PaperHub
6.0
/10
Rejected4 位审稿人
最低6最高6标准差0.0
6
6
6
6
4.5
置信度
正确性2.5
贡献度2.3
表达2.3
ICLR 2025

Shallow Diffuse: Robust and Invisible Watermarking through Low-Dimensional Subspaces in Diffusion Models

OpenReviewPDF
提交: 2024-09-23更新: 2025-02-05

摘要

关键词
diffusion Modelwatermarklow-dimensional subspaceconsistencyrobustness

评审与讨论

审稿意见
6

Current watermarking techniques based on diffusion models often embed watermarks directly into the initial noise,which can alter the data distribution. This paper proposes "Shallow Diffuse," a method that disentangles the watermark embedding from the generation process by leveraging low-dimensional subspaces. This approach supports watermark embedding for both server-side and user-side applications while maintaining high robustness and consistency. Additionally, experiments were designed to validate robustness and conduct ablation studies across multiple datasets.

优点

  1. The method utilizes the local linearity of low-dimensional subspaces. As a watermarking method based on diffusion models, it maintains the consistency of generated images.

  2. This paper provides rigorous theoretical proof and presents a substantial number of computational formulas.

缺点

  1. The attack experiments are limited, consisting of only four fixed-parameter attacks, which do not demonstrate the method's robustness. For instance, the method can be viewed as a variant of treering, could experiments with additional attacks, such as rotation、regeneration be included?

  2. The theoretical assumptions of the method are built upon [1], but the experimental results yield a different range of t values compared to the theoretical analysis in [1]. Although this can be explained by the errors introduced by DDIM-Inv, it remains perplexing.

  3. The method relies on the properties of DDIM and DDIM-inverse, which may lack certain generalizability. It might not perform well for attacks executed in the latent space.

问题

  1. Shouldn't the formula x^0,t:=fθ,t(xt+λΔx)\hat{\boldsymbol{x}}_{0, t}:=\boldsymbol{f}_{\boldsymbol{\theta}, t}\left(\boldsymbol{x}_{t}+\lambda \Delta \boldsymbol{x}\right) on line 360 be x^0,t:=fθ,t(xt)\hat{\boldsymbol{x}}_{0, t}:=\boldsymbol{f}_{\boldsymbol{\theta}, t}\left(\boldsymbol{x}_{t}\right)

  2. Could you specify the parameters used in the Shallow Diffuse method in Section 5, such as the embedding channels and watermark radius?

  3. The experiments in Appendix C only provide results, could you include some analysis?

评论

Q1: "The attack experiments are limited, consisting of only four fixed-parameter attacks, which do not demonstrate the method's robustness. For instance, the method can be viewed as a variant of treering, could experiments with additional attacks, such as rotation、regeneration be included?"

A1: We have added 7 additional adversarial attacks, please see Q1 in the global response.

Q2: "The theoretical assumptions of the method are built upon [1], but the experimental results yield a different range of t values compared to the theoretical analysis in [1]. Although this can be explained by the errors introduced by DDIM-Inv, it remains perplexing."

A2: There is another important factor contributing to this gap. The previous results in LOCO-Edit [2] only evaluate rank in the image space of unconditional diffusion models. However, most of our experiments are conducted on latent diffusion models such as Stable Diffusion. For these models, the minimum rank may be achieved at a different timestep compared to vanilla diffusion models. However, we couldn’t reproduce the experiment for Stable Diffusion because calculating the Jacobian matrix is computationally infeasible due to its huge size (3 * 256 * 256 x 3 * 256 * 256).

In the revision, we have included a discussion this factor in the experimental analysis.

Q3: "The method relies on the properties of DDIM and DDIM-inverse, which may lack certain generalizability. It might not perform well for attacks executed in the latent space."

We believe there might be some misunderstandings of our result. In our experiments, we do apply our Shallow Diffuse in the latent space for Stable Diffusion, see line 402. Additionally, we have added ablation studies on different sampling methods, including DDIM, DEIS [3], DPM-Solver [4], PNDM [5], and UniPC [6]. See Appendix C.6 for more details. In short, all these samplers have very similar image generation quality and robustness, demonstrating the generalizability of our approach.

