Nothing Special   »   [go: up one dir, main page]

Lounici et al., 2021 - Google Patents

Yes we can: watermarking machine learning models beyond classification

Lounici et al., 2021

View PDF
Document ID
631882892588331737
Author
Lounici S
Njeh M
Ermis O
Önen M
Trabelsi S
Publication year
Publication venue
2021 IEEE 34th Computer Security Foundations Symposium (CSF)

External Links

Snippet

Since machine learning models have become a valuable asset for companies, watermarking techniques have been developed to protect the intellectual property of these models and prevent model theft. We observe that current watermarking frameworks solely …
Continue reading at www.ieee-security.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K2209/00Indexing scheme relating to methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Lounici et al. Yes we can: watermarking machine learning models beyond classification
Hitaj et al. Have you stolen my model? evasion attacks against deep neural network watermarking techniques
Wang et al. Amora: Black-box adversarial morphing attack
CN110222573B (en) Face recognition method, device, computer equipment and storage medium
Pasquet et al. Steganalysis with cover-source mismatch and a small learning database
Samanta et al. Analysis of perceptual hashing algorithms in image manipulation detection
CN111260620B (en) Image anomaly detection method and device and electronic equipment
Goh et al. A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection
Choudhary et al. Signature Recognition & Verification System Using Back Propagation Neural Network
Zhu et al. Fragile neural network watermarking with trigger image set
WO2023093346A1 (en) Exogenous feature-based model ownership verification method and apparatus
Zhu et al. Deepfake detection with clustering-based embedding regularization
Mazumdar et al. Universal image manipulation detection using deep siamese convolutional neural network
EP3948597A2 (en) Learned forensic source system for identification of image capture device models and forensic similarity of digital images
CN114548274A (en) Multi-modal interaction-based rumor detection method and system
Nadimpalli et al. Proactive deepfake detection using gan-based visible watermarking
Nowroozi et al. Detecting high-quality GAN-generated face images using neural networks
Hu et al. Learning-based image steganography and watermarking: A survey
Wang et al. ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction
Sofiane et al. Yes we can: Watermarking machine learning models beyond classification
CN113222480A (en) Training method and device for confrontation sample generation model
Khoshavi et al. Entropy-based modeling for estimating adversarial bit-flip attack impact on binarized neural network
Wyzykowski et al. A Universal Latent Fingerprint Enhancer Using Transformers
JP2023526809A (en) A method for safely using a first neural network on input data and a method for learning parameters of a second neural network
Du et al. DetectS ec: Evaluating the robustness of object detection models to adversarial attacks