Md. Ishfaque Ahmed , Kedar Nath Singh , Himanshu Kumar Singh , Amit Kumar Singh , Amrit Kumar Agrawal
{"title":"Ownership protection of deep learning models using watermarking","authors":"Md. Ishfaque Ahmed , Kedar Nath Singh , Himanshu Kumar Singh , Amit Kumar Singh , Amrit Kumar Agrawal","doi":"10.1016/j.compeleceng.2025.110481","DOIUrl":null,"url":null,"abstract":"<div><div>Deep learning (DL) models have achieved remarkable success in the multimedia domain. However, the potential misuse of these powerful models poses significant challenges in many security-sensitive domains. To address this issue, digital watermarking schemes have emerged, aiming to embed watermark information into DL models to prove copyright ownership. In this paper, we propose a copyright protection scheme for DL models to resolve ownership conflicts and enhance overall system security. Initially, we generate two different watermarks using chaotic and Gold sequences. The generated watermarks are then embedded into selected layers of the DL model using redundant discrete wavelet transform and singular value decomposition. After the watermarking process, we shuffle the model’s weights before sharing it with a third party. On the receiver’s side, the inverse of the embedding process, followed by watermark verification, ensures secure access to authentic and unaltered model data. Ownership analysis shows that the proposed scheme is robust against pruning and fine-tuning attacks. Experimental results further validate the effectiveness of the proposed scheme compared to other competitive approaches.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"125 ","pages":"Article 110481"},"PeriodicalIF":4.0000,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625004240","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Deep learning (DL) models have achieved remarkable success in the multimedia domain. However, the potential misuse of these powerful models poses significant challenges in many security-sensitive domains. To address this issue, digital watermarking schemes have emerged, aiming to embed watermark information into DL models to prove copyright ownership. In this paper, we propose a copyright protection scheme for DL models to resolve ownership conflicts and enhance overall system security. Initially, we generate two different watermarks using chaotic and Gold sequences. The generated watermarks are then embedded into selected layers of the DL model using redundant discrete wavelet transform and singular value decomposition. After the watermarking process, we shuffle the model’s weights before sharing it with a third party. On the receiver’s side, the inverse of the embedding process, followed by watermark verification, ensures secure access to authentic and unaltered model data. Ownership analysis shows that the proposed scheme is robust against pruning and fine-tuning attacks. Experimental results further validate the effectiveness of the proposed scheme compared to other competitive approaches.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.