Lounici et al., 2021 - Google Patents
Yes we can: watermarking machine learning models beyond classificationLounici et al., 2021
View PDF- Document ID
- 631882892588331737
- Author
- Lounici S
- Njeh M
- Ermis O
- Önen M
- Trabelsi S
- Publication year
- Publication venue
- 2021 IEEE 34th Computer Security Foundations Symposium (CSF)
External Links
Snippet
Since machine learning models have become a valuable asset for companies, watermarking techniques have been developed to protect the intellectual property of these models and prevent model theft. We observe that current watermarking frameworks solely …
- 238000010801 machine learning 0 title abstract description 56
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K2209/00—Indexing scheme relating to methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lounici et al. | Yes we can: watermarking machine learning models beyond classification | |
Hitaj et al. | Have you stolen my model? evasion attacks against deep neural network watermarking techniques | |
Wang et al. | Amora: Black-box adversarial morphing attack | |
CN110222573B (en) | Face recognition method, device, computer equipment and storage medium | |
Pasquet et al. | Steganalysis with cover-source mismatch and a small learning database | |
Samanta et al. | Analysis of perceptual hashing algorithms in image manipulation detection | |
CN111260620B (en) | Image anomaly detection method and device and electronic equipment | |
Goh et al. | A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection | |
Choudhary et al. | Signature Recognition & Verification System Using Back Propagation Neural Network | |
Zhu et al. | Fragile neural network watermarking with trigger image set | |
WO2023093346A1 (en) | Exogenous feature-based model ownership verification method and apparatus | |
Zhu et al. | Deepfake detection with clustering-based embedding regularization | |
Mazumdar et al. | Universal image manipulation detection using deep siamese convolutional neural network | |
EP3948597A2 (en) | Learned forensic source system for identification of image capture device models and forensic similarity of digital images | |
CN114548274A (en) | Multi-modal interaction-based rumor detection method and system | |
Nadimpalli et al. | Proactive deepfake detection using gan-based visible watermarking | |
Nowroozi et al. | Detecting high-quality GAN-generated face images using neural networks | |
Hu et al. | Learning-based image steganography and watermarking: A survey | |
Wang et al. | ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction | |
Sofiane et al. | Yes we can: Watermarking machine learning models beyond classification | |
CN113222480A (en) | Training method and device for confrontation sample generation model | |
Khoshavi et al. | Entropy-based modeling for estimating adversarial bit-flip attack impact on binarized neural network | |
Wyzykowski et al. | A Universal Latent Fingerprint Enhancer Using Transformers | |
JP2023526809A (en) | A method for safely using a first neural network on input data and a method for learning parameters of a second neural network | |
Du et al. | DetectS ec: Evaluating the robustness of object detection models to adversarial attacks |