Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes

07/13/2023
by   Elena Rodriguez-Lois, et al.
0

The growing popularity of Deep Neural Networks, which often require computationally expensive training and access to a vast amount of data, calls for accurate authorship verification methods to deter unlawful dissemination of the models and identify the source of the leak. In DNN watermarking the owner may have access to the full network (white-box) or only be able to extract information from its output to queries (black-box), but a watermarked model may include both approaches in order to gather sufficient evidence to then gain access to the network. Although there has been limited research in white-box watermarking that considers traitor tracing, this problem is yet to be explored in the black-box scenario. In this paper, we propose a black-and-white-box watermarking method that opens the door to collusion-resistant traitor tracing in black-box, exploiting the properties of Tardos codes, and making it possible to identify the source of the leak before access to the model is granted. While experimental results show that the method can successfully identify traitors, even when further attacks have been performed, we also discuss its limitations and open problems for traitor tracing in black-box.

READ FULL TEXT
research
11/03/2018

CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network

In this paper, we propose an improvement of Adversarial Transformation N...
research
08/05/2022

FBI: Fingerprinting models with Benign Inputs

Recent advances in the fingerprinting of deep neural networks detect ins...
research
03/21/2022

Integrity Fingerprinting of DNN with Double Black-box Design and Verification

Cloud-enabled Machine Learning as a Service (MLaaS) has shown enormous p...
research
03/05/2019

DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography

Deep Neural Networks (DNNs) has shown great success in various challengi...
research
12/30/2021

Retrieving Black-box Optimal Images from External Databases

Suppose we have a black-box function (e.g., deep neural network) that ta...
research
12/31/2018

Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing

Of coverage-guided fuzzing's three main components: (1) testcase generat...
research
05/06/2019

ConfigCrusher: White-Box Performance Analysis for Configurable Systems

In configurable software systems, stakeholders are often interested in k...

Please sign up or login with your details

Forgot password? Click here to reset