Towards transformation-resilient provenance detection of digital media
- URL: http://arxiv.org/abs/2011.07355v1
- Date: Sat, 14 Nov 2020 18:08:07 GMT
- Title: Towards transformation-resilient provenance detection of digital media
- Authors: Jamie Hayes, Krishnamurthy (Dj) Dvijotham, Yutian Chen, Sander
Dieleman, Pushmeet Kohli, Norman Casagrande
- Abstract summary: We introduce ReSWAT, a framework for learning transformation-resilient watermark detectors.
Our method can reliably detect the provenance of a signal, even if it has been through several post-processing transformations.
- Score: 38.865642862858195
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Advancements in deep generative models have made it possible to synthesize
images, videos and audio signals that are difficult to distinguish from natural
signals, creating opportunities for potential abuse of these capabilities. This
motivates the problem of tracking the provenance of signals, i.e., being able
to determine the original source of a signal. Watermarking the signal at the
time of signal creation is a potential solution, but current techniques are
brittle and watermark detection mechanisms can easily be bypassed by applying
post-processing transformations (cropping images, shifting pitch in the audio
etc.). In this paper, we introduce ReSWAT (Resilient Signal Watermarking via
Adversarial Training), a framework for learning transformation-resilient
watermark detectors that are able to detect a watermark even after a signal has
been through several post-processing transformations. Our detection method can
be applied to domains with continuous data representations such as images,
videos or sound signals. Experiments on watermarking image and audio signals
show that our method can reliably detect the provenance of a signal, even if it
has been through several post-processing transformations, and improve upon
related work in this setting. Furthermore, we show that for specific kinds of
transformations (perturbations bounded in the L2 norm), we can even get formal
guarantees on the ability of our model to detect the watermark. We provide
qualitative examples of watermarked image and audio samples in
https://drive.google.com/open?id=1-yZ0WIGNu2Iez7UpXBjtjVgZu3jJjFga.
Related papers
- Image Watermarks are Removable Using Controllable Regeneration from Clean Noise [26.09012436917272]
A critical attribute of watermark techniques is their robustness against various manipulations.
We introduce a watermark removal approach capable of effectively nullifying the state of the art watermarking techniques.
arXiv Detail & Related papers (2024-10-07T20:04:29Z) - Trigger-Based Fragile Model Watermarking for Image Transformation Networks [2.38776871944507]
In fragile watermarking, a sensitive watermark is embedded in an object in a manner such that the watermark breaks upon tampering.
We introduce a novel, trigger-based fragile model watermarking system for image transformation/generation networks.
Our approach, distinct from robust watermarking, effectively verifies the model's source and integrity across various datasets and attacks.
arXiv Detail & Related papers (2024-09-28T19:34:55Z) - How to Trace Latent Generative Model Generated Images without Artificial Watermark? [88.04880564539836]
Concerns have arisen regarding potential misuse related to images generated by latent generative models.
We propose a latent inversion based method called LatentTracer to trace the generated images of the inspected model.
Our experiments show that our method can distinguish the images generated by the inspected model and other images with a high accuracy and efficiency.
arXiv Detail & Related papers (2024-05-22T05:33:47Z) - DiffuseTrace: A Transparent and Flexible Watermarking Scheme for Latent Diffusion Model [15.982765272033058]
Latent Diffusion Models (LDMs) enable a wide range of applications but raise ethical concerns regarding illegal utilization.
New technique called DiffuseTrace embeds invisible watermarks in all generated images for future detection semantically.
arXiv Detail & Related papers (2024-05-04T15:32:57Z) - T2IW: Joint Text to Image & Watermark Generation [74.20148555503127]
We introduce a novel task for the joint generation of text to image and watermark (T2IW)
This T2IW scheme ensures minimal damage to image quality when generating a compound image by forcing the semantic feature and the watermark signal to be compatible in pixels.
We demonstrate remarkable achievements in image quality, watermark invisibility, and watermark robustness, supported by our proposed set of evaluation metrics.
arXiv Detail & Related papers (2023-09-07T16:12:06Z) - Tree-Ring Watermarks: Fingerprints for Diffusion Images that are
Invisible and Robust [55.91987293510401]
Watermarking the outputs of generative models is a crucial technique for tracing copyright and preventing potential harm from AI-generated content.
We introduce a novel technique called Tree-Ring Watermarking that robustly fingerprints diffusion model outputs.
Our watermark is semantically hidden in the image space and is far more robust than watermarking alternatives that are currently deployed.
arXiv Detail & Related papers (2023-05-31T17:00:31Z) - A Watermark for Large Language Models [84.95327142027183]
We propose a watermarking framework for proprietary language models.
The watermark can be embedded with negligible impact on text quality.
It can be detected using an efficient open-source algorithm without access to the language model API or parameters.
arXiv Detail & Related papers (2023-01-24T18:52:59Z) - Supervised GAN Watermarking for Intellectual Property Protection [33.827150843939094]
We propose a watermarking method for Generative Adversarial Networks (GANs)
The aim is to watermark the GAN model so that any image generated by the GAN contains an invisible watermark (signature)
Results show that our method can effectively embed an invisible watermark inside the generated images.
arXiv Detail & Related papers (2022-09-07T20:52:05Z) - Watermarking Images in Self-Supervised Latent Spaces [75.99287942537138]
We revisit watermarking techniques based on pre-trained deep networks, in the light of self-supervised approaches.
We present a way to embed both marks and binary messages into their latent spaces, leveraging data augmentation at marking time.
arXiv Detail & Related papers (2021-12-17T15:52:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.