SoK: On the Role and Future of AIGC Watermarking in the Era of Gen-AI

Kui Ren,Ziqi Yang,Li Lu,Jian Liu,Yiming Li,Jie Wan,Xiaodi Zhao,Xianheng Feng,Shuo Shao
2024-11-19
Abstract:The rapid advancement of AI technology, particularly in generating AI-generated content (AIGC), has transformed numerous fields, e.g., art video generation, but also brings new risks, including the misuse of AI for misinformation and intellectual property theft. To address these concerns, AIGC watermarks offer an effective solution to mitigate malicious activities. However, existing watermarking surveys focus more on traditional watermarks, overlooking AIGC-specific challenges. In this work, we propose a systematic investigation into AIGC watermarking and provide the first formal definition of AIGC watermarking. Different from previous surveys, we provide a taxonomy based on the core properties of the watermark which are summarized through comprehensive literature from various AIGC modalities. Derived from the properties, we discuss the functionality and security threats of AIGC watermarking. In the end, we thoroughly investigate the AIGC governance of different countries and practitioners. We believe this taxonomy better aligns with the practical demands for watermarking in the era of GenAI, thus providing a clearer summary of existing work and uncovering potential future research directions for the community.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: With the rapid development of generative artificial intelligence (GenAI) technology, especially the emergence of generative AI - created content (AIGC), although these technologies have brought revolutionary changes in fields such as artistic video generation, they have also triggered a series of new risks, such as being maliciously exploited to spread false information and intellectual property theft. To address these issues, digital watermarking technology is regarded as an effective solution to prevent the abuse of AIGC. However, most of the existing research on digital watermarking focuses on traditional watermarks and ignores the unique challenges of AIGC. Therefore, this paper aims to systematically study AIGC watermarks and formally define AIGC watermarks for the first time. Different from previous reviews, this paper provides a taxonomy based on the core attributes of AIGC modalities and summarizes these core attributes by synthesizing the literature of various AIGC modalities. Based on these attributes, the functionality and security threats of AIGC watermarks are discussed. Finally, this paper also conducts a detailed investigation of the governance of AIGC by different countries and practitioners. The author believes that this taxonomy better meets the actual needs of watermarks in the GenAI era, provides a clearer summary of existing work, and reveals possible future research directions for the community. Specifically, the main contributions of the paper include: - **Formal Definition of AIGC Watermarks**: As far as the author knows, this is the first formal definition of AIGC watermarks, which combines the embedding stage and modalities in large - scale AI models. - **Review of AIGC Watermark Attributes**: A detailed review and analysis are carried out, and various attributes of AIGC watermarks are extracted, including some attributes inherent in traditional watermarks and emerging attributes that characterize the performance of watermarks in AIGC. - **Systematization of AIGC Watermark Functionality and Security**: Based on the attributes, the functionality and security of AIGC watermarks are summarized for the first time, showing the performance of each existing attack method under the guidance of the attributes. - **Potential Directions for Future Work**: Encourage the community to explore the AIGC watermark attributes that have not been studied yet and propose some potential directions. Through these contributions, the paper hopes to provide a milestone for the development of AIGC watermarks and provide guidelines for the community to explore more potential applications and mitigate more security issues.