1,616 research outputs found
Generative Model Watermarking Based on Human Visual System
Intellectual property protection of deep neural networks is receiving
attention from more and more researchers, and the latest research applies model
watermarking to generative models for image processing. However, the existing
watermarking methods designed for generative models do not take into account
the effects of different channels of sample images on watermarking. As a
result, the watermarking performance is still limited. To tackle this problem,
in this paper, we first analyze the effects of embedding watermark information
on different channels. Then, based on the characteristics of human visual
system (HVS), we introduce two HVS-based generative model watermarking methods,
which are realized in RGB color space and YUV color space respectively. In RGB
color space, the watermark is embedded into the R and B channels based on the
fact that HVS is more sensitive to G channel. In YUV color space, the watermark
is embedded into the DCT domain of U and V channels based on the fact that HVS
is more sensitive to brightness changes. Experimental results demonstrate the
effectiveness of the proposed work, which improves the fidelity of the model to
be protected and has good universality compared with previous methods.Comment: https://scholar.google.com/citations?user=IdiF7M0AAAAJ&hl=e
Recommended from our members
Protection of an intrusion detection engine with watermarking in ad hoc networks
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware. Nevertheless, many inherent vulnerabilities exist in mobile ad hoc networks and their applications that affect the security of wireless transactions. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient we need a second line of defense, Intrusion Detection. In this pa-per we present an intrusion detection engine based on neural networks and a protection method based on watermarking techniques. In particular, we exploit information visualization and machine learning techniques in order to achieve intrusion detection and we authenticate the maps produced by the application of the intelligent techniques using a novel combined watermarking embedding method. The performance of the proposed model is evaluated under different traffic conditions, mobility patterns and visualization metrics
- …