CycleGANWM: A CycleGAN watermarking method for ownership verification

11/24/2022
by   Dongdong Lin, et al.
0

Due to the proliferation and widespread use of deep neural networks (DNN), their Intellectual Property Rights (IPR) protection has become increasingly important. This paper presents a novel model watermarking method for an unsupervised image-to-image translation (I2IT) networks, named CycleGAN, which leverage the image translation visual quality and watermark embedding. In this method, a watermark decoder is trained initially. Then the decoder is frozen and used to extract the watermark bits when training the CycleGAN watermarking model. The CycleGAN watermarking (CycleGANWM) is trained with specific loss functions and optimized to get a good performance on both I2IT task and watermark embedding. For watermark verification, this work uses statistical significance test to identify the ownership of the model from the extract watermark bits. We evaluate the robustness of the model against image post-processing and improve it by fine-tuning the model with adding data augmentation on the output images before extracting the watermark bits. We also carry out surrogate model attack under black-box access of the model. The experimental results prove that the proposed method is effective and robust to some image post-processing, and it is able to resist surrogate model attack.

READ FULL TEXT

page 1

page 5

page 6

research
06/11/2020

Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks

In this work, we develop efficient disruptions of black-box image transl...
research
03/10/2022

Membership Privacy Protection for Image Translation Models via Adversarial Knowledge Distillation

Image-to-image translation models are shown to be vulnerable to the Memb...
research
11/18/2020

Online Exemplar Fine-Tuning for Image-to-Image Translation

Existing techniques to solve exemplar-based image-to-image translation w...
research
10/06/2021

Attack as the Best Defense: Nullifying Image-to-image Translation GANs via Limit-aware Adversarial Attack

With the successful creation of high-quality image-to-image (Img2Img) tr...
research
08/15/2019

MimickNet, Matching Clinical Post-Processing Under Realistic Black-Box Constraints

Image post-processing is used in clinical-grade ultrasound scanners to i...
research
03/08/2021

Deep Model Intellectual Property Protection via Deep Watermarking

Despite the tremendous success, deep neural networks are exposed to seri...
research
06/06/2022

Robust Image Protection Countering Cropping Manipulation

Image cropping is an inexpensive and effective operation of maliciously ...

Please sign up or login with your details

Forgot password? Click here to reset