I Introduction
Deep neural networks and other Deep Learning (DL) variants have revolutionized various critical fields ranging from biomedical diagnosis and autonomous transportation to computer vision and natural language processing
[1, 2]. Training a highly accurate DNN is a costly process since it requires: (i) processing massive amounts of data acquired for the target application; (ii) allocating substantial computing resources to finetune the underlying topology (i.e., type and number of hidden layers), and hyperparameters (i.e., learning rate, batch size), and DNN weights to obtain the most accurate model. Therefore, developing a highperformance DNN is impractical for the majority of customers with constrained computational capabilities. Given the costly process of designing/training, DNNs are typically considered to be the intellectual property of the model builder and needs to be protected to preserve the owner’s competitive advantage.Digital watermarking has been immensely leveraged over the past decade for ownership protection in the multimedia domain where the host of the watermark can be images, video content, and functional artifacts such as digital integrated circuits [3, 4, 5]. However, the development of DNN watermarking techniques is still in its early stage. Designing a coherent DNN watermarking scheme for model ownership proof is challenging since the embedded WM is required to yield high detection rates and withstand potential attacks while minimally affecting the original functionality and overhead of the target DNN.
Existing DNN watermarking techniques can be categorized into two types depending on the application scenario. ‘Whitebox’ watermarking methods [6] assumes the availability of model internals (e.g., weights) for WM extraction while ‘blackbox’ watermarking only assumes that the output predictions can be obtained for WM detection [7, 8]
. On the one hand, Whitebox WMs have a larger capacity (carrying multiplebit information) but limited applicability due to the strong assumption. On the other hand, blackbox WMs enable IP protection for Machine Learning as a Service (MLaaS)
[2] while only zerobit watermarking methods have been proposed. It is desirable to develop a systematic watermarking approach that combines the advantages of both types of WMs. While all present blackbox watermarking papers embed the WM as a statistical bias in the decision boundaries of the DNN (high accuracy on the WM trigger set), our work is the first to prove that it is feasible to leverage the model’s predictions to carry a multibit string instead of a onebit information (existence or not of the WM).By introducing BlackMarks, this paper makes the following contributions:

Proposing BlackMarks, the first endtoend blackbox watermarking framework that enables multibit WM embedding. BlackMarks possesses higher capacity compared to prior works and only requires the predictions of the queried model for WM extraction.

Characterizing the requirements for an effective watermarking methodology in the deep learning domain. Such metrics provide new perspectives for model designers and enable coherent comparison of current and pending DNN IP protection techniques.

Performing extensive evaluation of BlackMarks’s performance on various benchmarks. Experimental results show that BlackMarks enables robust WM embedding with high detection rates and low false alarm rates. As a side benefit, we find out that BlackMarks’s WM embedding improves the robustness of the marked model against adversarial attacks.
Ii Preliminaries and Related Work
Digital watermarks are invisible identifiers embedded as an integral part of the host design and have been widely adopted in the multimedia domain for IP protection [9, 10]. Conventional digital watermarking techniques consist of two phases: WM embedding and WM extraction. Figure 1 shows the workflow of a typical constraintbased watermarking system. The original problem is used as the cover constraints to hide the owner’s WM signature. To embed the WM, the IP designer creates the stegokey and a set of additional constraints that do not conflict with cover constraints. Combining these two constraints yields the stegoproblem, which is solved to produce the stegosolution. Note that the stegosolution will simultaneously satisfy both the original constraints and the WMspecific constraints, thus enables the designer to extract the WM and claim the authorship. An effective watermarking method is required to meet a set of criteria including imperceptibility, robustness, verifiability, capacity, and low overhead [11].
IP protection of valuable DNN models is a subject of increasing interest to researchers and practitioners. [6] takes the first step towards DNN watermarking and embeds the WM in the weights of intermediate layers by training the model with an additional regularization loss. The WM is later extracted from the weights at the marked layer assuming a whitebox scenario. [12] present the first generic watermarking approach that is applicable in both whitebox and blackbox settings by embedding the WM in the activation maps of the intermediate layers and the output layer, respectively. To alleviate the constraint on the availability of model internals during WM extraction, several papers propose zerobit watermarking techniques that are applicable in the blackbox scenario. [7]
craft adversarial samples as WMs and embeds them in the decision boundary of the original model by finetuning the DNN with the WMs. Null hypothesis testing is performed to detect the WM based on the remote model’s response to the WM query images.
