Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust (2305.20030v3)
Abstract: Watermarking the outputs of generative models is a crucial technique for tracing copyright and preventing potential harm from AI-generated content. In this paper, we introduce a novel technique called Tree-Ring Watermarking that robustly fingerprints diffusion model outputs. Unlike existing methods that perform post-hoc modifications to images after sampling, Tree-Ring Watermarking subtly influences the entire sampling process, resulting in a model fingerprint that is invisible to humans. The watermark embeds a pattern into the initial noise vector used for sampling. These patterns are structured in Fourier space so that they are invariant to convolutions, crops, dilations, flips, and rotations. After image generation, the watermark signal is detected by inverting the diffusion process to retrieve the noise vector, which is then checked for the embedded signal. We demonstrate that this technique can be easily applied to arbitrary diffusion models, including text-conditioned Stable Diffusion, as a plug-in with negligible loss in FID. Our watermark is semantically hidden in the image space and is far more robust than watermarking alternatives that are currently deployed. Code is available at https://github.com/YuxinWenRick/tree-ring-watermark.
- Ali Al-Haj. Combined DWT-DCT Digital Image Watermarking. Journal of Computer Science, 3(9):740–746, September 2007. ISSN 15493636. doi: 10.3844/jcssp.2007.740.746. URL http://www.thescipub.com/abstract/?doi=jcssp.2007.740.746.
- Certified Neural Network Watermarks with Randomized Smoothing. In Proceedings of the 39th International Conference on Machine Learning, pages 1450–1465. PMLR, June 2022. URL https://proceedings.mlr.press/v162/bansal22a.html.
- On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, FAccT ’21, pages 610–623, New York, NY, USA, March 2021. Association for Computing Machinery. ISBN 978-1-4503-8309-7. doi: 10.1145/3442188.3445922. URL https://doi.org/10.1145/3442188.3445922.
- Francis Morgan Boland. Watermarking digital images for copyright protection. 1996. URL http://www.tara.tcd.ie/handle/2262/19682.
- SVD-based digital image watermarking scheme. Pattern Recognition Letters, 26(10):1577–1586, July 2005. ISSN 0167-8655. doi: 10.1016/j.patrec.2005.01.004. URL https://www.sciencedirect.com/science/article/pii/S0167865505000140.
- Reproducible scaling laws for contrastive language-image learning. ArXiv, abs/2212.07143, 2022.
- Secure spread spectrum watermarking for images, audio and video. Proceedings of 3rd IEEE International Conference on Image Processing, 3:243–246, 1996. doi: 10.1109/ICIP.1996.560429. URL http://ieeexplore.ieee.org/document/560429/.
- Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2 edition, 2007. ISBN 9780080555805.
- Imagenet: A large-scale hierarchical image database. In 2009 IEEE Conference on Computer Vision and Pattern Recognition, pages 248–255, 2009. doi: 10.1109/CVPR.2009.5206848.
- Diffusion Models Beat GANs on Image Synthesis. arxiv:2105.05233[cs, stat], June 2021. doi: 10.48550/arXiv.2105.05233. URL http://arxiv.org/abs/2105.05233.
- Supervised GAN Watermarking for Intellectual Property Protection. arxiv:2209.03466[cs], September 2022. doi: 10.48550/arXiv.2209.03466. URL http://arxiv.org/abs/2209.03466.
- The Stable Signature: Rooting Watermarks in Latent Diffusion Models. arxiv:2303.15435[cs], March 2023. doi: 10.48550/arXiv.2303.15435. URL http://arxiv.org/abs/2303.15435.
- Paul Glasserman. Monte Carlo Methods in Financial Engineering, volume 53 of Stochastic Modelling and Applied Probability. Springer, New York, NY, 2003. ISBN 978-1-4419-1822-2 978-0-387-21617-1. doi: 10.1007/978-0-387-21617-1. URL http://link.springer.com/10.1007/978-0-387-21617-1.
- Generative adversarial nets. In Z. Ghahramani, M. Welling, C. Cortes, N. Lawrence, and K.Q. Weinberger, editors, Advances in Neural Information Processing Systems, volume 27. Curran Associates, Inc., 2014. URL https://proceedings.neurips.cc/paper_files/paper/2014/file/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf.
- The Ethical Need for Watermarks in Machine-Generated Language. arxiv:2209.03118[cs], September 2022. doi: 10.48550/arXiv.2209.03118. URL http://arxiv.org/abs/2209.03118.
- Generating steganographic images via adversarial training. In Advances in Neural Information Processing Systems, volume 30. Curran Associates, Inc., 2017. URL https://papers.nips.cc/paper_files/paper/2017/hash/fe2d010308a6b3799a3d9c728ee74244-Abstract.html.
- Gans trained by a two time-scale update rule converge to a local nash equilibrium. In NIPS, 2017.
- Denoising Diffusion Probabilistic Models. In Advances in Neural Information Processing Systems, volume 33, pages 6840–6851. Curran Associates, Inc., 2020. URL https://proceedings.neurips.cc/paper/2020/hash/4c5bcfec8584af0d967f1ab10179ca4b-Abstract.html.
- A Watermark for Large Language Models. arxiv:2301.10226[cs], January 2023. doi: 10.48550/arXiv.2301.10226. URL http://arxiv.org/abs/2301.10226.