Q4: Typos in the equation.

A4: We have fixed and highlighted it in the revised manuscript.

Q5: Could you specify the parameters used in the Shallow Diffuse method in Section 5, such as the embedding channels and watermark radius?

A5: We have added and highlighted it in the revised manuscript in section C.5 and line 269.

Q6: The experiments in Appendix C only provide results, could you include some analysis?

A6: We have added discussions and highlighted them in Appendix C in the revised manuscript.

[2] Chen, Siyi, Huijie Zhang, Minzhe Guo, Yifu Lu, Peng Wang, and Qing Qu. "Exploring low-dimensional subspaces in diffusion models for controllable image editing." NeurIPS 2024

[3] Zhang, Qinsheng, and Yongxin Chen. "Fast sampling of diffusion models with exponential integrator." ICLR 2023.

[4] Lu, Cheng, Yuhao Zhou, Fan Bao, Jianfei Chen, Chongxuan Li, and Jun Zhu. "Dpm-solver: A fast ode solver for diffusion probabilistic model sampling in around 10 steps." Advances in Neural Information Processing Systems 35 (2022): 5775-5787.

[5] Liu, Luping, Yi Ren, Zhijie Lin, and Zhou Zhao. "Pseudo numerical methods for diffusion models on manifolds." ICLR 2022.

[6] Zhao, Wenliang, Lujia Bai, Yongming Rao, Jie Zhou, and Jiwen Lu. "Unipc: A unified predictor-corrector framework for fast sampling of diffusion models." Advances in Neural Information Processing Systems 36 (2024).

评论

I'd like to thank the authors for their detailed response. It has effectively addressed my concerns, particularly regarding the adversarial attacks and the ablation studies on different sampling methods. As a result, I have adjusted my score accordingly.

评论

Thank you for taking the time to review our rebuttal thoroughly. We sincerely appreciate your time and effort in improving our project.

审稿意见
6

The paper proposed a new image watermarking method that embeds a watermark into the null space of a specific step during image denoising in diffusion model. It shows that the proposed watermarking method have smaller impact on the generated images compared to the existing methods like Stable Signature and Tree-Ring. Additionally, the proposed method shows good robustness to image processing methods like JPEG and Gaussian blur.

优点

  1. The proposed method has smaller impact on the generated images compared to the existing watermarking methods designed for diffusion models.
  2. Experiments are carried on several image-prompt datasets to show the effectiveness of the proposed methods.
  3. The robustness of the propsoed method is evaluated.

缺点

  1. Compared to Tree-Ring, the technical contribution of the proposed method is limited.
  2. In the experimental part, the authors mainly compare their method with the watermarking methods that embed watermark into the semantic space like Tree-Ring which changes the image a lot. More other watermarking methods should be evaluated.
  3. In the robustness part, the authors only evaluate the robustness of the proposed method on some common perturbation.

问题

  1. Besides Tree-Ring and Stable Signature, I think there are more existing watermarking methods that introduce small perturbation to the image to embed watermark, like StegaStamp. To show the proposed method actually preserves image quality, I think the authors should compare the method with some watermarking methods that watermark the image after image generation with a small perturbation.
  2. In the robustness part, I think the regeneration attacks and some adversarial perturbation should be evaluated on the proposed method to see whether the proposed method is actually robust under various attacks.
  3. Since the authors mention the user scenario, if multiple users rewatermark the same image with the proposed method, can the watermark embeded by the specific user be detected in this circumstance?
评论

Q1: "Besides Tree-Ring and Stable Signature, I think there are more existing watermarking methods that introduce small perturbation to the image to embed watermark, like StegaStamp. To show the proposed method actually preserves image quality, I think the authors should compare the method with some watermarking methods that watermark the image after image generation with a small perturbation."

A1: We have included comparisons with StegaStamp in both user and server scenarios, as detailed in Tables 1 - 4. In summary, the generation consistency of Shallow Diffuse is comparable to that of StegaStamp, as shown in Table 2. However, Shallow Diffuse demonstrates significantly better robustness, particularly against diffusion-based attacks such as DiffPure and IR, as highlighted in Tables 1 - 4.


