论文标题

图像处理网络的型号水印

Model Watermarking for Image Processing Networks

论文作者

Zhang, Jie, Chen, Dongdong, Liao, Jing, Fang, Han, Zhang, Weiming, Zhou, Wenbo, Cui, Hao, Yu, Nenghai

论文摘要

深度学习在众多工业应用中取得了巨大的成功。由于训练一个好的模型通常需要大量的高质量数据和计算资源,因此学习的模型通常具有重要的业务价值。但是,这些宝贵的深层模型暴露于侵权的巨大风险。例如,如果攻击者拥有一个目标模型(包括网络结构和权重)的完整信息,则可以在新数据集中轻松列出该模型。即使攻击者只能访问目标模型的输出,他/她仍然可以通过生成大量的输入输出训练对来训练另一个类似的替代模型。如何保护深层模型的知识产权是一个非常重要但经过深入研究的问题。最近有几次尝试分类网络保护。在本文中,我们提出了第一个用于保护图像处理模型的模型水印框架。为了实现这一目标,我们利用空间无形的水印机制。具体而言,给定一个黑盒目标模型,统一和无形的水印被隐藏在其输出中,可以将其视为特殊的任务不合稳定屏障。通过这种方式,当攻击者使用目标模型的输入输出对训练一个替代模型时,将在此后学习并提取隐藏的水印。为了使水印从二进制钻头到高分辨率图像,都考虑了传统和深空的隐形水印机制。实验证明了所提出的水印机制的鲁棒性,该机制可以抵抗具有不同网络结构和客观功能的替代模型。除了深层模型外,提出的方法还很容易扩展以保护数据和传统的图像处理算法。

Deep learning has achieved tremendous success in numerous industrial applications. As training a good model often needs massive high-quality data and computation resources, the learned models often have significant business values. However, these valuable deep models are exposed to a huge risk of infringements. For example, if the attacker has the full information of one target model including the network structure and weights, the model can be easily finetuned on new datasets. Even if the attacker can only access the output of the target model, he/she can still train another similar surrogate model by generating a large scale of input-output training pairs. How to protect the intellectual property of deep models is a very important but seriously under-researched problem. There are a few recent attempts at classification network protection only. In this paper, we propose the first model watermarking framework for protecting image processing models. To achieve this goal, we leverage the spatial invisible watermarking mechanism. Specifically, given a black-box target model, a unified and invisible watermark is hidden into its outputs, which can be regarded as a special task-agnostic barrier. In this way, when the attacker trains one surrogate model by using the input-output pairs of the target model, the hidden watermark will be learned and extracted afterward. To enable watermarks from binary bits to high-resolution images, both traditional and deep spatial invisible watermarking mechanism are considered. Experiments demonstrate the robustness of the proposed watermarking mechanism, which can resist surrogate models learned with different network structures and objective functions. Besides deep models, the proposed method is also easy to be extended to protect data and traditional image processing algorithms.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源