Acta Geodaetica et Cartographica Sinica ›› 2024, Vol. 53 ›› Issue (11): 2086-2098.doi: 10.11947/j. AGCS.2024.20240092.

• Cartography and Geoinformation • Previous Articles    

Protection for remote sensing object detection datasets based on backdoor watermarking and region of interest encryption

Weitong CHEN1,2(), Xin XU1,2, Changqing ZHU3,4,5(), Na REN3,4,5   

  1. 1.School of Information Engineering, Yangzhou University, Yangzhou 225127, China
    2.Jiangsu Province Engineering Research Center of Knowledge Management and Intelligent Service, Yangzhou 225127, China
    3.Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education, Nanjing 210023, China
    4.State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China
    5.Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China
  • Received:2024-03-18 Published:2024-12-13
  • Contact: Changqing ZHU E-mail:wtchen@yzu.edu.cn;zcq88@263.net
  • About author:CHEN Weitong (1992—), male, PhD, lecturer, majors in geographic information security. E-mail: wtchen@yzu.edu.cn
  • Supported by:
    The National Key Research and Development Program of China(2023YFB3907100);The National Natural Science Foundation of China(42201444)

Abstract:

The collection, cleansing, and annotation processes of high-quality remote sensing datasets typically entail substantial costs. Therefore, the remote sensing datasets can be regarded as intellectual properties. However, remote sensing datasets also face threats such as theft, unauthorized usage and redistribution. In order to safeguard the copyright of datasets, we propose an object detection dataset protection method based on backdoor watermarking and region of interest (ROI) encryption. The algorithm embeds object-generation watermark triggers into the original dataset and utilizes an ROI encryption algorithm to encrypt the dataset. During the watermark embedding phase, random samples are selected from the original dataset, and the triggers are embedded into random positions within the samples. During the dataset encryption phase, the ROIs in the annotation files are first initially encrypted. Then, disturbances are added within the encrypted ROIs. Finally, a unique random key is generated for each user based on a hash function, and perform secondary encryption on the initially encrypted annotation files. During the dataset decryption phase, only authorized users can decrypt the encrypted dataset, where the encrypted annotation files are restored to correct ROIs. Thereby obtaining the decrypted legitimate dataset. In the phase of asserting copyright on suspected models, a watermark test set is constructed with the object-generation watermark triggers. This test set is then inputted into the suspected model for prediction. If the watermark prediction success rate exceeds a preset threshold, it is considered that the model has utilized the protected dataset during training. Extensive experiments have demonstrated that this method effectively protects dataset copyrights without compromising dataset quality. The watermarking algorithm exhibits strong robustness against fine-tuning attacks and pruning attacks.

Key words: remote sensing dataset for object detection, dataset protection, copyright protection, ROI encryption, object-generation watermark

CLC Number: