Back to Search Start Over

Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection.

Authors :
Wang, Jinwei
Wang, Haihua
Zhang, Jiawei
Wu, Hao
Luo, Xiangyang
Ma, Bin
Source :
ACM Transactions on Multimedia Computing, Communications & Applications; Feb2025, Vol. 21 Issue 2, p1-22, 22p
Publication Year :
2025

Abstract

Invisible watermarking can be used as an important tool for copyright certification in the Metaverse. However, with the advent of deep learning, Deep Neural Networks (DNNs) have posed new threats to this technique. For example, artificially trained DNNs can perform unauthorized content analysis and achieve illegal access to protected images. Furthermore, some specially crafted DNNs may even erase invisible watermarks embedded within the protected images, which eventually leads to the collapse of this protection and certification mechanism. To address these issues, inspired by the adversarial attack, we introduce Invisible Adversarial Watermarking (IAW), a novel security mechanism to enhance the copyright protection efficacy of watermarks. Specifically, we design an Adversarial Watermarking Fusion Model (AWFM) to efficiently generate Invisible Adversarial Watermark Images (IAWIs). By modeling the embedding of watermarks and adversarial perturbations as a unified task, the generated IAWIs can effectively defend against unauthorized identification, access, and erase via DNNs and identify the ownership by extracting the embedded watermark. Experimental results show that the proposed IAW presents superior extraction accuracy, attack ability, and robustness on different DNNs, and the protected images maintain good visual quality, which ensures its effectiveness as an image protection mechanism. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15516857
Volume :
21
Issue :
2
Database :
Complementary Index
Journal :
ACM Transactions on Multimedia Computing, Communications & Applications
Publication Type :
Academic Journal
Accession number :
182882179
Full Text :
https://doi.org/10.1145/3652608