Get Free Shipping on orders over $79
Digital Watermarking for Machine Learning Model : Techniques, Protocols and Applications - Lixin Fan

Digital Watermarking for Machine Learning Model

Techniques, Protocols and Applications

By: Lixin Fan (Editor), Chee Seng Chan (Editor), Qiang Yang (Editor)

eText | 29 May 2023

At a Glance

eText


$249.00

or 4 interest-free payments of $62.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Machine learning (ML) models, especially large pretrained deep learning (DL) models, are of high economic value and must be properly protected with regard to intellectual property rights (IPR). Model watermarking methods are proposed to embed watermarks into the target model, so that, in the event it is stolen, the model's owner can extract the pre-defined watermarks to assert ownership. Model watermarking methods adopt frequently used techniques like backdoor training, multi-task learning, decision boundary analysis etc. to generate secret conditions that constitute model watermarks or fingerprints only known to model owners. These methods have little or no effect on model performance, which makes them applicable to a wide variety of contexts. In terms of robustness, embedded watermarks must be robustly detectable against varying adversarial attacks that attempt to remove the watermarks. The efficacy of model watermarking methods is showcased in diverse applications including image classification, image generation, image captions, natural language processing and reinforcement learning.

This book covers the motivations, fundamentals, techniques and protocols for protecting ML models using watermarking. Furthermore, it showcases cutting-edge work in e.g. model watermarking, signature and passport embedding and their use cases in distributed federated learning settings.

on
Desktop
Tablet
Mobile

More in Artificial Intelligence

AI-Powered Search - Trey Grainger

eBOOK

HBR Guide to Generative AI for Managers : HBR Guide - Elisa Farri

eBOOK

AI : The End of Human Race - Alex Wood

eBOOK