[13]suggest to use the incorrectly classified images from the training data as the WM trigger set and generate random labels as the corresponding labels. A commitment scheme is applied to the trigger set to produce the WM marking key and the verification key. The existence of the WM is determined by querying the model with the marking keys and performing statistical hypothesis testing.
[14] proposes three WM generation algorithms (‘unrelated’, ‘content’, ‘noise’) and embeds the WM by training the model with the concatenation of the training set and the WM set. To detect the WM, the remote model is queried by the WM set and the corresponding accuracy is thresholded to make the decision. To the best of our knowledge, none of the prior works has addressed the problem of multibit blackbox watermarking.Iii BlackMarks Overview
This section demonstrates the global flow of BlackMarks framework (Section IIIA) and introduces a comprehensive set of metrics for an effective DNN watermarking technique (Section IIIB). Potential attacks that might render the embedded WMs undetectable are identified in Section IIIC.
Iiia Global Flow
Figure 2 shows the global flow of BlackMarks framework. BlackMarks consists of two main phases: watermark embedding and watermark extraction. The marked DNN is deployed as a remote service that only allows API access. BlackMarks is the first framework that supports multibit DNN watermarking in a blackbox setting. We discuss the workflow of each phase as follows.
Requirements  Description 

Fidelity  Accuracy of the target neural network shall not be degraded as a result of watermark embedding. 
Credibility  Watermark extraction shall yield minimal false negatives; WM shall be effectively detected using the pertinent keys. 
Robustness  Embedded watermark shall withstand model modifications such as pruning, finetuning, or WM overwriting. 
Integrity  Watermark extraction shall yield minimal false alarms; the authorship of the unmarked models will not be falsely claimed. 
Capacity  Watermarking methodology shall be capable of embedding a large amount of information in the target DNN. 
Efficiency  Communication and computational overhead of watermark embedding and extraction shall be negligible. 
Security  The watermark shall be secure against bruteforce attacks and leave no tangible footprints in the target neural network; thus, an unauthorized party cannot detect/remove the presence of a watermark. 
Watermark Embedding. The WM embedding module of BlackMarks takes the pretrained model and the ownerspecific WM signature as its input. The output is the watermarked DNN together with a set of WM keys. The WM signature is an arbitrary binary string where each bit is independently and identically distributed (i.i.d.). A modeldependent encoding scheme is devised to map all possible labels into bit ‘0’ and bit ‘1’. The WM embedding process is performed in two steps. First, a set of WM keys are generated as secure parameters for WM embedding. Then, the underlying DNN is trained (finetuned) such that the ownerspecific WM signature is encoded in the output activations. Note that WM embedding is a onetime task performed by the owner before the model is distributed. Details of each step are discussed in Section IVA.
Watermark Extraction. To verify the IP of a remote DNN and detect potential IP infringement, the model owner first queries the DNN service with the WM keys generated in the WM embedding phase. BlackMarks then decodes the owner’s signature from the corresponding triggered predictions using the encoding scheme employed in the embedding stage. The Bit Error Rate (BER) between the extracted signature and the true one is computed. A zero BER implies that the owner’s IP is deployed in the remote DNN service. Details of each WM extraction step are discussed in Section IVB.
IiiB Evaluation Criteria
There are a set of minimal requirements that should be addressed to design a robust digital watermark. Table I details the prerequisites for an effective DNN watermarking methodology. In addition to previously suggested requirements in [6, 7], we believe credibility and integrity are two other major factors that need to be considered when designing a practical DNN watermarking methodology. Credibility
is important because the embedded watermark should be accurately extracted using the pertinent keys; the model owner is thereby able to detect any misuse of her model with a high probability.
