LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking

Mayank Kumar Singh,Naoya Takahashi,Wei-Hsiang Liao,Yuki Mitsufuji
2024-09-21
Abstract:This paper presents a novel approach to deter unauthorized deepfakes and enable user tracking in generative models, even when the user has full access to the model parameters, by integrating key-based model authentication with watermarking techniques. Our method involves providing users with model parameters accompanied by a unique, user-specific key. During inference, the model is conditioned upon the key along with the standard input. A valid key results in the expected output, while an invalid key triggers a degraded output, thereby enforcing key-based model authentication. For user tracking, the model embeds the user's unique key as a watermark within the generated content, facilitating the identification of the user's ID. We demonstrate the effectiveness of our approach on two types of models, audio codecs and vocoders, utilizing the SilentCipher watermarking method. Additionally, we assess the robustness of the embedded watermarks against various distortions, validating their reliability in various scenarios.
Cryptography and Security
What problem does this paper attempt to address?
This paper aims to address the issue of misuse of generative models in white-box scenarios, particularly in situations where users have full access to the model's parameters. Specifically, the authors propose a key-based authentication method to ensure the traceability and integrity of the generated content. This is achieved by embedding user-specific watermarks into the generative model. When a valid key is used, the model generates content normally and embeds the user's unique identifier as a watermark into the generated content; when an invalid key is used, the model produces lower-quality output. This method not only prevents unauthorized deepfakes but also makes it possible to track the generated content, thereby enhancing the security and reliability of generative models. The paper validates the effectiveness of this method through experiments on audio codecs (such as Encodec) and vocoders (such as HiFi-GAN).