Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A Crack in the Bark - Leveraging Public Knowledge to Remove Tree-Ring Watermarks

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about a groundbreaking security vulnerability in Tree-Ring watermarking systems through this 17-minute conference presentation from USENIX Security '25. Discover how researchers Junhua Lin and Marc Juarez from the University of Edinburgh developed a novel attack that exploits publicly available variational autoencoders to effectively remove Tree-Ring watermarks from diffusion model outputs. Explore the technical methodology behind this surrogate-based attack approach that requires only access to the variational autoencoder used during the target diffusion model's training phase, rather than full model access like previous removal techniques. Examine the dramatic experimental results showing how the attack reduces the Tree-Ring detector's AUC from 0.993 to 0.153 for ROC curves and from 0.994 to 0.385 for PR curves while preserving high image quality. Understand the significant security implications for current industry practices that commonly reuse public autoencoders in diffusion model training, and analyze why the Tree-Ring detector's precision metrics may be insufficient for real-world deployment scenarios. Gain insights into this previously unconsidered threat vector that challenges the robustness assumptions of state-of-the-art watermarking techniques for AI-generated content.

Syllabus

USENIX Security '25- A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks

Taught by

USENIX

Reviews

Start your review of A Crack in the Bark - Leveraging Public Knowledge to Remove Tree-Ring Watermarks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.