Dual-Guard: Dual-Channel Latent Watermarking for Provenance and Tamper Localization in Diffusion Images
JinFeng Xie, Chengfu Ou, Peipeng Yu, Xiaoyu Zhou, Dingding Huang + 3 more
TLDR
Dual-Guard is a dual-channel latent watermarking framework for diffusion images, enabling provenance verification, framing resistance, and tamper localization.
Key contributions
- Introduces Dual-Guard, a dual-channel latent watermarking framework for diffusion images.
- Uses Gaussian Shading for global provenance and Latent Fingerprint Codec for content integrity.
- Resists reprompting attacks by preserving the global provenance signal.
- Enables region-level tamper localization by identifying disturbances in the content anchor.
Why it matters
This paper introduces Dual-Guard, a crucial solution for verifying the provenance and integrity of AI-generated diffusion images. It offers robust, practical tamper localization and framing resistance, essential for building trust in AIGC.
Original Abstract
The rapid adoption of diffusion-based generative models has intensified concerns over the attribution and integrity of AI-generated content (AIGC). Existing single-domain watermarking methods either fail under regeneration, remain vulnerable to black-box reprompting that enables adversarial framing, or provide no spatial evidence for tampered regions. We propose Dual-Guard, a dual-channel latent watermarking framework for practical provenance verification, framing resistance, and region-level tamper localization. Dual-Guard combines two complementary anchors: a Gaussian Shading watermark in the initial diffusion noise as a global provenance signal, and a Latent Fingerprint Codec in the final denoised latent as a structured content anchor. Reprompting tends to preserve the former while breaking the latter, whereas localized edits disturb the content anchor only in tampered regions. In Full mode on a 2,400-sample benchmark, Dual-Guard keeps clean-image authentication false rejection and tamper false alarm below one half of one percent, while maintaining near-complete detection under reprompting, diffusion editing, and eight local tampering attacks.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.