Integrity ensures that the IP infringement detection policy yields a minimal false alarms rates, meaning that there is a very low chance of falsely proving the ownership of an unmarked model used by a third party. BlackMarks satisfies all the requirements listed in Table I as we empirically show in Section V.IiiC Attack Model
To validate the robustness of a potential DL watermarking approach, one should evaluate the robustness of the proposed methodology against (at least) three types of contemporary attacks: (i) model finetuning. This attack involves retraining of the original model to alter the model parameters and find a new local minimum while preserving the accuracy. (ii) model pruning. Model pruning is a common approach for efficient DNN execution, particularly on embedded devices. We identify model pruning as another attack approach that might affect the watermark extraction/detection. (iii) watermark overwriting. A thirdparty user who is aware of the methodology used for DNN watermarking (but does not know the owner’s private WM keys) may try to embed a new watermark in the model and overwrite the original one. An overwriting attack intends to insert an additional watermark in the model and render the original one undetectable. A watermarking methodology should be robust against finetuning, pruning, and overwriting for effective IP protection.
Iv BlackMarks Methodology
Deep learning models possess nonconvex loss surfaces with many local minima that are likely to yield similar accuracy [15, 16]. BlackMarks takes advantage of this fact that there is not a unique solution for modern nonconvex optimization problems to embed the WM information in the distribution of output activations within the target DNN. We detail the workflow of WM embedding and extraction shown in Figure 2 in Section IVA and IVB, respectively. The computation and communication overhead of BlackMarks framework is discussed in Section IVC. We use image classification as the host problem in this paper, however, BlackMarks can be easily generalized to other data applications.
Iva Watermark Embedding
Algorithm 1 summarizes the steps of BlackMarks’ WM embedding. BlackMarks encodes the ownerspecific WM information in the distribution of the output activations (before softmax) while preserving the correct functionality on the original task. The rationale behind our approach is to explore the unused space within the high dimensional DNN [17] for WM embedding. BlackMarks formulates WM embedding as a onetime, ‘postprocessing’ step that is performed on the pretrained DNN locally by the owner before model distribution/deployment. The procedure of BlackMarks’s output layer watermarking scheme is summarized in Figure 3. We explicitly discuss each of the steps outlined in Algorithm 1 in the following section.
Encoding Scheme Design. Recall that our objective is to encode a binary string (owner’s signature) into the predictions made by the DNN when queried by the WM keys. BlackMarks designs a model and datasetdependent encoding scheme that maps the class predictions to binary bits. The encoding scheme () is obtained by clustering the output activations corresponding to all categories () into two groups based on their similarity. To do so, BlackMarks passes a subset of training images in each class through the underlying DNN and acquires the activations at the output layer (before softmax
applied). The mean value of the output activations in each class is then computed and gathered. Finally, Kmeans clustering is employed to divide the averaged output activations of all classes into two groups, resulting in the encoding scheme (step 1). The encoding scheme specifies the collection of labels that correspond to bit ‘0’ and bit ‘1’, respectively.
Key Generation 1. The key generation module takes the encoding scheme obtained in step 1, the owner’s private signature (, where is also the key length), and the original training data as inputs and returns a set of imagelabel pairs as the WM keys for the target DNN. To be more detailed, BlackMarks deploys targeted adversarial attacks to craft WM key images and labels. If the given bit in is ‘0’, the source class and the target class for the WM image (‘adversarial sample’) are determined by uniformly randomly selecting a class label that belongs to the cluster ‘0’ and cluster ‘1’ determined by the encoding scheme (), respectively. The source class is used as the corresponding WM key label. The WM keys for bit ‘1’ in are generated in a similar way. We use Momentum Iterative Method (MIM) [18] in our experiments. BlackMarks is generic and other targeted adversarial attacks can be used as the replacement of MIM.
BlackMarks’s objective is to design specific WM key images as the queries for model authentication instead of crafting standard adversarial samples that cannot be distinguished by human eyes. Therefore, the maximum perturbation is set to with norm bound. We assume that the WM signature and the key generation parameters (e.g., source and target classes, maximum distortion, step size and the number of attack iterations) are secret information specified by the owner. BlackMarks’s WM key images can be considered as a generalization of ‘adversarial samples’ with relaxed constraints on the perturbation level and a different objective (authenticating the ownership of the DNN instead of fooling the model to give wrong results).
It’s worth noting that the transferability of adversarial samples [19, 20] might yield false positives of WM detection as shown in [7]. To address this problem, we set the initial key size to be larger than the owner’s desired value and generate the input keys accordingly ( in our experiments). The intuition here is that we want to filter out WM keys that are located near the decision boundaries and can easily transfer to unmarked models.
Model Finetuning. To enable seamless encoding of the WM information, BlackMarks incorporates an additive WMspecific embedding loss () to the conventional crossentropy loss () during DNN finetuning where a mixture of the WM keys and (a subset of) the original training data is fed to the model. The formulation of the total regularized loss () is given in Eq. (1). Here, we use Hamming Distance
as the loss function
to measure the difference between the extracted signature (obtained by ) and the true signature . The embedding strength parameter controls the contribution of the additive loss term.(1) 
Note that without the additional regularization loss (), this retraining procedure resembles ‘adversarial training’ [21]. All of the existing zerobit blackbox watermarking papers [7, 14, 13] leverages ‘adversarial training’ for WM embedding to ensure that the marked model has a high classification accuracy on the WM trigger set. However, such an approach does not directly apply to multibit WM embedding where we care about the difference between the decoded signature and the original one instead of the difference between the received predictions and the WM key labels. BlackMarks identifies this inherent requirement of multibit watermarking and formulates an additive embedding loss () to encode the WM. The rationale behind our design is that, when queried by WM key images, an additional penalty shall be applied if the prediction of the marked model does not belong to the same codebit cluster as the corresponding WM key label (codebit clusters are specified by the encoding scheme).
Dataset  Baseline Accuracy  Accuracy of Marked Model  DL Model Architecture  

MNIST  99.44%  K = 20  K = 30  K = 50  1*28*2832C3(1)BN32C3(1)MP2(1)BN 
99.44%  99.46%  99.42%  64C3(1)BNFlattenBN512FCBN10FC  
CIFAR10  92.09%  K = 20  K = 30  K = 50  Please refer to [22]. 
92.10%  92.28%  92.19%  
ImageNet (top1)  56.39%  K = 20  K =30  K =50  Please refer to [23]. 
56.28%  56.31%  56.36% 
filters applied with a stride of 1,
denotes a maxpooling layer over regions of size
and stride of 1, and is a fullyconnected layer withoutput neurons.
denotes batchnormalization layer. ReLU is used as the activation function for hidden layers.
In our experiments, we set the hyperparameter to for MNIST and CIFAR10 benchmark, and to for ImageNet benchmark. The pretrained unmarked model is finetuned for epochs with the regularized loss in Eq. (1) for all benchmarks. We use the same optimizer setting used for training the original neural network, except that the learning rate is reduced by a factor of 10. Such retraining procedure coherently encodes the WM key in the distribution of output activations while preventing the accuracy drop on the legitimate data.
Key Generation 2. Once the model is finetuned with the regularized loss in step 3, we first find out the indices of initial WM keys that are correctly classified by the watermarked model (denoted by ). To identify and remove WM keys images with high transferability, we construct variants of the original unmarked model ( in our experiments) by regular finetuning. All these unmarked models are queried to find the common indices of the initial WM keys that are incorrectly classified (denoted by ). Finally, the intersection of and (denoted by ) determines the indices of proper key candidates to carry the WM signature. A random subset of candidate WM keys is then selected as the final WM keys according to the owner’s key size (). In the global flow (Figure 2), we merge the two key generation steps into one module for simplicity.
IvB Watermark Extraction
To extract the signature from the remote DNN (), the owner queries the model with the WM key images () generated in step 4 of WM embedding and obtains the corresponding predictions (). Each prediction is then decoded to the corresponding binary value using the encoding scheme ( designed in WM embedding. The decoding is repeated for all predictions on the WM key and yields the recovered signature (). Finally, the BER between the true signature () and the extracted one () is computed. The owner can prove the authorship of the model if the BER is zero.
