Adversarial watermark: A robust and reliable watermark against removal

被引:0
|
作者
Wang, Jinwei [1 ]
Huang, Wanyun [1 ]
Zhang, Jiawei [1 ]
Luo, Xiangyang [2 ]
Ma, Bin [3 ,4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp & Software, Minist Educ, Nanjing 210044, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhenzhou 450001, Peoples R China
[3] Shandong Prov Key Lab Comp Networks, Jinan 250353, Peoples R China
[4] Qilu Univ Technol, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
Adversarial watermarks; Watermark removal; Adversarial attack; Copyright protection;
D O I
10.1016/j.jisa.2024.103750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital image watermarking used to be an important tool for copyright protection. However, as neural network -based watermark removal methods have been proposed in recent years, the embedded watermark is increasingly easy to be erased, which poses a great threat to copyright protection. To address this issue, we propose an adversarial visible watermark scheme, which combines the visible watermark with the adversarial perturbation. By attacking the watermark removal network, we maximize the resistance of visible watermark against removal while minimizing the visual distortion. To further improve the robustness against various transformations (e.g. cropping, JPEG compression), we employ the region of interest and random pre-processing to embed the adversarial visible watermark. The experimental results show that the proposed scheme can effectively resist the removal of watermarks on different datasets and network structures while having good transferability and robustness, which enables the watermark to continue to be an effective copyright protection method.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [1] Adversarial watermark: A robust and reliable watermark against removal
    Wang, Jinwei
    Huang, Wanyun
    Zhang, Jiawei
    Luo, Xiangyang
    Ma, Bin
    Journal of Information Security and Applications, 2024, 82
  • [2] Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
    Liu, Xinwei
    Liu, Jian
    Bai, Yang
    Gu, Jindong
    Chen, Tao
    Jia, Xiaojun
    Cao, Xiaochun
    COMPUTER VISION - ECCV 2022, PT XIV, 2022, 13674 : 1 - 17
  • [3] Adversarial Attack for Robust Watermark Protection Against Inpainting-based and Blind Watermark Removers
    Lyu, Mingzhi
    Huang, Yi
    Kong, Adams Wai-Kin
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 8396 - 8405
  • [4] Robust Adversarial Watermark Defending Against GAN Synthesization Attack
    Xu, Shengwang
    Qiao, Tong
    Xu, Ming
    Wang, Wei
    Zheng, Ning
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 351 - 355
  • [5] Generative adversarial networks model for visible watermark removal
    Cao, Zhiyi
    Niu, Shaozhang
    Zhang, Jiwei
    Wang, Xinyi
    IET IMAGE PROCESSING, 2019, 13 (10) : 1783 - 1789
  • [6] Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
    Jia, Xiaojun
    Wei, Xingxing
    Cao, Xiaochun
    Han, Xiaoguang
    MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 1579 - 1587
  • [7] Scalable Universal Adversarial Watermark Defending Against Facial Forgery
    Qiao, Tong
    Zhao, Bin
    Shi, Ran
    Han, Meng
    Hassaballah, Mahmoud
    Retraint, Florent
    Luo, Xiangyang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8998 - 9011
  • [8] A robust grayscale watermark algorithm against geometric attacks
    Gao, Guangyong
    Deng, Anyuan
    Zhou, Mingfa
    Gong, Jinlin
    Journal of Computational Information Systems, 2010, 6 (09): : 3117 - 3125
  • [9] Wavelet Audio Watermark Robust Against MPEG Compression
    Artameeyanant, Patcharin
    INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 1375 - 1378
  • [10] Robust Watermark Against Double Attacks of Compression and Cropping
    Takatsuka, Masahiro
    Yutaka, Masaaki Kajihara
    Hirakawa
    Ohzeki, Kazuo
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 200 - 201