Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (2): 1-14.doi: 10.11959/j.issn.2096-109x.2022015

• Comprehensive Review •     Next Articles

Survey on intellectual property protection for deep learning model

Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG   

  1. School of Electronic Information, Wuhan University, Wuhan 430072, China
  • Revised:2022-01-05 Online:2022-04-15 Published:2022-04-01
  • Supported by:
    The National Natural Science Foundation of China(61802284);The National Natural Science Foundation of China Enterprise Innovation Development Key Project(U19B2004);The Special Fund for Science and Technology of Guang-dong Province(2019SDR002)

Abstract:

With the rapid development of deep learning technology, deep learning models have been widely used in many fields such as image classification and speech recognition.Training a deep learning model relies on a large amount of data and computing power, thus selling the trained model or providing specific services (DLaaS, e.g.) has become a new business.However, the commercial interests of model trainers and the intellectual property rights of model developers may be violated if the model is maliciously stolen.With deep neural network watermarking becoming a new research topic, multimedia copyright protection techniques were used for deep learning model protection.Numerous methods have been proposed in this field and then a comprehensive survey is needed.the existing deep neural network watermarking methods were elaborated and summarized and the future research directions of this field were discussed.The overall framework of neural network watermarking was presented, whereby the basic concepts such as classification model and model backdoor were introduced.Secondly, the existing methods were divided into two types according to the mechanism of watermark embedding, one is to embed the watermark bits into the carrier of internal information of the network, and the other one uses the established backdoor mapping as the watermark.These two existing deep neural network watermarking methods were analyzed and summarized, and attacks to the watermarks were also introduced and discussed.By analyzing the white-box and black-box conditions in watermarking scenario, it comes to the conclusion that the model is difficult to be effectively protected when it is distributed in the white-box manner, and the neural network watermark defenses in the black-box distribution and black-box verification are both worthy for further research.

Key words: neural network security, copy right protection of neural networks, black-box watermarking, white-box watermarking, backdoor watermarking

CLC Number: 

No Suggested Reading articles found!