Journal on Communications ›› 2022, Vol. 43 ›› Issue (9): 181-193.doi: 10.11959/j.issn.1000-436x.2022184

• Papers • Previous Articles     Next Articles

Copyright protection algorithm based on differential privacy deep fake fingerprint detection model

Chengsheng YUAN1,2, Qiang GUO1,2, Zhangjie FU1,2   

  1. 1 School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
    2 Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
  • Revised:2022-09-08 Online:2022-09-25 Published:2022-09-01
  • Supported by:
    The National Natural Science Foundation of China(62102189);The Natural Science Foundation of Jiangsu Province(BK20200807);The Natural Science Foundation of Jiangsu Province(BK20200039);NUDT Scientific Research Program(JS21-4);Public Welfare Technology and Industry Project of Zhejiang Provincial Science Technology Department(LGF21F020006)

Abstract:

A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.

Key words: copyright protection, adversarial samples, differential privacy, model watermark, fake fingerprint detection

CLC Number: 

No Suggested Reading articles found!