IvC Watermarking Overhead
Here, we analyze the computation and communication overhead of WM extraction. The runtime overhead of the onetime WM embedding is empirically studied in Section VF. For the remote DNN service provider, the computation overhead of WM extraction is equal to the cost of one forward pass of WM key images through the underlying DNN. For the model owner, the computation cost consists of two parts: (i) decoding the prediction response
to a binary vector by finding out which cluster (‘0’ or ‘1’ in the encoding scheme
) contains each prediction; and (ii) performing an elementwise comparison between the recovered signature () and the true one () to compute the BER. In this case, the communication overhead is equal to the key length () multiplied by the sum of the input image dimension and one to submit the queries and read back the predicted labels.V Evaluation
We evaluate the performance of BlackMarks framework on various datasets including MNIST [24], CIFAR10 [25] and ImageNet [26], with three different neural network architectures. Table II summarizes DNN topologies used in each benchmark and the corresponding WM embedding results. In Table II, denotes the length of the owner’s signature (which is also the size of the WM keys). In the rest of this section, we explicitly evaluate BlackMarks’ performance with respect to each requirement listed in Table I. As empirically demonstrated, BlackMarks is effective and applicable across various datasets and DNN architectures.
Va Fidelity
Fidelity requires that the accuracy of the target neural network shall not be significantly degraded after WM embedding. Table II compares the baseline DNN accuracy (Column 2) and the accuracy of marked models (Column 3 and 4) after WM embedding. As demonstrated, BlackMarks respects the fidelity requirement by simultaneously optimizing for the classification accuracy of the underlying model (the crossentropy loss), as well as the additive WMspecific loss as discussed in Section IVA. In some cases (e.g. WideResNet benchmark), we even observe a slight accuracy improvement compared to the baseline. This improvement is mainly due to the fact that the additive loss in Eq. (1) act as a regularizer during DNN training. Regularization, in turn, helps the model to mitigate overfitting by inducing a small amount of noise to DNNs [27].
Dataset  MNIST  CIFAR10  ImageNet (top1)  

# Finetuning Epochs  20  50  100  20  50  100  5  10  20 
Accuracy  99.46%  99.48%  99.51%  92.34%  92.36%  92.40%  55.19%  55.13%  55.17% 
BER  0  0  0  0  0  0  0  0  0 
Detection Success  1  1  1  1  1  1  1  1  1 
Dataset  MNIST  CIFAR10  ImageNet (top1)  

Key Length  K=20  K=30  K=50  K=20  K=30  K=50  K=20  K=30  K=50 
Accuracy  99.46%  99.43%  99.38%  92.01%  92.09%  92.05%  56.24%  56.32%  56.38% 
BER  0  0  0  0  0  0  0  0  0 
Detection Success  1  1  1  1  1  1  1  1  1 
Dataset  MNIST  CIFAR10  ImageNet  
Unmarked Models  M1  M2  M3  M4  M5  M6  M1  M2  M3  M4  M5  M6  M1  M2  M3  M4  M5  M6  
BER  K=20  0.25  0.2  0.25  0.05  0.05  0.15  0.15  0.15  0.05  0.35  0.75  0.15  0.50  0.45  0.55  0.25  0.20  0.25 
K=30  0.27  0.23  0.23  0.03  0.03  0.1  0.15  0.15  0.05  0.35  0.75  0.2  0.37  0.27  0.33  0.1  0.2  0.17  
K=50  0.26  0.16  0.16  0.08  0.08  0.1  0.58  0.28  0.20  0.64  0.72  0.14  0.46  0.38  0.44  0.02  0.3  0.28 
VB Credibility and Robustness
BlackMarks enables robust DNN watermarking and reliably extracts the embedded WM for ownership verification. We evaluate the robustness of BlackMarks against three stateoftheart removal attacks as discussed in Section IIIC. These attacks include parameter pruning [28], model finetuning [29], and watermark overwriting [6].
Model Finetuning. Finetuning is a type of transformation attack that a thirdparty user might use to remove the WM information. To perform such an attack, the adversary retrains the distributed marked model using the original training data with the conventional crossentropy loss (excluding ). Table III summarizes the impact of finetuning on the watermark detection rate across all benchmarks. As can be seen from the table, the WM signature embedded by BlackMarks framework can be successfully extracted with zero BER even after the model is finetuned for various numbers of epochs. Note that the number of finetuning epochs for ImageNet benchmark is smaller than the other two since the number of epochs needed to train the ImageNet benchmark from scratch is whereas the other benchmarks take around epochs to be trained.
