Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection

نویسندگان

چکیده

In recent years, many model intellectual property (IP) proof methods for IP protection have been proposed, such as watermarking and fingerprinting. However, with the increasing number of models transmitted deployed on Internet, quickly finding suspect among thousands model-sharing platforms GitHub is in great demand, which concurrently triggers new security problem copy detection protection. As an important part system, task has not received enough attention. Due to high computational complexity, both fingerprinting lack capability efficiently find suspected infringing tens millions models. this article, inspired by hash-based image retrieval methods, we introduce a novel mechanism: perceptual hashing convolutional neural networks (CNNs). The proposed algorithm can convert weights CNNs fixed-length binary hash codes so that lightly modified version similar code original model. By comparing similarity pair between query test library, versions be retrieved efficiently. To best our knowledge, first deep network Specifically, select based compression theory, then calculate normal statistics (NTS) segments weights, finally encode NTS features into codes. experiment performed library containing 3,565 indicates scheme superior performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deep Convolutional Neural Networks for pedestrian detection

Pedestrian detection is a popular research topic due to its paramount importance for a number of applications, especially in the fields of automotive, surveillance and robotics. Despite the significant improvements, pedestrian detection is still an open challenge that calls for more and more accurate algorithms. In the last few years, deep learning and in particular convolutional neural network...

متن کامل

Convolutional Neural Networks for Text Hashing

Hashing, as a popular approximate nearest neighbor search, has been widely used for large-scale similarity search. Recently, a spectrum of machine learning methods are utilized to learn similarity-preserving binary codes. However, most of them directly encode the explicit features, keywords, which fail to preserve the accurate semantic similarities in binary code beyond keyword matching, especi...

متن کامل

Cystoscopy Image Classication Using Deep Convolutional Neural Networks

In the past three decades, the use of smart methods in medical diagnostic systems has attractedthe attention of many researchers. However, no smart activity has been provided in the eld ofmedical image processing for diagnosis of bladder cancer through cystoscopy images despite the highprevalence in the world. In this paper, two well-known convolutional neural networks (CNNs) ...

متن کامل

Aircraft Detection by Deep Convolutional Neural Networks

Features play crucial role in the performance of classifier for object detection from high-resolution remote sensing images. In this paper, we implemented two types of deep learning methods, deep convolutional neural network (DNN) and deep belief net (DBN), comparing their performances with that of the traditional methods (handcrafted features with a shallow classifier) in the task of aircraft ...

متن کامل

Deep Diagnostics: Applying Convolutional Neural Networks for Vessels Defects Detection

Coronary angiography is considered to be a safe tool for the evaluation of coronary artery disease and perform in approximately 12 million patients each year worldwide. [1] In most cases, angiograms are manually analyzed by a cardiologist. Actually, there are no clinical practice algorithms which could improve and automate this work. Neural networks show high efficiency in tasks of image analys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Multimedia Computing, Communications, and Applications

سال: 2023

ISSN: ['1551-6857', '1551-6865']

DOI: https://doi.org/10.1145/3572777