Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security 2021
DOI: 10.1145/3437880.3460409
|View full text |Cite
|
Sign up to set email alerts
|

A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…An efficient black-box watermarking should meet several requirements, such as being resistant to model transformations that could lead to watermarks erasure or being clearly tied to owner's identity in order to avoid confusion (Kapusta, Thouvenot, and Bettan 2020). Moreover, their impact on the network performance should be ideally negligible.…”
Section: Relevant Work ML Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…An efficient black-box watermarking should meet several requirements, such as being resistant to model transformations that could lead to watermarks erasure or being clearly tied to owner's identity in order to avoid confusion (Kapusta, Thouvenot, and Bettan 2020). Moreover, their impact on the network performance should be ideally negligible.…”
Section: Relevant Work ML Watermarkingmentioning
confidence: 99%
“…It does not however eliminate totally the risk of sophisticated attacks, where an attacker will use the transferability properties of adversarial attacks to create its counterfeit watermarks in advance. A secure protocol for verification of ML watermarks was proposed in (Kapusta et al 2021). Its first step consists of verification if the claimer of a model has the ability of proving that they possesses both a non-marked model and a watermarked one.…”
Section: The Right Verification Protocolmentioning
confidence: 99%
“…To assess the quality of the trigger (and thus the quality of the watermark), outlier detection attacks [9] are implemented in order to verify if an adversary can detect trigger inputs from legitimate data. Hence, in order to protect watermarked model from outlier detection attacks, several techniques [3,12,15] have been developed to make watermark verification queries in an encrypted fashion using for instance Multi-Party Computation (MPC) or Fully Homomorphic Encryption (FHE).…”
Section: Related Workmentioning
confidence: 99%
“…Methods for neural network watermarking can be divided into white-box [1][2][3][4][5] and black-box [6][7][8][9][10]13] approaches. White-box methods require direct access to the weights of the neural network.…”
Section: Introductionmentioning
confidence: 99%