In recent years, data poisoning attacks have been increasingly designed to appear harmless and even beneficial, often with the intention of verifying dataset ownership or safeguarding private data from unauthorized use. However, these developments have the potential to cause misunderstandings and conflicts, as data poisoning has traditionally been regarded as a security threat to machine learning systems. To address this issue, it is imperative for harmless poisoning generators to claim ownership of their generated datasets, enabling users to identify potential poisoning to prevent misuse. In this paper, we propose the deployment of watermarking schemes as a solution to this challenge. We introduce two provable and practical watermarking approaches for data poisoning: {\em post-poisoning watermarking} and {\em poisoning-concurrent watermarking}. Our analyses demonstrate that when the watermarking length is $Î(\sqrt{d}/ε_w)$ for post-poisoning watermarking, and falls within the range of $Î(1/ε_w^2)$ to $O(\sqrt{d}/ε_p)$ for poisoning-concurrent watermarking, the watermarked poisoning dataset provably ensures both watermarking detectability and poisoning utility, certifying the practicality of watermarking under data poisoning attacks. We validate our theoretical findings through experiments on several attacks, models, and datasets.
In recent years, data poisoning attacks have increasingly been designed in seemingly benign or even beneficial forms, commonly used for dataset ownership verification or protecting private data from unauthorized use. However, these developments may lead to misunderstandings and conflicts, as data poisoning has traditionally been viewed as a security threat to machine learning systems. To address this issue, benign poisoning generators must declare ownership of their generated datasets, enabling users to identify potential poisoning to prevent misuse. This paper proposes deploying watermarking schemes as a solution to this challenge, introducing two provably secure and practical data poisoning watermarking methods: post-poisoning watermarking and poisoning-concurrent watermarking. Analysis demonstrates that when watermark length is Θ(√d/ε_w) (post-poisoning watermarking) and ranges from Θ(1/ε_w²) to O(√d/ε_p) (poisoning-concurrent watermarking), watermarked poisoned datasets provably ensure watermark detectability and poisoning utility.
Paradigm Shift: Data poisoning attacks are transitioning from traditional malicious threats to "benign" applications, such as dataset ownership verification and preventing unauthorized use
Transparency Issues: When poisoning is used for protective purposes, authorized users may inadvertently use poisoned data, leading to misunderstandings and conflicts
Lack of Accountability: Existing detection methods lack a unified framework and provable declaration mechanisms
First Framework for Data Poisoning Watermarking: Applies watermarking techniques to data poisoning scenarios, providing transparency and accountability
Two Watermarking Schemes:
Post-poisoning watermarking: Third-party entities create watermarks for already-poisoned datasets
Poisoning-concurrent watermarking: Poisoning generators simultaneously create watermarks and poisoning
Theoretical Guarantees: Provides rigorous theoretical analysis of watermark detectability and poisoning utility
Practical Validation: Verifies theoretical findings across multiple attacks, models, and datasets
This paper is the first to systematically apply watermarking techniques to data poisoning scenarios, providing theoretical guarantees and practical solutions.
Key Management: Support key rotation and HMAC authentication
Integrity Verification: SHA256 hashing ensures data integrity
Access Control: HTTPS-based secure key distribution
Scalability: Support large-scale dataset processing
Summary: This paper makes pioneering contributions at the intersection of data poisoning and watermarking techniques, providing not only rigorous theoretical analysis but also practical solutions. While there remains room for improvement in defense robustness and theoretical completeness, the problem it addresses has significant real-world importance, offering new research directions and tools for AI safety and data protection.