Q2: "In the robustness part, I think the regeneration attacks and some adversarial perturbation should be evaluated on the proposed method to see whether the proposed method is actually robust under various attacks."

A2: We have added 7 more adversarial attacks, please see Q1 in the global response.


Q3: "Since the authors mention the user scenario, if multiple users rewatermark the same image with the proposed method, can the watermark embeded by the specific user be detected in this circumstance?"

A3: We have added experiments for multi-key identification. please see Q2 in the response to all reviewers and ACs.

Q4: "Compared to Tree-Ring, the technical contribution of the proposed method is limited."

A4: Although our method is developed based on the Tree-Ring framework, there are several significant contributions over Tree-Ring that we want to highlight below:

  1. Identifying and addressing fundamental limits of Tree-Ring. Our study revealed that the Jacobian of the posterior mean estimator is full-rank at high-noise timesteps, leading to inherent image distortion when injecting watermarks using Tree-Ring. Our work addressed this limitation. We inject the watermark at shallow timesteps, where the Jacobian is low-rank with a large null space. This ensures most of the watermark's energy resides in the null space, minimizing distortion in image generation.

  2. Improved Watermarking Techniques. In Section 3.2, we inject the watermark into the low-frequency region, whereas Tree-Ring uses the high-frequency region. Additionally, in Appendix B, we introduce the concept of channel averaging. With these technical improvements, Shallow Diffuse achieves enhanced robustness and consistency.

  3. Theoretical justifications. Tree-Ring is purely an empirical method lacking theoretical justification. In contrast, our approach is backed by rigorous theoretical guarantees of detectability and robustness under appropriate assumptions. This foundation enhances the interpretability and trustworthiness of our method.

[1] Chen, Siyi, Huijie Zhang, Minzhe Guo, Yifu Lu, Peng Wang, and Qing Qu. "Exploring low-dimensional subspaces in diffusion models for controllable image editing." arXiv preprint arXiv:2409.02374 (2024).

评论

Thank you for providing the additional experiments. For Questions 2 and 4, I believe my concerns have been addressed. However, for Questions 1 and 3, I find that my concerns remain unresolved.

Q1: Based on the new Table 1, it is evident that the generation quality of StageStamp significantly outperforms the proposed method, as indicated by the CLIP score (0.355 vs. 0.328). This raises a critical question: does the improved robustness of the proposed method come solely as a trade-off for lower generation quality?

Q3: In the new experiment, the authors stated that they utilized non-overlapping masks for multi-user rewatermarking and assumed the ability to predefine the number of keys and non-overlapping masks. However, this evaluation is limited to the scenario of two users. In real-world applications, as the number of users increases, how significantly would the identification accuracy and robustness of the proposed method degrade? Furthermore, if the number of users surpasses the predefined limit, does this imply that no additional users can be integrated into the watermarking system?

评论

Q1: Based on the new Table 1, it is evident that the generation quality of StageStamp significantly outperforms the proposed method, as indicated by the CLIP score (0.355 vs. 0.328). This raises a critical question: does the improved robustness of the proposed method come solely as a trade-off for lower generation quality?

A1: Thank you for the insightful comments. We address two aspects of your question as follows.

  1. CLIP score is not a good indicator of generation consistency. For watermarking applications, our primary objective is to ensure consistency between watermarked and original images rather than generation quality—a property that the CLIP score does not effectively capture. Figure 9 illustrates this by comparing original Stable Diffusion images with watermarked versions generated by StageStamp and Shallow Diffuse. While StageStamp introduces noticeable visual artifacts, Shallow Diffuse produces cleaner, more visually consistent outputs. This discrepancy between visual quality and the CLIP score highlights the limitations of the CLIP metric, which is inherently biased due to its sensitivity to text embeddings [1].

