholar
  15. F. Petitcolas. 2000. Watermarking Schemes Evaluation. IEEE Signal Processing Magazine 17, 5 (2000), 58--64.Google ScholarGoogle ScholarCross RefCross Ref
  16. Yuhui Quan, Huan Teng, Yixin Chen, and Hui Ji. 2021. Watermarking Deep Neural Networks in Image Processing. IEEE Trans. on Neural Networks and Learning Systems 32, 5 (2021), 1852--1865.Google ScholarGoogle ScholarCross RefCross Ref
  17. Bita Darvish Rouhani, Huili Chen, and Farinaz Koushanfar. 2019. DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 485--497.Google ScholarGoogle Scholar
  18. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research 15 (2014), 1929--1958.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sebastian Szyller, Buse Gul Atli, Samuel Marchal, , and N. Asokan. 2019. DAWN: Dynamic Adversarial Watermarking of Neural Networks. In CoRR abs/1906.00830.Google ScholarGoogle Scholar
  20. Yusuke Uchida, Yuki Nagai, Shigeyuki Sakazawa, and Shin ichi Satoh. 2017. Embedding Watermarks into Deep Neural Networks. In ICMR. 269--277.Google ScholarGoogle Scholar
  21. TianHao Wang and Florian Kerschbaum. 2021. RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks. In WWW.Google ScholarGoogle Scholar
  22. Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, and Nenghai Yu. 2021. Deep Model Intellectual Property Protection via Deep Watermarking. IEEE Trans. on Pattern Analysis and Machine Intelligence (2021).Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, and Ian Molloy. 2018. Protecting Intellectual Property of Deep Neural Networks with Watermarking. In Asia CCS. 159--172.Google ScholarGoogle Scholar

Index Terms

  1. Sparse Trigger Pattern Guided Deep Learning Model Watermarking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security
      June 2022
      177 pages
      ISBN:9781450393553
      DOI:10.1145/3531536

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 June 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%
    • Article Metrics

      • Downloads (Last 12 months)20
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader