Finding Needles in a Haystack: A Black-Box Approach to Invisible Watermark Detection

被引:0
|
作者
Pan, Minzhou [1 ,2 ]
Wang, Zhenting [2 ,3 ]
Dong, Xin [2 ]
Sehwag, Vikash [2 ]
Lyu, Lingjuan [2 ]
Lin, Xue [1 ]
机构
[1] Northeastern Univ, Boston, MA 02115 USA
[2] Sony AI, Boston, MA 02129 USA
[3] Rutgers State Univ, New Brunswick, NJ USA
来源
基金
美国国家科学基金会;
关键词
Watermark Detection; Black-box Detection; IP Protection;
D O I
10.1007/978-3-031-73414-4_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose WaterMark Detector (WMD), the first invisible watermark detection method under a black-box and annotation-free setting. WMD is capable of detecting arbitrary watermarks within a given detection dataset using a clean non-watermarked dataset as a reference, without relying on specific decoding methods or prior knowledge of the watermarking techniques. We develop WMD using foundations of offset learning, where a clean non-watermarked dataset enables us to isolate the influence of only watermarked samples in the reference dataset. Our comprehensive evaluations demonstrate the effectiveness of WMD, which significantly outperforms naive detection methods with AUC scores around only 0.5. In contrast, WMD consistently achieves impressive detection AUC scores, surpassing 0.9 in most single-watermark datasets and exceeding 0.7 in more challenging multi-watermark scenarios across diverse datasets and watermarking methods. As invisible watermarks become increasingly prevalent, while specific decoding techniques remain undisclosed, our approach provides a versatile solution and establishes a path toward increasing accountability, transparency, and trust in our digital visual content.
引用
收藏
页码:253 / 270
页数:18
相关论文
共 50 条
  • [31] A New Approach to Black-Box Concurrent Secure Computation
    Garg, Sanjam
    Kiyoshima, Susumu
    Pandey, Omkant
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 566 - 599
  • [32] NARX approach to black-box modeling of circuit elements
    Maio, IA
    Stievano, IS
    Canavero, FG
    ISCAS '98 - PROCEEDINGS OF THE 1998 INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-6, 1998, : B411 - B414
  • [33] An evolutionary approach to black-box optimization on matrix manifolds?
    He, Xiaoyu
    Zhou, Yuren
    Chen, Zefeng
    Jiang, Siyu
    APPLIED SOFT COMPUTING, 2020, 97 (97)
  • [34] Workflow Engine Performance Evaluation by a Black-Box Approach
    Daniel, Florian
    Pozzi, Giuseppe
    Zhang, Ye
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT III, 2011, 253 : 189 - +
  • [35] A black-box approach on assessing the opportunity cost of deforestation
    Dragoi, Marian
    Ciornei, Ioan
    LAND USE POLICY, 2013, 34 : 314 - 320
  • [36] Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
    Suya, Fnu
    Chi, Jianfeng
    Evans, David
    Tian, Yuan
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1327 - 1344
  • [37] UPON OPENING THE BLACK-BOX AND FINDING IT EMPTY - SOCIAL CONSTRUCTIVISM AND THE PHILOSOPHY OF TECHNOLOGY
    WINNER, L
    SCIENCE TECHNOLOGY & HUMAN VALUES, 1993, 18 (03) : 362 - 378
  • [38] Finding Crash-Consistency Bugs with Bounded Black-Box Crash Testing
    Mohan, Jayashree
    Martinez, Ashlie
    Ponnapalli, Soujanya
    Raju, Pandian
    Chidambaram, Vijay
    PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 33 - 50
  • [39] Black-box Detection of Backdoor Attacks with Limited Information and Data
    Dong, Yinpeng
    Yang, Xiao
    Deng, Zhijie
    Pang, Tianyu
    Xiao, Zihao
    Su, Hang
    Zhu, Jun
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 16462 - 16471
  • [40] Application of black-box models to HVAC systems for fault detection
    Peitsman, HC
    Bakker, VE
    ASHRAE TRANSACTIONS 1996, VOL 102, PT 1, 1996, 102 : 628 - 640