- Martin Kutter and Fabien A. P. Petitcolas. Fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents, volume 3657, pages 226–239. SPIE, April 1999. doi: 10.1117/12.344672. URL https://www.spiedigitallibrary.org/conference-proceedings-of-spie/3657/0000/Fair-benchmark-for-image-watermarking-systems/10.1117/12.344672.full.
- Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Processing Magazine, 17(5):20–46, September 2000. ISSN 1558-0792. doi: 10.1109/79.879337.
- Microsoft coco: Common objects in context. In European Conference on Computer Vision, 2014.
- An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain. IEEE Access, 7:80849–80860, 2019. ISSN 2169-3536. doi: 10.1109/ACCESS.2019.2915596.
- Improved Denoising Diffusion Probabilistic Models. arxiv:2102.09672[cs, stat], February 2021. doi: 10.48550/arXiv.2102.09672. URL http://arxiv.org/abs/2102.09672.
- J.J.K. O’Ruanaidh and T. Pun. Rotation, scale and translation invariant digital image watermarking. In Proceedings of International Conference on Image Processing, volume 1, pages 536–539 vol.1, October 1997. doi: 10.1109/ICIP.1997.647968.
- P. B. Patnaik. The Non-Central X𝑋Xitalic_X2- and F-Distribution and their Applications. Biometrika, 36(1/2):202–232, 1949. ISSN 0006-3444. doi: 10.2307/2332542. URL https://www.jstor.org/stable/2332542.
- I. Pitas. A method for watermark casting on digital image. IEEE Transactions on Circuits and Systems for Video Technology, 8(6):775–780, October 1998. ISSN 1558-2205. doi: 10.1109/76.728421.
- Learning transferable visual models from natural language supervision. In International Conference on Machine Learning, 2021.
- High-Resolution Image Synthesis With Latent Diffusion Models. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 10684–10695, 2022. URL https://openaccess.thecvf.com/content/CVPR2022/html/Rombach_High-Resolution_Image_Synthesis_With_Latent_Diffusion_Models_CVPR_2022_paper.html.
- A robust image fingerprinting system using the Radon transform. Signal Processing: Image Communication, 19(4):325–339, April 2004. ISSN 0923-5965. doi: 10.1016/j.image.2003.12.001. URL https://www.sciencedirect.com/science/article/pii/S0923596503001541.
- V. Solachidis and L. Pitas. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transactions on Image Processing, 10(11):1741–1753, November 2001. ISSN 1941-0042. doi: 10.1109/83.967401.
- Generative Modeling by Estimating Gradients of the Data Distribution. arXiv:1907.05600 [cs, stat], October 2019. URL http://arxiv.org/abs/1907.05600.
- Improved Techniques for Training Score-Based Generative Models. arXiv:2006.09011 [cs, stat], June 2020. URL http://arxiv.org/abs/2006.09011.
- Embedding Watermarks into Deep Neural Networks. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, pages 269–277, Bucharest Romania, June 2017. ACM. ISBN 978-1-4503-4701-3. doi: 10.1145/3078971.3078974. URL https://dl.acm.org/doi/10.1145/3078971.3078974.
- EDICT: Exact Diffusion Inversion via Coupled Transformations. arxiv:2211.12446[cs], December 2022. doi: 10.48550/arXiv.2211.12446. URL http://arxiv.org/abs/2211.12446.
- A comprehensive survey on robust image watermarking. Neurocomputing, 488:226–247, June 2022. ISSN 0925-2312. doi: 10.1016/j.neucom.2022.02.083. URL https://www.sciencedirect.com/science/article/pii/S0925231222002533.
- Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data. arxiv:2007.08457[cs], March 2022. doi: 10.48550/arXiv.2007.08457. URL http://arxiv.org/abs/2007.08457.
- Securing deep generative models with universal adversarial signature. arXiv preprint arXiv:2305.16310, 2023.
- Protecting intellectual property of deep neural networks with watermarking. In ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc., May 2018. ISBN 978-1-4503-5576-6. doi: 10.1145/3196494.3196550. URL https://research.ibm.com/publications/protecting-intellectual-property-of-deep-neural-networks-with-watermarking.
- On the Robustness of Diffusion Inversion in Image Manipulation. In ICLR 2023 Workshop on Trustworthy and Reliable Large-Scale Machine Learning Models, April 2023. URL https://openreview.net/forum?id=fr8kurMWJIP.
- Robust Invisible Video Watermarking with Attention. arxiv:1909.01285[cs], September 2019. doi: 10.48550/arXiv.1909.01285. URL http://arxiv.org/abs/1909.01285.
- A Recipe for Watermarking Diffusion Models. arxiv:2303.10137[cs], March 2023. doi: 10.48550/arXiv.2303.10137. URL http://arxiv.org/abs/2303.10137.
- HiDDeN: Hiding Data with Deep Networks. In Proceedings of the European Conference on Computer Vision (ECCV), pages 657–672, 2018. URL https://openaccess.thecvf.com/content_ECCV_2018/html/Jiren_Zhu_HiDDeN_Hiding_Data_ECCV_2018_paper.html.
- Yuxin Wen (33 papers)
- John Kirchenbauer (21 papers)
- Jonas Geiping (73 papers)
- Tom Goldstein (226 papers)