ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization
About
Watermarking generative content serves as a vital tool for authentication, ownership protection, and mitigation of potential misuse. Existing watermarking methods face the challenge of balancing robustness and concealment. They empirically inject a watermark that is both invisible and robust and passively achieve concealment by limiting the strength of the watermark, thus reducing the robustness. In this paper, we propose to explicitly introduce a watermark hiding process to actively achieve concealment, thus allowing the embedding of stronger watermarks. To be specific, we implant a robust watermark in an intermediate diffusion state and then guide the model to hide the watermark in the final generated image. We employ an adversarial optimization algorithm to produce the optimal hiding prompt guiding signal for each watermark. The prompt embedding is optimized to minimize artifacts in the generated image, while the watermark is optimized to achieve maximum strength. The watermark can be verified by reversing the generation process. Experiments on various diffusion models demonstrate the watermark remains verifiable even under significant image tampering and shows superior invisibility compared to other state-of-the-art robust watermarking methods. Code is available at https://github.com/Hannah1102/ROBIN.
Related benchmarks
| Task | Dataset | Result | Rank | |
|---|---|---|---|---|
| Watermark Detection | Stable Diffusion-Prompts (SDP) 350 watermarked images | TPR@1%FPR100 | 108 | |
| Watermark Detection | Stable Diffusion Original 2-1 | AUC1 | 16 | |
| Watermark Detection | Stable Diffusion Avg-Removal 2.1 | AUC74.15 | 16 | |
| Latent Watermarking | MS-COCO | FID24.61 | 9 | |
| Watermark Attack | Stable-Diffusion-Prompts | Clean Scenario Performance0.00e+0 | 9 | |
| Watermark Verification | Watermark Robustness Benchmark | Accuracy (No Attack)1 | 9 | |
| Watermark Detection | Stable Diffusion Avg-Forgery 2-1 | AUC87.84 | 8 | |
| Watermark Detection | Stable Diffusion Forgery Attacks Summary 2-1 | Average AUC93.56 | 8 | |
| Watermark Detection | Stable Diffusion Imp-Forgery 2-1 | AUC0.9995 | 8 | |
| Computational Efficiency | General Evaluation | Extraction Time (s)1.248 | 8 |