ROSE: A RObust and SEcure DNN Watermarking

06/22/2022
by   Kassem Kallas, et al.
0

Protecting the Intellectual Property rights of DNN models is of primary importance prior to their deployment. So far, the proposed methods either necessitate changes to internal model parameters or the machine learning pipeline, or they fail to meet both the security and robustness requirements. This paper proposes a lightweight, robust, and secure black-box DNN watermarking protocol that takes advantage of cryptographic one-way functions as well as the injection of in-task key image-label pairs during the training process. These pairs are later used to prove DNN model ownership during testing. The main feature is that the value of the proof and its security are measurable. The extensive experiments watermarking image classification models for various datasets as well as exposing them to a variety of attacks, show that it provides protection while maintaining an adequate level of security and robustness.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/06/2022

Mixer: DNN Watermarking using Image Mixup

It is crucial to protect the intellectual property rights of DNN models ...
research
04/25/2023

Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks

Reducing the memory footprint of Machine Learning (ML) models, particula...
research
06/11/2019

Evolutionary Trigger Set Generation for DNN Black-Box Watermarking

The commercialization of deep learning creates a compelling need for int...
research
08/03/2018

Enabling Trust in Deep Learning Models: A Digital Forensics Case Study

Today, the volume of evidence collected per case is growing exponentiall...
research
06/06/2022

PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN Model

Deep neural networks (DNNs) have achieved tremendous success in artifici...
research
04/09/2022

Knowledge-Free Black-Box Watermark and Ownership Proof for Image Classification Neural Networks

Watermarking has become a plausible candidate for ownership verification...
research
10/03/2017

On Secure and Usable Program Obfuscation: A Survey

Program obfuscation is a widely employed approach for software intellect...

Please sign up or login with your details

Forgot password? Click here to reset