Abstract
Background: Face recognition belonging to biometric recognition has great application
value. Its algorithm based on deep learning has been widely used in recent years. Meanwhile,
problems that endanger social privacy and security gradually appear, such as stealing, abusing,
and illegal deploying models.
Objective: The objective of this study is to use chaos to construct a watermark trigger set for protecting
the model's intellectual property rights, thereby enabling the model to resist fine-tuning
and overwriting attacks. When the model is leaked, it can be traced through a special watermark.
Methods: We used the unpredictability and initial value sensitivity of chaos to make the watermark
imperceptible and endow multiple deep learning based face recognition models with special
watermarks.
Results: The face recognition deep learning model embedded watermarks successfully while having
high precision for watermark extraction. Meanwhile, it maintained the original function as
well as features of watermarks. Experimental results and theoretical analysis indicate that the proposed
scheme can resist fine-tuning, overwriting attacks, and trace leaked models.
Conclusion: The proposed scheme improved the model's fidelity, safety, practicality, completeness,
effectiveness, and the ability to resist common attacks based on machine learning. With the
help of special watermarks, related departments can effectively manage face recognition based on
deep learning models.
Keywords:
Deep learning, face recognition, intelligent model protection, chaos theory, Lorenz chaotic system, watermark.
Graphical Abstract
[1]
Jiang, F.L.; Liu, P.C.; Zhou, X.D. A review on face anti-spoofing. Acta Automatica Sinica, 2021, 47(8), 1799-1821.
[2]
Erkin, Z.; Franz, M.; Guajardo, J.; Katzenbeisser, S.; Toft, T. Privacy-preserving face recognition. Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, 2009Seattle, WA, USA, pp. 235-253.
[7]
Liu, S.H.; Yao, H.X.; Gao, W. Neural network based steganalysis in still images. Proceedings of IEEE ICME, 2003, pp. 509-512.
[9]
Adi, Y.; Baum, C.; Cisse, M.; Pinkas, B.; Keshet, J. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. Proceedings of 27th USENIX Security Symposium, August 15-17Baltimore, US2018, pp. 1615-1631.
[13]
Zheng, L. Lorenz, g; Y.H; Yang, Z How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of DNN. Proceedings of the 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico2019, pp. 126-137.
[16]
Zhong, Q.; Zhang, L.Y.; Zhang, J. Protecting IP of deep neural networks with watermarking: A new label helps Pacific-Asia Conference on Knowledge Discovery and Data Mining; Springer: Cham, 2020, pp. 462-474.
[18]
Jambhale, T.; Gaffar, H.A. A Deep learning approach to invisible watermarking for copyright protection. Inventive Communication and Computational Technologies; Springer: Singapore, 2022, pp. 493-503.
[22]
Zhang, Y.P.; Hou, D.M.; Yang, Q.; Zhang, B.Y. Research on image encryption algorithm design based on chaos synchronization technology. Modern Electr. Tech., 2021, 44(19), 39-42.
[23]
He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 770-778.
[26]
Li, W.; Liang, W.J.; Shi, T.; Deng, S.; Yang, J.P. Quick periodic property of Lorenz system measured by wavelet entropy. J. Jinggangshan Univ. Nat. Sci., 2021, 42(4), 71-75.