Parameter Pruning. We use the pruning approach proposed in [28] to sparsify the weights in the target watermarked DNN. To prune a specific layer, we first set of the parameters that possess the smallest weight values to zero. The model is then sparsely finetuned using crossentropy loss to compensate for the accuracy drop caused by pruning.
Figure 4 demonstrates the impact of pruning on WM extraction. One can see that BlackMarks tolerates up to , , and parameter pruning for MNIST, CIFAR10, and ImageNet benchmark, respectively. As illustrated in Figure 4, in cases where DNN pruning yields a substantial BER value, the sparse model suffers from a large accuracy drop. Therefore, one cannot remove BlackMarks’ WM by excessive pruning while attaining a comparable accuracy with the baseline.
Watermark Overwriting. Assuming the attacker is aware of the watermarking methodology, he may attempt to corrupt the original WM by embedding a new one. In our experiments, we assume the adversary knows the targeted adversarial attack method employed by the model owner while the owner’s signature and the key generation parameters remain secret. In this case, the attacker generates another set of WM keys with his own signature and key generation parameters to finetune the marked model following the steps outlined in Algorithm 1. Table IV summarizes the accuracy of the overwritten DNN and the BER of the original WM signature () for all three benchmarks. In our experiments, we assume the attacker uses the same key length as the owner to generate the new WM keys. BlackMarks can successfully extract the original WM in the overwritten DNN with zero BER, indicating its credibility and robustness against WM overwriting attacks.
VC Security
The malicious adversary may try to find the exact WM key designed by the model owner. Since the key generation parameters and the WM signature are assumed to be secret information provided by the owner as discussed in Section IVA, even if the attacker is aware of the adversarial attack method used to generate the WM key, he cannot reproduce the exact same key images due to the large searching space. Therefore, BlackMarks is secure against bruteforce attacks. Note that BlackMarks’s security derives from the uncertainties in the key generation process. This is due to the fact that it is sufficient for the attacker to disturb one bit in the recovered WM signature to make the resulting BER nonzero, thus defeating the model authorship proof.
Accuracy on Adversarial Set  MNIST  CIFAR10  

Unmarked Model  Marked Model  Unmarked Model  Marked Model  
FGSM (untargeted, [30])  58.67%  75.03%  36.51%  36.93% 
JSMA (targeted, [31])  4.98%  10.20%  76.56%  77.21% 
MIM (targeted, [18])  59.24%  77.47%  53.97%  56.82% 
CW (targeted, [32])  87.50%  89.91%  43.03%  44.84% 
VD Integrity
Integrity requires that the watermarking technique shall not falsely claim the authorship of unmarked models. For multibit watermarking, such requirement means that if an unmarked model is queried by the owner’s WM key set, the BER between the decoded signature from the model’s predictions and the owner’s signature shall not be zero. To evaluate the integrity of BlackMarks, we choose six unmarked models for each benchmark and summarize the results in Table V. The first three models (M1M3) have the same network topology but different weights as the watermarked model and the other three models (M4M6) have different topologies as the marked model. For each benchmark, the owner queries these six unmarked models with her WM keys and tries to extract the WM. The computed BER is nonzero in all cases, indicating that BlackMarks avoids claiming the ownership of unmarked DNNs and yields low false positive rates.
VE Capacity
One apparent advantage of BlackMarks over existing zerobit blackbox watermarking methods is its higher capacity as we discuss in Section II. To further improve the capacity of the WM, BlackMarks can be easily generalized to embed more complex signatures instead of binary vectors. The amount of information carried by the owner’s WM signature can be measured by entropy [33]. More generally, if the owner specifies her signature (a numeric vector) with base and length , the corresponding entropy can be computed as:
(2) 
As can be seen from Eq. (2), a longer signature with a larger base value carries more information. Since we use a binary vector () as the WM signature in this paper, the entropy can be simplified as . To extend BlackMarks framework for embedding a base signature, the owner needs to set the number of components in to (Algorithm 1) and change the encoding as well as decoding scheme of predictions correspondingly. BlackMarks is the first generic multibit watermarking framework that possesses high capacity in the blackbox setting.
