Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
 
Loading...
Thumbnail Image
conference paper

TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding

Pagnotta, Giulio
•
Hitaj, Dorjan
•
Hitaj, Briland
Show more
2024
Proceedings - Annual Computer Security Applications Conference, ACSAC
40 Computer Security Applications Conference

Deep Neural Networks (DNNs) trained on proprietary company data offer a competitive edge for the owning entity. However, these models can be attractive to competitors (or malicious entities), who can copy or clone these proprietary DNN models to use them to their advantage. Since these attacks are hard to prevent, it becomes imperative to have mechanisms in place that enable an affected entity to verify the ownership of its DNN models with very high confidence. Watermarking of deep neural networks has gained significant traction in recent years, with numerous (watermarking) strategies being proposed as mechanisms that can help verify the ownership of a DNN in scenarios where these models are obtained without the owner’s permission. However, a growing body of work has demonstrated that existing watermarking mechanisms are highly susceptible to removal techniques, such as fine-tuning, parameter pruning, or shuffling. In this paper, we build upon extensive prior work on covert (military) communication and propose TATTOOED, a novel DNN watermarking technique that is robust to existing threats. We demonstrate that using TATTOOED as their watermarking mechanism, the DNN owner can successfully obtain the watermark and verify model ownership even in scenarios where 99% of model parameters are altered. Furthermore, we show that TATTOOED is easy to employ in training pipelines and has negligible impact on model performance.

  • Details
  • Metrics
Type
conference paper
DOI
10.1109/ACSAC63791.2024.00099
Scopus ID

2-s2.0-105001384742

Author(s)
Pagnotta, Giulio
•
Hitaj, Dorjan
•
Hitaj, Briland
•
Perez-Cruz, Fernando  
•
Mancini, Luigi V.
Date Issued

2024

Publisher

Association for Computing Machinery

Journal
Proceedings - Annual Computer Security Applications Conference, ACSAC
ISBN of the book

9798331520885

Start page

1245

End page

1258

Subjects

DNN watermarking

•

IP protection

Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
EPFL  
Event nameEvent acronymEvent placeEvent date
40 Computer Security Applications Conference

ACSAC 2024

Honolulu, United States

2024-12-09 - 2024-12-13

FunderFunding(s)Grant NumberGrant URL

European Union’s Horizon 2020 research and innovation programme

SERICS

PE00000014

European Union

101000427

Show more
Available on Infoscience
May 5, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/249724
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés