Share your thoughts, 1 month free Claude Pro on usSee more
WorkDL logo mark

Bloodroot: When Watermarking Turns Poisonous For Stealthy Backdoor

About

Backdoor data poisoning is a crucial technique for ownership protection and defending against malicious attacks. Embedding hidden triggers in training data can manipulate model outputs, enabling provenance verification, and deterring unauthorized use. However, current audio backdoor methods are suboptimal, as poisoned audio often exhibits degraded perceptual quality, which is noticeable to human listeners. This work explores the intrinsic stealthiness and effectiveness of audio watermarking in achieving successful poisoning. We propose a novel Watermark-as-Trigger concept, integrated into the Bloodroot backdoor framework via adversarial LoRA fine-tuning, which enhances perceptual quality while achieving a much higher trigger success rate and clean-sample accuracy. Experiments on speech recognition (SR) and speaker identification (SID) datasets show that watermark-based poisoning remains effective under acoustic filtering and model pruning. The proposed Bloodroot backdoor framework not only secures data-to-model ownership, but also well reveals the risk of adversarial misuse.

Kuan-Yu Chen, Yi-Cheng Lin, Jeng-Lin Li, Jian-Jiun Ding• 2025

Related benchmarks

TaskDatasetResultRank
Keyword SpottingSpeech Commands SC-10 v1 (test)
BA95.01
10
Keyword SpottingSpeech Commands SC-30 v1 (test)
BA95.86
10
Speaker IdentificationVoxCeleb Full (test)
BA91.77
10
Speaker IdentificationVoxCeleb 125 speakers (test)
BA92
10
Showing 4 of 4 rows

Other info

Follow for update