  2. Our method improves both robustness and generation consistency over StageStamp. Furthermore, Table 1 demonstrates that Shallow Diffuse achieves CLIP scores and FID values closer to those of the original Stable Diffusion (first and last rows of Table 1). This alignment implies that Shallow Diffuse better preserves the original image characteristics compared to StageStamp, which, despite achieving higher CLIP scores, introduces undesirable distortions for watermarking applications. Additionally, as demonstrated in Table 2, metrics better suited for assessing generation consistency—such as LPIPS, SSIM, and PSNR—indicate that Shallow Diffuse performs comparably to StageStamp.

To fully evaluate whether there exists a trade-off between these factors, we also conducted additional experiments comparing our approach with existing methods. As shown in Figure 4, under nearly identical robustness conditions, Shallow Diffuse outperforms others in terms of generation consistency. This demonstrates that our method achieves simultaneous improvements in both robustness and consistency, without compromising one for the other.

[1] Ahmadi, Saba, and Aishwarya Agrawal. "An examination of the robustness of reference-free image captioning evaluation metrics." Findings of the Association for Computational Linguistics: EACL 2024, pages 196–208.

Q3: In the new experiment, the authors stated that they utilized non-overlapping masks for multi-user rewatermarking and assumed the ability to predefine the number of keys and non-overlapping masks. However, this evaluation is limited to the scenario of two users. In real-world applications, as the number of users increases, how significantly would the identification accuracy and robustness of the proposed method degrade? Furthermore, if the number of users surpasses the predefined limit, does this imply that no additional users can be integrated into the watermarking system?

A3: Thank you for the thoughtful question. We extended our experiments to include 4, 8, 16, and 32 users and compared the results with Tree-Ring. The results are presented in Table 6, and we’ve summarized the table below.

Shallow Diffuse consistently outperformed Tree-Ring in robustness across different numbers of users. Even as the number of users increased to 32, Shallow Diffuse maintained strong robustness under clean conditions. However, in adversarial settings, its robustness began to decline when the number of users exceeded 16. Under the current setup, when the number of users surpasses the predefined limit, our method becomes less robust and accurate.

We believe that enabling watermarking for hundreds or even thousands of users simultaneously is a challenging yet promising future direction for Shallow Diffuse.

| Watermark number | Method          | Clean     | Adversarial average |
|------------------|-----------------|-----------|:-------------------:|
| 2                | Tree-Ring       | 1.00/1.00 | 0.98/0.80           |
| 2                | Shallow Diffuse | 1.00/1.00 | 0.99/0.95           |
| 4                | Tree-Ring       | 1.00/1.00 | 0.96/0.70           |
| 4                | Shallow Diffuse | 1.00/1.00 | 0.99/0.86           |
| 8                | Tree-Ring       | 1.00/0.95 | 0.91/0.47           |
| 8                | Shallow Diffuse | 1.00/1.00 | 0.98/0.80           |
| 16               | Tree-Ring       | 0.96/0.57 | 0.83/0.26           |
| 16               | Shallow Diffuse | 1.00/0.89 | 0.92/0.56           |
| 32               | Tree-Ring       | 0.95/0.44 | 0.80/0.16           |
| 32               | Shallow Diffuse | 0.99/0.89 | 0.90/0.44           |
评论

Thank you for the new experiments and the effort you have put into the rebuttal. I will raise my score to 6. However, I still believe that the weakness in handling multi-user scenarios is a critical limitation for a watermarking method whose primary focus is on user scenarios.

评论

We sincerely thank you for your thoughtful feedback and for raising our rating. Multi-user scenarios are indeed a crucial area of research, and we are willing to explore this approach in future works to improve our framework further.

审稿意见
6

This paper proposes a watermarking technique Shallow Diffuse. Unlike existing approaches that integrate watermarking throughout the entire diffusion sampling process, Shallow Diffuse decouples these steps by leveraging the presence of a low-dimensional subspace in the image generation process. This method ensures that a substantial portion of the watermark lies in the null space of this subspace, effectively separating it from the image generation process.

优点

The originality of this paper is not great, but its quality, clarity and significance are good. It has the support of rich theoretical basis and has advantages in theoretical proof.

缺点

The table in the paper is not very well drawn, it is very difficult to read, especially the header. At the same time, the experimental part is not detailed enough. For example, should the comparison method reproduce the results or use the pre-training model?

