Papers
Topics
Authors
Recent
Search
2000 character limit reached

GaussianMarker: Uncertainty-Aware Copyright Protection of 3D Gaussian Splatting

Published 31 Oct 2024 in cs.CV | (2410.23718v1)

Abstract: 3D Gaussian Splatting (3DGS) has become a crucial method for acquiring 3D assets. To protect the copyright of these assets, digital watermarking techniques can be applied to embed ownership information discreetly within 3DGS models. However, existing watermarking methods for meshes, point clouds, and implicit radiance fields cannot be directly applied to 3DGS models, as 3DGS models use explicit 3D Gaussians with distinct structures and do not rely on neural networks. Naively embedding the watermark on a pre-trained 3DGS can cause obvious distortion in rendered images. In our work, we propose an uncertainty-based method that constrains the perturbation of model parameters to achieve invisible watermarking for 3DGS. At the message decoding stage, the copyright messages can be reliably extracted from both 3D Gaussians and 2D rendered images even under various forms of 3D and 2D distortions. We conduct extensive experiments on the Blender, LLFF and MipNeRF-360 datasets to validate the effectiveness of our proposed method, demonstrating state-of-the-art performance on both message decoding accuracy and view synthesis quality.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (57)
  1. 3D Gaussian Splatting for Real-Time Radiance Field Rendering. ACM Transactions on Graphics (TOG), 2023.
  2. Jonathon Luiten Georgios Kopanas, Bernhard Kerbl and Antoine Guedon. 3D Gaussian Splatting 3DV Tutorial. https://3dgstutorial.github.io/3dv_part1.pdf, 2024.
  3. GaussianEditor: Swift and controllable 3d editing with gaussian splatting. In Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
  4. CopyRNeRF: Protecting the CopyRight of Neural Radiance Fields. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2023.
  5. ReDMark: Framework for Residual Diffusion Watermarking based on Deep Networks. Expert Systems with Applications, 2020.
  6. StegaNeRF: Embedding Invisible Information within Neural Radiance Fields. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2023.
  7. NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis. Communications of the ACM, 2021.
  8. FisherRF: Active View Selection and Uncertainty Quantification for Radiance Fields using Fisher Information. In Proceedings of European Conference on Computer Vision (ECCV), 2024.
  9. Christopher M Bishop. Pattern Recognition and Machine Learning. Springer google scholar, 2:1122–1128, 2006.
  10. Pointnet:Deep Learning on Point Sets for 3D Classification and Segmentation. In Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
  11. HiDDeN: Hiding data with deep networks. In Proceedings of the European Conference on Computer Vision (ECCV), 2018.
  12. Neural Transmitted Radiance Fields. In Advances in Neural Information Processing Systems (NeurIPS), 2022.
  13. Occlusion-Free Scene Recovery via Neural Radiance Fields. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023.
  14. Imaging Interiors: An Implicit Solution to Electromagnetic Inverse Scattering Problems. In Proceedings of European Conference on Computer Vision (ECCV), 2024.
  15. Mip-Splatting: Alias-free 3D Gaussian Splatting. Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
  16. Dynamic 3D Gaussians: Tracking by Persistent Dynamic View Synthesis. In Proceedings of International Conference on 3D Vision (3DV), 2024.
  17. SuGaR: Surface-Aligned Gaussian Splatting for Efficient 3D Mesh Reconstruction and High-Quality Mesh Rendering. Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
  18. 3DGS-Avatar: Animatable Avatars via Deformable 3D Gaussian Splatting. In Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
  19. SMPL: A skinned multi-person linear model. ACM Trans. Graphics (Proc. SIGGRAPH Asia), 2015.
  20. A digital watermark. In Proceedings of International Conference on Image Processing (ICIP), 1994.
  21. Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE Transactions on Instrumentation and Measurement, 2010.
  22. Digital image watermarking in frequency domain. In Proceedings of International Conference on Communication and Signal Processing (ICCSP), 2016.
  23. Deep residual learning for image recognition. In Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR), 2016.
  24. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
  25. Cross-modal hashing method with properties of hamming space: A new perspective. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2024.
  26. Key point sensitive loss for long-tailed visual recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022.
  27. StegaStamp: Invisible Hyperlinks in Physical Photographs. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020.
  28. High-Capacity Convolutional Video Steganography with Temporal Residual Modeling. In Proceedings of the International Conference on Multimedia Retrieval (ICMR), 2019.
  29. Light Field Messaging with Deep Photographic Steganography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019.
  30. Robust watermarking for deep neural networks via bi-level optimization. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2021.
  31. UDH: Universal deep hiding for steganography, watermarking, and light field messaging. In Advances in Neural Information Processing Systems (NeurIPS), 2020.
  32. Robust invisible video watermarking with attention. arXiv preprint arXiv:1909.01285, 2019.
  33. Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024.
  34. Towards deep learning models resistant to adversarial attacks. Proceedings of International Conference on Learning Representations (ICLR), 2018.
  35. Event Trojan: Asynchronous Event-based Backdoor Attacks. In Proceedings of European Conference on Computer Vision (ECCV), 2024.
  36. Robust invisible video watermarking with attention. arXiv: Multimedia,arXiv: Multimedia, 2019.
  37. Robust mesh watermarking. In Proceedings of the Conference on Computer Graphics and Interactive Techniques (PACMCGIT), 1999.
  38. 3D ShapeNets: A deep representation for volumetric shapes. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
  39. Mimic3D: Thriving 3D-Aware GANs via 3D-to-2D Imitation. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2023.
  40. Perceptual 3D Watermarking Using Mesh Saliency. In Proceedings of International Conference on Information Science and Applications (ICISA), 2017.
  41. Deep 3D-to-2D Watermarking: Embedding Messages in 3D Meshes and Extracting Them from 2D Renderings. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022.
  42. Multiview Neural Surface Reconstruction by Disentangling Geometry and Appearance. In Advances in Neural Information Processing Systems (NeurIPS), 2020.
  43. 3D-aware Image Synthesis via Learning Structural and Textural Representations. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022.
  44. Protecting NeRFs’ Copyright via Plug-And-Play Watermarking Base Model. In Proceedings of European Conference on Computer Vision (ECCV), 2024.
  45. GeometrySticker: Enabling ownership claim of recolorized neural radiance fields. In Proceedings of European Conference on Computer Vision (ECCV), 2024.
  46. Photo tourism: exploring photo collections in 3d. ACM Transactions on Graphics (TOG), 2006.
  47. Ewa volume splatting. In Proceedings Visualization (VIS), 2001.
  48. Neural point catacaustics for novel-view synthesis of reflections. ACM Transactions on Graphics (TOG), 2022.
  49. Differentiable surface splatting for point-based geometry processing. ACM Transactions on Graphics (TOG), 2019.
  50. Mathematics for Machine Learning. 2020.
  51. Unifying approaches in active learning and active sampling via fisher information and information-theoretic quantities. Transactions on Machine Learning Research (TMLR), 2022.
  52. Decomposing NeRF for Editing via Feature Field Distillation. Advances in Neural Information Processing Systems (NeurIPS), 2022.
  53. Local light field fusion: Practical view synthesis with prescriptive sampling guidelines. ACM Transactions on Graphics (TOG), 2019.
  54. Mip-NeRF 360: Unbounded Anti-Aliased Neural Radiance Fields. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022.
  55. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric. In Proceeding of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2018.
  56. Motion transfer-driven intra-class data augmentation for finger vein recognition. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024.
  57. LightGaussian: Unbounded 3D Gaussian Compression with 15x Reduction and 200+ FPS. arXiv preprint arXiv:2311.17245, 2023.
Citations (1)