VF Overhead
The WM extraction overhead is discussed in Section IVC. Here, we analyze the runtime overhead incurred by WM embedding. Recall that the WM is inserted in the model by onetime finetuning of the target DNN with the regularized loss shown in Eq. (1). As such, the computation overhead to embed a WM is determined by computing the additive loss term during DNN training. BlackMarks has no communication overhead for WM embedding since the embedding process is performed locally by the model owner. To quantify the computation overhead for WM embedding, we measure the normalized runtime time ratio of finetuning the pretrained model with the WMspecific loss and the time of training the original DNN from scratch. To embed the WM, we use the entire training data for MNIST and CIFAR10 benchmark and of the training data for ImageNet benchmark in our experiments. The selected training data is concatenated with the WM key set to finetune the model. The results are visualized in Figure 5, showing that BlackMarks incurs a reasonable additional overhead for WM embedding (as low as 2.054%) even for large benchmarks.
Vi Discussion
Recall that WM embedding leverages a similar approach as ‘adversarial training’ while incorporating a WMspecific regularization loss (Section IVA). Here, we study the effect of WM embedding on the model’s robustness against adversarial attacks. Table VI compares the robustness of the pretrained unmarked model and the corresponding watermarked model () against different types of whitebox adversarial attacks. It can be seen that for each type of the attack, the marked model has higher accuracy on the adversarial samples compared to the unmarked baseline. The largest accuracy improvement is observed against MIM attacks, which is the method employed by BlackMarks to generate WM keys. Such improvement is intuitive to understand since during WM embedding, the first term (crossentropy loss) in the total regularized loss (see Eq. (1)) enforces the model to learn the correct predictions on training data as well as on the WM keys (‘adversarial samples’), thus having a similar effect as ‘adversarial training’ [21]. Therefore, BlackMarks has a side benefit of improving the model’s robustness against adversarial attacks.
In the future, we plan to extend BlackMarks framework to the multiuser setting for fingerprinting purpose. [34] present the first collusionresilient DNN fingerprinting approach for unique user tracking in the whitebox setting. To the best of our knowledge, no blackbox fingerprinting has been proposed due to the lack of blackbox multibit watermarking schemes. BlackMarks proves the feasibility of blackbox fingerprinting methods and builds the technical foundation.
Vii Conclusion
Deep learning is facilitating breakthroughs in various fields and being increasingly commercialized. A practical concern, in the rush to adopt DL models as a service, is protecting the models against IP infringement. In this paper, we propose BlackMarks, the first blackbox multibit watermarking framework for IP protection. To the best of our knowledge, this work provides the first empirical evidence that embedding and extracting multibit information using the model’s predictions are possible. We introduce a set of requirements to characterize the performance of an effective watermarking technique and perform a comprehensive evaluation of BlackMarks accordingly. Experimental results on various datasets and network architectures corroborate that BlackMarks coherently embeds robust watermarks in the output predictions of the target DNN with an additional overhead as low as . BlackMarks possesses superior capacity compared to all existing zerobit watermarking techniques and paves the way for future blackbox fingerprinting techniques.
References
 [1] L. Deng and D. Yu, “Deep learning: methods and applications,” Foundations and Trends® in Signal Processing, vol. 7, no. 3–4, 2014.
 [2] M. Ribeiro, K. Grolinger, and M. A. Capretz, “Mlaas: Machine learning as a service,” in IEEE 14th International Conference on Machine Learning and Applications (ICMLA), 2015.
 [3] B. Furht and D. Kirovski, Multimedia security handbook. CRC press, 2004.
 [4] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, 1999.
 [5] G. Qu and M. Potkonjak, Intellectual property protection in VLSI designs: theory and practice. Springer Science & Business Media, 2007.
 [6] Y. Uchida, Y. Nagai, S. Sakazawa, and S. Satoh, “Embedding watermarks into deep neural networks,” in Proceedings of the ACM on International Conference on Multimedia Retrieval, 2017.
 [7] E. L. Merrer, P. Perez, and G. Trédan, “Adversarial frontier stitching for remote neural network watermarking,” arXiv preprint arXiv:1711.01894, 2017.