问题

  1. The table in the paper is very difficult to read clearly.

  2. In Table 1, for the CLIP-Score index, yours is 0.3285, which seems to be the worst. Please explain further.

  3. Please explain why the filter size in the Gaussian blurring is 8 × 8 and how the standard deviation is selected.

  4. As can be seen from Table 2, the PSNR and SSIM of most methods are very low, so it is easy for human eyes to find modification traces, which easily leads to the risk of watermarked images being maliciously broken. Please further explain the visual quality of the generated watermarked image.

评论

Q1: "The table in the paper is not very well drawn, it is very difficult to read, especially the header. At the same time, the experimental part is not detailed enough. For example, should the comparison method reproduce the results or use the pre-training model?"

A1: Thank you for your feedback. We have improved the presentation, as outlined in Q3 of our global response. Regarding the comparison setup, we highlight this in lines 401–405. In summary, for the server scenario, all diffusion-based methods are evaluated using the same model, Stable Diffusion 2.1. Non-diffusion methods are applied to images generated by Stable Diffusion 2.1. We control the initial seeds so that the non-diffusion methods use the same set of images as the diffusion-based methods.


Q2: "In Table 1, for the CLIP-Score index, yours is 0.3285, which seems to be the worst. Please explain further."

A2: The CLIP score focuses solely on image quality. For watermarking, however, our priority is the consistency between the watermarked and original images, which the CLIP score fails to capture.

Table 1 shows that the CLIP score and FID achieved by Shallow Diffuse are closest to those of Stable Diffusion without watermarking (see the first and last rows of Table 1). This suggests that images generated by Shallow Diffuse maintain greater consistency with those of the original Stable Diffusion model. In contrast, methods like Tree-Ring Watermarks, while achieving higher CLIP scores, significantly distort the images, which is undesirable. Figure 1 further illustrates this, showing how Tree-Ring Watermarks introduce a bias toward the inserted key.


Q3: "Please explain why the filter size in the Gaussian blurring is 8 × 8 and how the standard deviation is selected."

A3: We apply the same experiment setting as our baseline method Tree-Ring and RingID.


Q4: "As can be seen from Table 2, the PSNR and SSIM of most methods are very low, so it is easy for human eyes to find modification traces, which easily leads to the risk of watermarked images being maliciously broken. Please further explain the visual quality of the generated watermarked image."

A4: We have included additional qualitative comparisons with non-diffusion-based methods in Figure 8. From the results, it is challenging to visually distinguish our method from these non-diffusion-based approaches and clean images. Furthermore, as demonstrated in Figure 1, our method achieves significantly greater visual consistency with the original image compared to Tree-Ring and RingID.

评论

The author's reply can basically answer my concerns, based on this, I have adjusted the corresponding score.

评论

Thank you for thoroughly reviewing our rebuttal. We sincerely appreciate your time and effort in helping us improve our project.

审稿意见
6

This paper proposed Shallow Diffuse, a watermarking technique for diffusion models. The method is well-motivated and with proper theoretical justification. The proposed Shallow Diffuse has several key advantages compared to existing diffusion watermarks, 1) It is a training-free watermark but simultaneously maintains the consistency between watermarked and original images. 2) It is more robust than existing baselines, achieving nearly no performance drop under different robustness tests. Shallow Diffuse also considers two scenarios including the server (protect generated image) and user (protect existing image) scenarios for injecting the watermark.

优点

  1. Shallow Diffuse's primary strength lies in its utilization of the low-rank property of the PMP's Jacobian matrix to minimize the visual impact of watermarks, thereby attaining visual consistency within a training-free watermark framework.
  2. The injected watermark is more robust against several image distortions than existing baselines.

缺点

  1. The presentation of this paper is poor, for instance, the ablation studies (Appendix C) and index of experimental results (Table 4) are incomplete. Therefore, this leads to a shortage of critical ablation studies.
  2. What is the performance of multi-key identification, specifically, is it possible for the Shallow Diffuse to inject multiple watermarks and distinguish between them?
  3. The image distortions are less than that in previous studies, such as Tree-Ring, where they apply 6 distortions.
  4. Can DiffPure purify the watermarked patterns?
  5. The findings in Table 4 are confusing. It appears that employing channel averaging enhances robustness against image distortions. However, channel averaging involves averaging clean and watermarked images across specific channels. As per my understanding, this process might reduce watermark robustness. Can you explain this observation?

