skip to main content
research-article

Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring

Published:19 December 2023Publication History
Skip Abstract Section

Abstract

Federated learning (FL) allows multiple participants to collaboratively build deep learning (DL) models without directly sharing data. Consequently, the issue of copyright protection in FL becomes important since unreliable participants may gain access to the jointly trained model. Application of homomorphic encryption (HE) in a secure FL framework prevents the central server from accessing plaintext models. Thus, it is no longer feasible to embed the watermark at the central server using existing watermarking schemes. In this article, we propose a novel client-side FL watermarking scheme to tackle the copyright protection issue in secure FL with HE. To the best of our knowledge, it is the first scheme to embed the watermark to models under a secure FL environment. We design a black-box watermarking scheme based on client-side backdooring to embed a pre-designed trigger set into an FL model by a gradient-enhanced embedding method. Additionally, we propose a trigger set construction mechanism to ensure that the watermark cannot be forged. Experimental results demonstrate that our proposed scheme delivers outstanding protection performance and robustness against various watermark removal attacks and ambiguity attack.

REFERENCES

  1. [1] Adi Yossi, Baum Carsten, Cisse Moustapha, Pinkas Benny, and Keshet Joseph. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In Proceedings of 2018 USENIX Security Symposium. 16151631.Google ScholarGoogle Scholar
  2. [2] Adnan Mohammed, Kalra Shivam, Cresswell Jesse C., Taylor Graham W., and Tizhoosh Hamid R.. 2022. Federated learning and differential privacy for medical image analysis. Scientific Reports 12, 1 (2022), 110.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Antunes Rodolfo Stoffel, Costa Cristiano André da, Küderle Arne, Yari Imrana Abdullahi, and Eskofier Björn. 2022. Federated learning for healthcare: Systematic review and architecture proposal. ACM Transactions on Intelligent Systems and Technology (TIST) 13, 4 (2022), 123.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Aono Yoshinori, Hayashi Takuya, Wang Lihua, Moriai Shiho, et al. 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security 13, 5 (2017), 13331345.Google ScholarGoogle Scholar
  5. [5] Bagdasaryan Eugene, Veit Andreas, Hua Yiqing, Estrin Deborah, and Shmatikov Vitaly. 2020. How to backdoor federated learning. In Proceedings of 2020 International Conference on Artificial Intelligence and Statistics. 29382948.Google ScholarGoogle Scholar
  6. [6] Cheon Jung Hee, Kim Andrey, Kim Miran, and Song Yongsoo. 2017. Homomorphic encryption for arithmetic of approximate numbers. In Proceedings of 2017 International Conference on the Theory and Application of Cryptology and Information Security. 409437.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Dang Trung Kien, Lan Xiang, Weng Jianshu, and Feng Mengling. 2022. Federated learning for electronic health records. ACM Transactions on Intelligent Systems and Technology (TIST) (2022).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Fkirin Alaa, Attiya Gamal, El-Sayed Ayman, and Shouman Marwa A.. 2022. Copyright protection of deep neural network models using digital watermarking: A comparative study. Multimedia Tools and Applications (2022), 115.Google ScholarGoogle Scholar
  9. [9] Gu Tianyu, Dolan-Gavitt Brendan, and Garg Siddharth. 2017. BadNets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017).Google ScholarGoogle Scholar
  10. [10] Guo Jia and Potkonjak Miodrag. 2018. Watermarking deep neural networks for embedded systems. In Proceedings of 2018 IEEE/ACM International Conference on Computer-Aided Design. 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Guo Shangwei, Zhang Tianwei, Qiu Han, Zeng Yi, Xiang Tao, and Liu Yang. 2021. Fine-tuning is not enough: A simple yet effective watermark removal attack for DNN models. In Proceedings of 2021 International Joint Conference on Artificial Intelligence.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Han Song, Pool Jeff, Tran John, and Dally William. 2015. Learning both weights and connections for efficient neural network. In Advances in Neural Information Processing Systems, Vol. 28.Google ScholarGoogle Scholar
  13. [13] Hard Andrew, Rao Kanishka, Mathews Rajiv, Ramaswamy Swaroop, Beaufays Françoise, Augenstein Sean, Eichner Hubert, Kiddon Chloé, and Ramage Daniel. 2018. Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604 (2018).Google ScholarGoogle Scholar
