{"title":"LOCKEY:模型认证和深度伪造追踪的新方法","authors":"Mayank Kumar Singh, Naoya Takahashi, Wei-Hsiang Liao, Yuki Mitsufuji","doi":"arxiv-2409.07743","DOIUrl":null,"url":null,"abstract":"This paper presents a novel approach to deter unauthorized deepfakes and\nenable user tracking in generative models, even when the user has full access\nto the model parameters, by integrating key-based model authentication with\nwatermarking techniques. Our method involves providing users with model\nparameters accompanied by a unique, user-specific key. During inference, the\nmodel is conditioned upon the key along with the standard input. A valid key\nresults in the expected output, while an invalid key triggers a degraded\noutput, thereby enforcing key-based model authentication. For user tracking,\nthe model embeds the user's unique key as a watermark within the generated\ncontent, facilitating the identification of the user's ID. We demonstrate the\neffectiveness of our approach on two types of models, audio codecs and\nvocoders, utilizing the SilentCipher watermarking method. Additionally, we\nassess the robustness of the embedded watermarks against various distortions,\nvalidating their reliability in various scenarios.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking\",\"authors\":\"Mayank Kumar Singh, Naoya Takahashi, Wei-Hsiang Liao, Yuki Mitsufuji\",\"doi\":\"arxiv-2409.07743\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a novel approach to deter unauthorized deepfakes and\\nenable user tracking in generative models, even when the user has full access\\nto the model parameters, by integrating key-based model authentication with\\nwatermarking techniques. Our method involves providing users with model\\nparameters accompanied by a unique, user-specific key. During inference, the\\nmodel is conditioned upon the key along with the standard input. A valid key\\nresults in the expected output, while an invalid key triggers a degraded\\noutput, thereby enforcing key-based model authentication. For user tracking,\\nthe model embeds the user's unique key as a watermark within the generated\\ncontent, facilitating the identification of the user's ID. We demonstrate the\\neffectiveness of our approach on two types of models, audio codecs and\\nvocoders, utilizing the SilentCipher watermarking method. Additionally, we\\nassess the robustness of the embedded watermarks against various distortions,\\nvalidating their reliability in various scenarios.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.07743\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking
This paper presents a novel approach to deter unauthorized deepfakes and
enable user tracking in generative models, even when the user has full access
to the model parameters, by integrating key-based model authentication with
watermarking techniques. Our method involves providing users with model
parameters accompanied by a unique, user-specific key. During inference, the
model is conditioned upon the key along with the standard input. A valid key
results in the expected output, while an invalid key triggers a degraded
output, thereby enforcing key-based model authentication. For user tracking,
the model embeds the user's unique key as a watermark within the generated
content, facilitating the identification of the user's ID. We demonstrate the
effectiveness of our approach on two types of models, audio codecs and
vocoders, utilizing the SilentCipher watermarking method. Additionally, we
assess the robustness of the embedded watermarks against various distortions,
validating their reliability in various scenarios.