问题

Please see the weaknesses part.

评论

Q1: The presentation of this paper is poor, for instance, the ablation studies (Appendix C) and index of experimental results (Table 4) are incomplete. Therefore, this leads to a shortage of critical ablation studies.

A1: We have improved the presentation in the revised paper. Specifically, we have included discussions on each ablation study in Appendix C, and improved the readability of the tables as suggested. See Q3 of our global response.


Q2: What is the performance of multi-key identification, specifically, is it possible for the Shallow Diffuse to inject multiple watermarks and distinguish between them?

A2: We have added experiments for multi-key watermarking. Please see Q2 of our global response.


Q3: "The image distortions are less than that in previous studies, such as Tree-Ring, where they apply 6 distortions". "Can DiffPure purify the watermarked patterns?"

A3: We have added 7 more adversarial attacks, please see Q1 in our global response to all reviewers. Specifically, we have chosen DiffPure [1] as a specific attack. Shallow Diffuse achieves 1.00 TPR@1%FPR at the server scenario and 0.86 (COCO), 0.9 (DiffusionDB), 1.0 (WikiArt) TPR@1%FPR at the user scenario. Thus, DiffPure is hard to purify the watermarked patterns from Shallow Diffuse.


Q4: "The findings in Table 4 are confusing. It appears that employing channel averaging enhances robustness against image distortions. However, channel averaging involves averaging clean and watermarked images across specific channels. As far as I understand, this process might reduce the robustness of the watermark. Can you explain this observation?"

A4: We do not directly average the clean images and watermarked images in our approach. Instead, we embed the watermark into a single channel while averaging the non-watermarked channels. This design leverages the observation that many image processing operations, such as color jittering or Gaussian blurring, tend to affect all channels uniformly. By isolating the watermark in a single channel, it becomes less susceptible to these transformations. Consequently, channel averaging improves robustness against certain attacks.

[1] Nie, Weili, Brandon Guo, Yujia Huang, Chaowei Xiao, Arash Vahdat, and Anima Anandkumar. "Diffusion models for adversarial purification." arXiv preprint arXiv:2205.07460 (2022).

评论

Thanks for your response, and now this paper seems more complete than the previous version.

评论

Thank you for carefully reviewing our rebuttal. We truly appreciate your time and effort in helping us make our project better.

评论

We sincerely thank all reviewers for their thorough evaluation of our work and for providing valuable and constructive feedback. We are encouraged by the positive remarks, including that our method is “well-motivated,” “significant,” and “effective” (WRZj, kjYg, a7Ds), as well as the recognition of our theoretical analysis as “proper,” “rich,” and “rigorous” (WRZj, kjYg, VSmJ).

Summary of Our Contributions:

In this work, we introduce Shallow Diffuse, a simple yet effective watermarking method that leverages the low-dimensional space inherent in the diffusion model generation process. By decoupling the sampling and watermarking steps, our approach achieves several notable advantages:

  1. Flexibility: To the best of our knowledge, Shallow Diffuse is the first training-free, diffusion-based watermarking method that can be efficiently applied in both user-side and server-side scenarios.

  2. Consistency and Robustness: Extensive experiments demonstrate that Shallow Diffuse consistently outperforms other diffusion-based methods in terms of both robustness and reproducibility.

  3. Theoretical Foundations: Unlike prior methods, our work provides theoretical bounds for both consistency and detectability, offering a solid foundation for the effectiveness of our approach.

Addressing reviewers’ major concerns. We thank the reviewers for their feedback on our presentation and suggested experiments. In response, we have addressed key concerns, including adversarial attack evaluations, multi-key watermarking experiments, and presentation improvements, as detailed below. Reviewer-specific questions have also been addressed individually, with all changes highlighted in red in the revised paper.


