Affiliation:
1. University of Science and Technology of China, Hefei, Anhui, China
2. Simon Fraser University, Burnaby, Canada
3. Microsoft Cloud & AI, Redmond, Washington, USA
4. Wormpex AI Research LLC, WA, USA
Abstract
In recent years, many model intellectual property (IP) proof methods for IP protection have been proposed, such as model watermarking and model fingerprinting. However, with the increasing number of models transmitted and deployed on the Internet, quickly finding the suspect model among thousands of models on model-sharing platforms such as GitHub is in great demand, which concurrently triggers the new security problem of model copy detection for IP protection. As an important part of the model IP protection system, the model copy detection task has not received enough attention. Due to the high computational complexity, both model watermarking and model fingerprinting lack the capability to efficiently find suspected infringing models among tens of millions of models. In this article, inspired by the hash-based image retrieval methods, we introduce a novel model copy detection mechanism: perceptual hashing for convolutional neural networks (CNNs). The proposed perceptual hashing algorithm can convert the weights of CNNs to fixed-length binary hash codes so that the lightly modified version has the similar hash code as the original model. By comparing the similarity of a pair of hash codes between a query model and a test model in the model library, similar versions of a query model can be retrieved efficiently. To the best of our knowledge, this is the first perceptual hashing algorithm for deep neural network models. Specifically, we first select the important model weights based on the model compression theory, then calculate the normal test statistics (NTS) on the segments of important weights, and finally encode the NTS features into hash codes. The experiment performed on a model library containing 3,565 models indicates that our perceptual hashing scheme has a superior copy detection performance.
Funder
Natural Science Foundation of China
Exploration Fund Project of University of Science and Technology of China
Fundamental Research Funds for the Central Universities
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture
Reference63 articles.
1. Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing
2. Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In Proceedings of the USENIX Security Symposium (USENIX Security’18). 1615–1631.
3. NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study
4. Low-Complexity Single-Image Super-Resolution based on Nonnegative Neighbor Embedding
5. Davis Blalock Jose Javier Gonzalez Ortiz Jonathan Frankle and John Guttag. 2020. What is the state of neural network pruning? Proceedings of Machine Learning and Systems 2 (2020) 129–146.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Recoverable Active Protection Framework for Neural Network Models;2023 IEEE International Workshop on Information Forensics and Security (WIFS);2023-12-04
2. Swarm intelligence-based packet scheduling for future intelligent networks;PeerJ Computer Science;2023-11-16
3. Robust Hashing via Global and Local Invariant Features for Image Copy Detection;ACM Transactions on Multimedia Computing, Communications, and Applications;2023-08-24