  14. [14] He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2015. Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification. In Proceedings of 2015 IEEE International Conference on Computer Vision. 10261034.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Krizhevsky Alex, Hinton Geoffrey, et al. 2009. Learning multiple layers of features from tiny images. Tech. Rep. (2009).Google ScholarGoogle Scholar
  16. [16] LeCun Yann, Bottou Léon, Bengio Yoshua, and Haffner Patrick. 1998. Gradient-based learning applied to document recognition. In Proceedings of the IEEE, Vol. 86. 22782324.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Li Qinbin, Diao Yiqun, Chen Quan, and He Bingsheng. 2021. Federated learning on non-IID data silos: An experimental study. arXiv preprint arXiv:2102.02079 (2021).Google ScholarGoogle Scholar
  18. [18] Li Qiushi, Ren Ju, Pan Xinglin, Zhou Yuezhi, and Zhang Yaoxue. 2022. ENIGMA: Low-latency and privacy-preserving edge inference on heterogeneous neural network accelerators. In 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS’22). IEEE, 458469.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Li Qiushi, Ren Ju, Zhou Yuezhi, and Zhang Yaoxue. 2022. Privacy-preserving DNN model authorization against model theft and feature leakage. In ICC 2022-IEEE International Conference on Communications. IEEE, 56335638.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Li Zheng, Hu Chengyu, Zhang Yang, and Guo Shanqing. 2019. How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of DNN. In Proceedings of 2019 Annual Computer Security Applications Conference. 126137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Liu Yunfei, Ma Xingjun, Bailey James, and Lu Feng. 2020. Reflection backdoor: A natural backdoor attack on deep neural networks. In Proceedings of 2020 European Conference on Computer Vision. 182199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Ma Jing, Naas Si-Ahmed, Sigg Stephan, and Lyu Xixiang. 2022. Privacy-preserving federated learning based on multi-key homomorphic encryption. International Journal of Intelligent Systems (2022).Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Maini Pratyush, Yaghini Mohammad, and Papernot Nicolas. 2021. Dataset inference: Ownership resolution in machine learning. In Proceedings of 2021 International Conference on Learning Representations.Google ScholarGoogle Scholar
  24. [24] McMahan Brendan, Moore Eider, Ramage Daniel, Hampson Seth, and Arcas Blaise Aguera y. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of 2017 International Conference Artificial Intelligence and Statistics. 12731282.Google ScholarGoogle Scholar
  25. [25] Mehta Sachin and Rastegari Mohammad. 2021. MobileViT: Light-weight, general-purpose, and mobile-friendly vision transformer. In International Conference on Learning Representations.Google ScholarGoogle Scholar
  26. [26] Merrer Erwan Le, Perez Patrick, and Trédan Gilles. 2020. Adversarial frontier stitching for remote neural network watermarking. Neural Computing and Applications 32, 13 (2020), 92339244. Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Muhammad Khalil, Wang Qinqin, O’Reilly-Morgan Diarmuid, Tragos Elias, Smyth Barry, Hurley Neil, Geraci James, and Lawlor Aonghus. 2020. Fedfast: Going beyond average for faster training of federated recommender systems. In Proceedings of 2020 ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 12341242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Paillier Pascal. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of 1999 International Conference on the Theory and Applications of Cryptographic Techniques. 223238.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Park Jaehyoung and Lim Hyuk. 2022. Privacy-preserving federated learning using homomorphic encryption. Applied Sciences 12, 2 (2022), 734.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Regazzoni Francesco, Palmieri Paolo, Smailbegovic Fethulah, Cammarota Rosario, and Polian Ilia. 2021. Protecting artificial intelligence IPs: A survey of watermarking and fingerprinting for machine learning. CAAI Transactions on Intelligence Technology 6, 2 (2021), 180191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Rieger Phillip, Nguyen Thien Duc, Miettinen Markus, and Sadeghi Ahmad-Reza. 2022. DeepSight: Mitigating backdoor attacks in federated learning through deep model inspection. In Proceedings of 2022 Network and Distributed System Security Symposium. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Rivest Ronald L., Adleman Len, Dertouzos Michael L., et al. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation 4, 11 (1978), 169180.Google ScholarGoogle Scholar