Q1: Additional adversarial attack evaluations

A1: We have incorporated 7 more attack methods, including resize and restore, random drop, medium blurring, diffusion purification [1], VAE-based image compression models [2, 3], and stable diffusion-based image regeneration [4]. Detailed settings for these attacks are provided in Appendix C.1, while the experimental results are summarized in Tables 1–4. After taking these attacks into account, Shallow Diffuse is still one of the most robust methods in both the user and the server scenario.


Q2: Experiments on multi-key watermarking.

A2:

We have designed two tasks for evaluating multi-key watermarking: multi-key identification and multi-key re-watermarking.

  • Multi-key identification: This classification task tests the ability to identify individual watermarks among N=2048N=2048 keys, each with a distinct ring-shaped key WiW_i for i=1,...,Ni = 1, ..., N. A random key is embedded into images, and after attacks, the task is to detect if the correct key is identified. The success rate serves as the evaluation metric. Results in Table 5 show that Shallow Diffuse outperforms Tree-Ring despite lacking a multi-key-specific design, while RingID achieves the highest success rate because it is specifically designed for multi-key identification. Future exploration of multi-key identification strategies is promising.

  • Multi-key re-watermarking: This task evaluates embedding and detecting multiple watermarks (tested with two) in the same image. Metrics include the average AUC and TPR@1%FPR over all watermarks. Results in Table 6 demonstrate Shallow Diffuse’s ability to handle multi-key re-watermarking problems, achieving 1.00 for most of the metrics.

Details of the experiment can be found in section C.2.


Q3: Improved presentation in tables and appendix.

A3:

We have re-designed Tables 1, and 2 (layouts and captions) and split the detailed adversarial attack experiments in Tables 3, and 4. We have also added discussions about each ablation study in Appendix C.

[1] Nie, Weili, Brandon Guo, Yujia Huang, Chaowei Xiao, Arash Vahdat, and Anima Anandkumar. "Diffusion models for adversarial purification." International Conference on Machine Learning (ICML 2022).

[2] Ballé, Johannes, David Minnen, Saurabh Singh, Sung Jin Hwang, and Nick Johnston. "Variational image compression with a scale hyperprior." International Conference on Learning Representations (ICLR 2018).

[3] Cheng, Zhengxue, Heming Sun, Masaru Takeuchi, and Jiro Katto. "Learned image compression with discretized gaussian mixture likelihoods and attention modules." In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 7939-7948. 2020.

[4] Zhao, Xuandong, Kexun Zhang, Yu-Xiang Wang, and Lei Li. "Generative autoencoders as watermark attackers: Analyses of vulnerabilities and threats." (2023).

评论

Dear Reviewers, The authors have responded to your valuable comments. Please take a look at them!

Best, AC

AC 元评审

This paper studies diffusion-based digital watermarking to deal with the AI-generated content tracing problem. The proposed approach, ``Shallow Diffuse,'' tries to decouple both the watermarking and diffusion processes by leveraging the presence of a low-dimensional subspace in the image generation process. Both theoretical and empirical analyses were presented.

The authors claimed ``Consistency and Robustness: Extensive experiments demonstrate that Shallow Diffuse consistently outperforms other diffusion-based methods in terms of both robustness and reproducibility.'' in their response. Most reviewers are satisfied by the responses. However, by checking Table 4, Shallow Diffuse presents robustness inferior to RingID under a vert limited set of selected attacks. For multiple key identification presented in Table 5, ShallowDiffuse performs inferior to RingID. In term of these watermarking requirements, it is hard to say that ShallowDiffuse advances the development of diffusion-based watermarking. To surpass and to identify sufficient differences from the prior works, it is encouraged to conduct robustness evaluations under a broad range of attacks/distortions.

审稿人讨论附加意见

Most reviewers are satisfied with the authors' response, except that Reviewer a7Ds ``still believe that the weakness in handling multi-user scenarios is a critical limitation for a watermarking method whose primary focus is on user scenarios.'' As an AC that also has much experiences in digital watermarking, this work needs to conduct a comprehensive robustness evaluation from a broad range of attacks, in particular including geometric distortions.

最终决定

Reject