Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication

04/09/2021
by   Xiquan Guan, et al.
14

Deep convolutional neural networks have made outstanding contributions in many fields such as computer vision in the past few years and many researchers published well-trained network for downloading. But recent studies have shown serious concerns about integrity due to model-reuse attacks and backdoor attacks. In order to protect these open-source networks, many algorithms have been proposed such as watermarking. However, these existing algorithms modify the contents of the network permanently and are not suitable for integrity authentication. In this paper, we propose a reversible watermarking algorithm for integrity authentication. Specifically, we present the reversible watermarking problem of deep convolutional neural networks and utilize the pruning theory of model compression technology to construct a host sequence used for embedding watermarking information by histogram shift. As shown in the experiments, the influence of embedding reversible watermarking on the classification performance is less than 0.5 can be fully recovered after extracting the watermarking. At the same time, the integrity of the model can be verified by applying the reversible watermarking: if the model is modified illegally, the authentication information generated by original model will be absolutely different from the extracted watermarking information.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/07/2018

Emerging Applications of Reversible Data Hiding

Reversible data hiding (RDH) is one special type of information hiding, ...
research
02/26/2022

Nonlinear Discrete Optimisation of Reversible Steganographic Coding

Authentication mechanisms are at the forefront of defending the world fr...
research
05/29/2023

Reversible Deep Neural Network Watermarking:Matching the Floating-point Weights

Static deep neural network (DNN) watermarking embeds watermarks into the...
research
11/06/2019

Reversible Adversarial Example based on Reversible Image Transformation

At present there are many companies that take the most advanced Deep Neu...
research
12/23/2019

ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels

Code reuse attacks are still big threats to software and system security...
research
05/30/2022

Integrity Authentication in Tree Models

Tree models are very widely used in practice of machine learning and dat...
research
06/13/2021

Deep Learning for Reversible Steganography: Principles and Insights

Deep-learning–centric reversible steganography has emerged as a promisin...

Please sign up or login with your details

Forgot password? Click here to reset