Summary

  • The paper introduces an uncertainty-aware watermarking technique that embeds watermarks into 3D Gaussian structures based on parameter uncertainty.
  • It employs dual decoders—a 3D PointNet and a 2D HiDDeN network—to robustly extract hidden messages even under distortions like noise, blurring, and cropping.
  • Experimental results across multiple datasets show state-of-the-art performance in watermark robustness and image quality metrics such as PSNR, SSIM, and LPIPS.

The paper under review addresses a significant gap in the field of digital asset protection, specifically concerning 3D Gaussian Splatting (3DGS) models. Unlike traditional 3D model representations such as meshes or Neural Radiance Fields (NeRF), 3DGS employs explicit 3D Gaussian structures, presenting unique challenges and opportunities in copyright protection. This work provides a comprehensive method—GaussianMarker—that ensures the protection of copyright by embedding watermarks into the explicit Gaussians used in 3DGS models. The research introduces an uncertainty-aware approach to this end, demonstrating both the invisibility of watermarks and their robustness against distortions.

Key Contributions

The paper's primary contribution is the proposed method that utilizes uncertainty estimation to determine appropriate locations for embedding watermarks within 3D Gaussian parameters. By assessing the uncertainty of each parameter, the approach cleverly densifies Gaussians with high uncertainty, allowing for more significant perturbations without perceivable impacts on rendered images. This strategy provides a solution to maintain both the aesthetic integrity of the 3D models and their derivative 2D renderings.

Moreover, the work extends the watermarking framework by incorporating both 3D and 2D message decoders. The 3D message decoder utilizes a PointNet architecture, effectively handling the explicit point cloud-like structure of 3DGS models. In contrast, the 2D message decoder is based on a pre-trained HiDDeN network, which serves as the basis for transferring knowledge from image to 3D space. This dual decoder setup ensures robust watermarks that can be reliably extracted, even under various forms of adversarial distortions such as Gaussian noise, blurring, or cropping in both spatial domains.

Experimental Validation

The paper presents compelling experimental results across multiple datasets, including Blender, LLFF, and MipNeRF-360, illustrating the superior performance of their method over existing baselines. Key performance metrics like PSNR, SSIM, and LPIPS are used to gauge reconstruction quality, while bit accuracy assesses watermark robustness. The proposed method outperforms others by achieving state-of-the-art results in message decoding accuracy and maintaining high-quality view synthesis.

Notably, the experiments demonstrate that GaussianMarker does not significantly degrade the visual quality of the images while ensuring message decodability—a balance previous methods struggled to maintain, especially for explicit 3D representations like 3DGS.

Implications and Future Work

This work advances the field of digital asset protection by introducing an effective mechanism for safeguarding 3DGS models. The theoretical underpinning of using uncertainty as a criterion for perturbation tolerance is an insightful addition, likely to inspire further research into uncertainty-aware techniques within digital watermarking and beyond.

Practically, this methodology could enhance the security of proprietary 3D content in industries ranging from entertainment to engineering. The approach is novel enough to suggest potential avenues for more generalized frameworks in uncertainty-aware copyright protection across various types of data representations.

Additionally, future research could explore the application of this approach to dynamic 3DGS scenarios or other unexplored forms of model representation, thereby broadening the operational scope and refining the technique's robustness against emerging threats in digital content manipulation. Integration with model compression techniques is another promising direction, potentially alleviating any computational overhead introduced by the watermarking process.

Conclusion

In summary, the paper introduces GaussianMarker, an innovative approach to embedding watermarks in 3D Gaussian Splatting models. By leveraging uncertainty-aware perturbations, the method successfully balances the often conflicting requirements of invisibility and robustness, marking a significant step forward in digital copyright protection. The potential implications of this work and its future developments promise to enhance the security of 3D digital assets across a variety of applications.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 42 likes about this paper.