 [8] Y. Adi, C. Baum, M. Cisse, B. Pinkas, and J. Keshet, “Turning your weakness into a strength: Watermarking deep neural networks by backdooring,” Usenix Security Symposium, 2018.
 [9] C.S. Lu, Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Igi Global, 2004.
 [10] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography. Morgan kaufmann, 2007.
 [11] P. Singh and R. Chadha, “A survey of digital watermarking techniques, applications and attacks,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 9, pp. 165–175, 2013.
 [12] B. D. Rouhani, H. Chen, and F. Koushanfar, “Deepsigns: A generic watermarking framework for ip protection of deep learning models,” arXiv preprint arXiv:1804.00750, 2018.
 [13] Y. Adi, C. Baum, M. Cisse, B. Pinkas, and J. Keshet, “Turning your weakness into a strength: Watermarking deep neural networks by backdooring,” arXiv preprint arXiv:1802.04633, 2018.
 [14] J. Zhang, Z. Gu, J. Jang, H. Wu, M. P. Stoecklin, H. Huang, and I. Molloy, “Protecting intellectual property of deep neural networks with watermarking,” in Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM, 2018, pp. 159–172.
 [15] A. Choromanska, M. Henaff, M. Mathieu, G. B. Arous, and Y. LeCun, “The loss surfaces of multilayer networks,” in Artificial Intelligence and Statistics, 2015.
 [16] B. D. Rouhani, A. Mirhoseini, and F. Koushanfar, “Deep3: Leveraging three levels of parallelism for efficient deep learning,” in Proceedings of ACM 54th Annual Design Automation Conference (DAC), 2017.
 [17] B. D. Rouhani, M. Samragh, M. Javaheripi, T. Javidi, and F. Koushanfar, “Deepfense: Online accelerated defense against adversarial deep learning,” in International Conference on Computer Aided Design. IEEE/ACM, 2018.
 [18] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks with momentum,” arXiv preprint, 2018.
 [19] N. Papernot, P. McDaniel, and I. Goodfellow, “Transferability in machine learning: from phenomena to blackbox attacks using adversarial samples,” arXiv preprint arXiv:1605.07277, 2016.
 [20] N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami, “Practical blackbox attacks against machine learning,” in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017, pp. 506–519.
 [21] A. Kurakin, I. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” arXiv preprint arXiv:1607.02533, 2016.
 [22] S. Zagoruyko and N. Komodakis, “Wide residual networks,” arXiv preprint arXiv:1605.07146, 2016.

[23]
A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in
Advances in neural information processing systems, 2012, pp. 1097–1105. 
[24]
Y. LeCun, C. Cortes, and C. J. Burges, “The mnist database of handwritten digits,” 1998.
 [25] A. Krizhevsky and G. Hinton, “Learning multiple layers of features from tiny images,” 2009.
 [26] J. Deng, W. Dong, R. Socher, L.J. Li, K. Li, and L. FeiFei, “ImageNet: A LargeScale Hierarchical Image Database,” in CVPR09, 2009.
 [27] I. Goodfellow, Y. Bengio, and A. Courville, Deep learning. MIT press Cambridge, 2016, vol. 1.
 [28] S. Han, J. Pool, J. Tran, and W. Dally, “Learning both weights and connections for efficient neural network,” in Advances in Neural Information Processing Systems (NIPS), 2015.
 [29] K. Simonyan and A. Zisserman, “Very deep convolutional networks for largescale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
 [30] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models resistant to adversarial attacks,” arXiv preprint arXiv:1706.06083, 2017.
 [31] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “The limitations of deep learning in adversarial settings,” in Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 2016, pp. 372–387.
 [32] N. Carlini and D. Wagner, “Towards evaluating the robustness of neural networks,” in 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017, pp. 39–57.
 [33] E. T. Jaynes, “Information theory and statistical mechanics,” Physical review, vol. 106, no. 4, p. 620, 1957.
 [34] H. Chen, B. D. Rohani, and F. Koushanfar, “Deepmarks: A digital fingerprinting framework for deep neural networks,” arXiv preprint arXiv:1804.03648, 2018.
Comments
There are no comments yet.