SWIFT: Semantic Watermarking for Image Forgery Thwarting
- URL: http://arxiv.org/abs/2407.18995v1
- Date: Fri, 26 Jul 2024 09:50:13 GMT
- Title: SWIFT: Semantic Watermarking for Image Forgery Thwarting
- Authors: Gautier Evennou, Vivien Chappelier, Ewa Kijak, Teddy Furon,
- Abstract summary: We modify the HiDDeN deep-learning watermarking architecture to embed and extract high-dimensional real vectors representing image captions.
Our method improves significantly on both malign and benign edits.
- Score: 12.515429388063534
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: This paper proposes a novel approach towards image authentication and tampering detection by using watermarking as a communication channel for semantic information. We modify the HiDDeN deep-learning watermarking architecture to embed and extract high-dimensional real vectors representing image captions. Our method improves significantly robustness on both malign and benign edits. We also introduce a local confidence metric correlated with Message Recovery Rate, enhancing the method's practical applicability. This approach bridges the gap between traditional watermarking and passive forensic methods, offering a robust solution for image integrity verification.
Related papers
- JIGMARK: A Black-Box Approach for Enhancing Image Watermarks against Diffusion Model Edits [76.25962336540226]
JIGMARK is a first-of-its-kind watermarking technique that enhances robustness through contrastive learning.
Our evaluation reveals that JIGMARK significantly surpasses existing watermarking solutions in resilience to diffusion-model edits.
arXiv Detail & Related papers (2024-06-06T03:31:41Z) - Deep Learning-based Text-in-Image Watermarking [4.938567115890841]
We introduce a novel deep learning-based approach to text-in-image watermarking.
Our method embeds and extracts textual information within images to enhance data security and integrity.
arXiv Detail & Related papers (2024-04-19T18:52:07Z) - RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees [33.61946642460661]
This paper introduces a robust and agile watermark detection framework, dubbed as RAW.
We employ a classifier that is jointly trained with the watermark to detect the presence of the watermark.
We show that the framework provides provable guarantees regarding the false positive rate for misclassifying a watermarked image.
arXiv Detail & Related papers (2024-01-23T22:00:49Z) - Robust Image Watermarking based on Cross-Attention and Invariant Domain
Learning [1.6589012298747952]
This paper explores a robust image watermarking methodology by harnessing cross-attention and invariant domain learning.
We design a watermark embedding technique utilizing a multi-head cross attention mechanism, enabling information exchange between the cover image and watermark.
Second, we advocate for learning an invariant domain representation that encapsulates both semantic and noise-invariant information concerning the watermark.
arXiv Detail & Related papers (2023-10-09T04:19:27Z) - FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models [64.89896692649589]
We propose FT-Shield, a watermarking solution tailored for the fine-tuning of text-to-image diffusion models.
FT-Shield addresses copyright protection challenges by designing new watermark generation and detection strategies.
arXiv Detail & Related papers (2023-10-03T19:50:08Z) - T2IW: Joint Text to Image & Watermark Generation [74.20148555503127]
We introduce a novel task for the joint generation of text to image and watermark (T2IW)
This T2IW scheme ensures minimal damage to image quality when generating a compound image by forcing the semantic feature and the watermark signal to be compatible in pixels.
We demonstrate remarkable achievements in image quality, watermark invisibility, and watermark robustness, supported by our proposed set of evaluation metrics.
arXiv Detail & Related papers (2023-09-07T16:12:06Z) - WMFormer++: Nested Transformer for Visible Watermark Removal via Implict
Joint Learning [68.00975867932331]
Existing watermark removal methods mainly rely on UNet with task-specific decoder branches.
We introduce an implicit joint learning paradigm to holistically integrate information from both branches.
The results demonstrate our approach's remarkable superiority, surpassing existing state-of-the-art methods by a large margin.
arXiv Detail & Related papers (2023-08-20T07:56:34Z) - Watermarking Images in Self-Supervised Latent Spaces [75.99287942537138]
We revisit watermarking techniques based on pre-trained deep networks, in the light of self-supervised approaches.
We present a way to embed both marks and binary messages into their latent spaces, leveraging data augmentation at marking time.
arXiv Detail & Related papers (2021-12-17T15:52:46Z) - Exploring Structure Consistency for Deep Model Watermarking [122.38456787761497]
The intellectual property (IP) of Deep neural networks (DNNs) can be easily stolen'' by surrogate model attack.
We propose a new watermarking methodology, namely structure consistency'', based on which a new deep structure-aligned model watermarking algorithm is designed.
arXiv Detail & Related papers (2021-08-05T04:27:15Z) - Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation
with Secret Key [15.483078145498085]
The proposed method embeds a watermark pattern in a model by using learnable transformed images.
It is piracy-resistant, so the original watermark cannot be overwritten by a pirated watermark.
The results show that it was resilient against fine-tuning and pruning attacks while maintaining a high watermark-detection accuracy.
arXiv Detail & Related papers (2021-04-09T08:21:53Z) - Robust watermarking with double detector-discriminator approach [0.5330240017302621]
We present a novel deep framework for a watermarking - a technique of embedding a transparent message into an image in a way that allows retrieving the message from a copy.
Our framework outperforms recent methods in the context of robustness against spectrum of attacks.
We also present our double detector-discriminator approach - a scheme to detect and discriminate if the image contains the embedded message or not.
arXiv Detail & Related papers (2020-06-06T17:15:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.