Finding Needles in a Haystack: A Black-Box Approach to Invisible Watermark Detection

被引:0
|
作者
Pan, Minzhou [1 ,2 ]
Wang, Zhenting [2 ,3 ]
Dong, Xin [2 ]
Sehwag, Vikash [2 ]
Lyu, Lingjuan [2 ]
Lin, Xue [1 ]
机构
[1] Northeastern Univ, Boston, MA 02115 USA
[2] Sony AI, Boston, MA 02129 USA
[3] Rutgers State Univ, New Brunswick, NJ USA
来源
基金
美国国家科学基金会;
关键词
Watermark Detection; Black-box Detection; IP Protection;
D O I
10.1007/978-3-031-73414-4_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose WaterMark Detector (WMD), the first invisible watermark detection method under a black-box and annotation-free setting. WMD is capable of detecting arbitrary watermarks within a given detection dataset using a clean non-watermarked dataset as a reference, without relying on specific decoding methods or prior knowledge of the watermarking techniques. We develop WMD using foundations of offset learning, where a clean non-watermarked dataset enables us to isolate the influence of only watermarked samples in the reference dataset. Our comprehensive evaluations demonstrate the effectiveness of WMD, which significantly outperforms naive detection methods with AUC scores around only 0.5. In contrast, WMD consistently achieves impressive detection AUC scores, surpassing 0.9 in most single-watermark datasets and exceeding 0.7 in more challenging multi-watermark scenarios across diverse datasets and watermarking methods. As invisible watermarks become increasingly prevalent, while specific decoding techniques remain undisclosed, our approach provides a versatile solution and establishes a path toward increasing accountability, transparency, and trust in our digital visual content.
引用
收藏
页码:253 / 270
页数:18
相关论文
共 50 条
  • [41] Application of black-box models to HVAC systems for fault detection
    TNO Building and Construction, Research, Delft, Netherlands
    ASHRAE Trans, 1 (628-640):
  • [42] Black-box Attacks Against Neural Binary Function Detection
    Bundt, Joshua
    Davinroy, Michael
    Agadakos, Ioannis
    Oprea, Alina
    Robertson, William
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 1 - 16
  • [43] Analyzing and Explaining Black-Box Models for Online Malware Detection
    Manthena, Harikha
    Kimmel, Jeffrey C.
    Abdelsalam, Mahmoud
    Gupta, Maanak
    IEEE ACCESS, 2023, 11 : 25237 - 25252
  • [44] Mumak: Efficient and Black-Box Bug Detection for Persistent Memory
    Goncalves, Joao
    Matos, Miguel
    Rodrigues, Rodrigo
    PROCEEDINGS OF THE EIGHTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS, EUROSYS 2023, 2023, : 734 - 750
  • [45] Spectral Privacy Detection on Black-box Graph Neural Networks
    Yang, Yining
    Lu, Jialiang
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [46] Black-box models for fault detection and performance monitoring of buildings
    Jacob, Dirk
    Dietz, Sebastian
    Komhard, Susanne
    Neumann, Christian
    Herkel, Sebastian
    JOURNAL OF BUILDING PERFORMANCE SIMULATION, 2010, 3 (01) : 53 - 62
  • [47] Black-box Attacks to Log-based Anomaly Detection
    Huang, Shaohan
    Liu, Yi
    Fung, Carol
    Yang, Hailong
    Luan, Zhongzhi
    2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022): INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022, : 310 - 316
  • [48] Black-box adversarial attacks on XSS attack detection model
    Wang, Qiuhua
    Yang, Hui
    Wu, Guohua
    Choo, Kim-Kwang Raymond
    Zhang, Zheng
    Miao, Gongxun
    Ren, Yizhi
    COMPUTERS & SECURITY, 2022, 113
  • [49] Toward Black-Box Detection of Logic Flaws in Web Applications
    Pellegrino, Giancarlo
    Balzarotti, Davide
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [50] Towards Black-Box Anomaly Detection in Virtual Network Functions
    Sauvanaud, Carla
    Lazri, Kahina
    Kaaniche, Mohamed
    Kanoun, Karama
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 254 - 257