Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Attack-Resilient Image Watermarking Using Stable Diffusion (2401.04247v2)

Published 8 Jan 2024 in cs.CV and cs.AI

Abstract: Watermarking images is critical for tracking image provenance and proving ownership. With the advent of generative models, such as stable diffusion, that can create fake but realistic images, watermarking has become particularly important to make human-created images reliably identifiable. Unfortunately, the very same stable diffusion technology can remove watermarks injected using existing methods. To address this problem, we present ZoDiac, which uses a pre-trained stable diffusion model to inject a watermark into the trainable latent space, resulting in watermarks that can be reliably detected in the latent vector even when attacked. We evaluate ZoDiac on three benchmarks, MS-COCO, DiffusionDB, and WikiArt, and find that ZoDiac is robust against state-of-the-art watermark attacks, with a watermark detection rate above 98% and a false positive rate below 6.4%, outperforming state-of-the-art watermarking methods. We hypothesize that the reciprocating denoising process in diffusion models may inherently enhance the robustness of the watermark when faced with strong attacks and validate the hypothesis. Our research demonstrates that stable diffusion is a promising approach to robust watermarking, able to withstand even stable-diffusion--based attack methods. ZoDiac is open-sourced and available at https://github.com/zhanglijun95/ZoDiac.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (51)
  1. Variational image compression with a scale hyperprior. arXiv preprint arXiv:1802.01436, 2018.
  2. Techniques for data hiding. IBM systems journal, 35(3.4):313–336, 1996.
  3. Copy protection for dvd video. Proceedings of the IEEE, 87(7):1267–1276, 1999.
  4. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897–1905, 1998.
  5. Image watermarking using dct domain constraints. In Proceedings of 3rd IEEE International Conference on Image Processing, volume 3, pp.  231–234. IEEE, 1996.
  6. Lsb based steganography with ocr: an intelligent amalgamation. Multimedia tools and applications, 79(17-18):11747–11765, 2020.
  7. Learned image compression with discretized gaussian mixture likelihoods and attention modules. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp.  7939–7948, 2020.
  8. Digital watermarking and steganography. Morgan kaufmann, 2007.
  9. Can invisible watermarks resolve rightful ownerships? In Storage and Retrieval for Image and Video Databases V, volume 3022, pp.  310–321. SPIE, 1997.
  10. Diffusionshield: A watermark for copyright protection against generative diffusion models. arXiv preprint arXiv:2306.04642, 2023.
  11. A loss function for generative neural networks based on watson’s perceptual model. Advances in Neural Information Processing Systems, 33:2051–2061, 2020.
  12. Image denoising by sparse 3-d transform-domain collaborative filtering. IEEE Transactions on image processing, 16(8):2080–2095, 2007.
  13. Diffusion models beat gans on image synthesis. Advances in neural information processing systems, 34:8780–8794, 2021.
  14. Watermarking images in self-supervised latent spaces. In ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.  3054–3058. IEEE, 2022.
  15. The stable signature: Rooting watermarks in latent diffusion models. arXiv preprint arXiv:2303.15435, 2023.
  16. Furon, T. A constructive and unifying framework for zero-bit watermarking. IEEE Transactions on Information Forensics and Security, 2(2):149–163, 2007.
  17. Hosam, O. Attacking image watermarking and steganography-a survey. International Journal of Information Technology and Computer Science, 11(3):23–37, 2019.
  18. Arwgan: Attention-guided robust image watermarking model based on gan. IEEE Transactions on Instrumentation and Measurement, 2023.
  19. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
  20. Digital watermarking using multiresolution wavelet decomposition. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP’98 (Cat. No. 98CH36181), volume 5, pp.  2969–2972. IEEE, 1998.
  21. Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark. Applied Sciences, 10(19):6854, 2020.
  22. Microsoft coco: Common objects in context. In Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, pp.  740–755. Springer, 2014.
  23. Distortion agnostic deep watermarking. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp.  13548–13557, 2020.
  24. Patnaik, P. The non-central χ𝜒\chiitalic_χ 2-and f-distribution and their applications. Biometrika, 36(1/2):202–232, 1949.
  25. Wiki art gallery, inc.: A case for critical thinking. Issues in Accounting Education, 26(3):593–608, 2011.
  26. Hierarchical text-conditional image generation with clip latents. arXiv preprint arXiv:2204.06125, 1(2):3, 2022.
  27. High-resolution image synthesis with latent diffusion models. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp.  10684–10695, 2022.
  28. Photorealistic text-to-image diffusion models with deep language understanding. Advances in Neural Information Processing Systems, 35:36479–36494, 2022.
  29. Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning, pp.  2256–2265. PMLR, 2015.
  30. Circularly symmetric watermark embedding in 2-d dft domain. IEEE transactions on image processing, 10(11):1741–1753, 2001.
  31. Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502, 2020.
  32. Secure image steganography using framelet transform and bidiagonal svd. Multimedia Tools and Applications, 79:1865–1886, 2020.
  33. Stegastamp: Invisible hyperlinks in physical photographs. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp.  2117–2126, 2020.
  34. Electronic watermark. Digital Image Computing, Technology and Applications (DICTA’93), pp.  666–673, 1993.
  35. Perceptual dft watermarking with improved detection and robustness to geometrical distortions. IEEE Transactions on Information Forensics and Security, 9(7):1108–1119, 2014.
  36. A comprehensive survey on robust image watermarking. Neurocomputing, 488:226–247, 2022.
  37. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4):600–612, 2004.
  38. How to detect unauthorized data usages in text-to-image diffusion models. arXiv preprint arXiv:2307.03108, 2023.
  39. Diffusiondb: A large-scale prompt gallery dataset for text-to-image generative models. arXiv preprint arXiv:2210.14896, 2022.
  40. Tree-rings watermarks: Invisible fingerprints for diffusion images. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.
  41. A watermark for digital images. In Proceedings of 3rd IEEE International Conference on Image Processing, volume 3, pp.  219–222. IEEE, 1996.
  42. Wavelet transform based watermark for digital images. Optics Express, 3(12):497–511, 1998.
  43. Securing deep generative models with universal adversarial signature. arXiv preprint arXiv:2305.16310, 2023.
  44. Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising. IEEE transactions on image processing, 26(7):3142–3155, 2017.
  45. Steganogan: High capacity image steganography with gans. arXiv preprint arXiv:1901.03892, 2019a.
  46. Robust invisible video watermarking with attention. arXiv preprint arXiv:1909.01285, 2019b.
  47. The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.  586–595, 2018.
  48. Loss functions for image restoration with neural networks. IEEE Transactions on computational imaging, 3(1):47–57, 2016.
  49. Generative autoencoders as watermark attackers: Analyses of vulnerabilities and threats. arXiv preprint arXiv:2306.01953, 2023a.
  50. A recipe for watermarking diffusion models. arXiv preprint arXiv:2303.10137, 2023b.
  51. Hidden: Hiding data with deep networks. In Proceedings of the European conference on computer vision (ECCV), pp.  657–672, 2018.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Lijun Zhang (239 papers)
  2. Xiao Liu (402 papers)
  3. Antoni Viros Martin (1 paper)
  4. Cindy Xiong Bearfield (16 papers)
  5. Yuriy Brun (21 papers)
  6. Hui Guan (34 papers)
Citations (5)

Summary

We haven't generated a summary for this paper yet.