  33. [33] Shafieinejad Masoumeh, Lukas Nils, Wang Jiaqi, Li Xinda, and Kerschbaum Florian. 2021. On the robustness of backdoor-based watermarking in deep neural networks. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security. ACM, Virtual Event Belgium, 177188. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Simonyan Karen and Zisserman Andrew. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).Google ScholarGoogle Scholar
  35. [35] Singhal Karan, Sidahmed Hakim, Garrett Zachary, Wu Shanshan, Rush John, and Prakash Sushant. 2021. Federated reconstruction: Partially local federated learning. Advances in Neural Information Processing Systems 34 (2021).Google ScholarGoogle Scholar
  36. [36] Szyller Sebastian, Atli Buse Gul, Marchal Samuel, and Asokan N.. 2021. DAWN: Dynamic adversarial watermarking of neural networks. In Proceedings of 2021 ACM International Conference on Multimedia. 44174425.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Tekgul Buse G. A., Xia Yuxi, Marchal Samuel, and Asokan N.. 2021. WAFFLE: Watermarking in federated learning. In Proceedings of 2021 International Symposium on Reliable Distributed Systems. 310320.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Uchida Yusuke, Nagai Yuki, Sakazawa Shigeyuki, and Satoh Shin’ichi. 2017. Embedding watermarks into deep neural networks. In Proceedings of 2017 ACM International Conference on Multimedia Retrieval. 269277.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Wang Tianhao and Kerschbaum Florian. 2021. RIGA: Covert and robust white-box watermarking of deep neural networks. In Proceedings of 2021 Web Conference. 9931004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Xue Mingfu, Sun Shichang, Zhang Yushu, Wang Jian, and Liu Weiqiang. 2022. Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication. Applied Intelligence (2022), 115.Google ScholarGoogle Scholar
  41. [41] LeCun Y., Cortes C., and Burges C.. 2010. MNIST Handwritten Digit Database. (2010). http://yann.lecun.com/exdb/mnist/Google ScholarGoogle Scholar
  42. [42] Yang Liu, Tan Ben, Zheng Vincent W., Chen Kai, and Yang Qiang. 2020. Federated recommendation systems. In Federated Learning. Springer, 225239.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Yang Qiang, Liu Yang, Chen Tianjian, and Tong Yongxin. 2019. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology 10, 2 (2019), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Yang Qiang, Liu Yang, Cheng Yong, Kang Yan, Chen Tianjian, and Yu Han. 2019. Federated learning. Synthesis Lectures on Artificial Intelligence and Machine Learning 13, 3 (2019), 1207.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Yurochkin Mikhail, Agarwal Mayank, Ghosh Soumya, Greenewald Kristjan, Hoang Nghia, and Khazaeni Yasaman. 2019. Bayesian nonparametric federated learning of neural networks. In Proceedings of 2019 International Conference on Machine Learning. 72527261.Google ScholarGoogle Scholar
  46. [46] Zhang Jialong, Gu Zhongshu, Jang Jiyong, Wu Hui, Stoecklin Marc Ph, Huang Heqing, and Molloy Ian. 2018. Protecting intellectual property of deep neural networks with watermarking. In Proceedings of 2018 Asia Conference on Computer and Communications Security. 159172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Zhu Xinghua, Wang Jianzong, Hong Zhenhou, and Xiao Jing. 2020. Empirical studies of institutional federated learning for natural language processing. In Proceedings of 2020 Conference on Empirical Methods in Natural Language Processing: Findings. 625634.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Intelligent Systems and Technology
        ACM Transactions on Intelligent Systems and Technology  Volume 15, Issue 1
        February 2024
        533 pages
        ISSN:2157-6904
        EISSN:2157-6912
        DOI:10.1145/3613503
        • Editor:
        • Huan Liu
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 December 2023
        • Online AM: 30 October 2023
        • Accepted: 25 September 2023
        • Revised: 10 July 2023
        • Received: 12 December 2022
        Published in tist Volume 15, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)331
        • Downloads (Last 6 weeks)58

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text