Loading [MathJax]/extensions/MathMenu.js
EKILA: Synthetic Media Provenance and Attribution for Generative Art | IEEE Conference Publication | IEEE Xplore

EKILA: Synthetic Media Provenance and Attribution for Generative Art


Abstract:

We present EKILA; a decentralized framework that enables creatives to receive recognition and reward for their contributions to generative AI (GenAI). EKILA proposes a ro...Show More

Abstract:

We present EKILA; a decentralized framework that enables creatives to receive recognition and reward for their contributions to generative AI (GenAI). EKILA proposes a robust visual attribution technique and combines this with an emerging content provenance standard (C2PA) to address the problem of synthetic image provenance – determining the generative model and training data responsible for an AI-generated image. Furthermore, EKILA extends the non-fungible token (NFT) ecosystem to introduce a tokenized representation for rights, enabling a triangular relationship between the asset’s Ownership, Rights, and Attribution (ORA). Leveraging the ORA relationship enables creators to express agency over training consent and, through our attribution model, to receive apportioned credit, including royalty payments for the use of their assets in GenAI.
Date of Conference: 17-24 June 2023
Date Added to IEEE Xplore: 14 August 2023
ISBN Information:

ISSN Information:

Conference Location: Vancouver, BC, Canada
References is not available for this document.

1. Introduction

EKILA combines robust visual attribution with Distributed Ledger Technology (DLT) to recognize and reward creative contributions to generative art. A cymbal generated by a Latent Diffusion Model (LDM) trained on LAION-400M is attributed to a subset of training images, credit weight apportioned, and royalties paid using our proposed method.

Select All
1.
CAIP: Chain agnostic improvement proposals (CAIP-2), [online] Available: https://github.com/ChainAgnostic/CAIPs/blob/master/CAIPs/caip-2.md.
2.
EIP-2981: NFT royalty standard, [online] Available: https://eips.ethereum.org/EIPS/eip-2981.
3.
ERC-721: Non-fungible token standard, [online] Available: https://eips.ethereum.org/EIPS/eip-721.
4.
Stable attribution, [online] Available: https://www.stableattribution.com/.
5.
J. Aythora, R. Burke-Agüero, A. Chamayou, S. Clebsch, M. Costa, J. Deutscher, N. Earnshaw, L. Ellis, P. England, C. Fournet et al., "Multi-stakeholder media provenance management to counter synthetic media risks in news publishing", Proc. Intl. Broadcasting Convention (IBC), 2020.
6.
Sami Baba, Lala Krikor, Thawar Arif and Zyad Shaaban, "Watermarking scheme for copyright protection of digital images", IJCSNS, vol. 9, no. 4, 2019.
7.
Aparna Bharati, Daniel Moreira, Patrick Flynn, Anderson de Rezende Rocha, Kevin Bowyer and Walter Scheirer, "Transformation-aware embeddings for image provenance", IEEE Trans. Info. Forensics and Sec., vol. 16, pp. 2493-2507, 2021.
8.
Sangam Bhujel and Yogachandran Rahulamathavan, "A survey: Security transparency and scalability issues of nft’s and its marketplaces", J. Sensors. MDPI., vol. 22, no. 22, 2022.
9.
Alexander Black, Tu Bui, Hailin Jin, Vishy Swaminathan and John Collomosse, "Deep image comparator: Learning to visualize editorial change", Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 972-980, June 2021.
10.
Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramer, et al., "Extracting training data from diffusion models", 2023.
11.
Ting Chen, Simon Kornblith, Mohammad Norouzi and Geoffrey Hinton, "A simple framework for contrastive learning of visual representations", International conference on machine learning, pp. 1597-1607, 2020.
12.
"Coalition for Content Provenance and Authenticity", Draft technical specification 0.7. Technical report C2PA, 2021.
13.
P. Meenakshi Devi, M. Venkatesan and Kumaresan Duraiswamy, "A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform", J. Computer Science, vol. 5, no. 11, pp. 831-837, 2019.
14.
Prafulla Dhariwal and Alexander Nichol, "Diffusion models beat gans on image synthesis", vol. 34, pp. 8780-8794, 2021.
15.
Brian Dolhansky, Joanna Bitton, Ben Pflaum, Jikuo Lu, Russ Howes, Menglin Wang, et al., "The deepfake detection challenge (DFDC) dataset", CoRR, 2020.
16.
Joshua Fairfield, "Tokenized: The law of non-fungible tokens and unique digital property", Indiana Law Journal, 2021.
17.
Matt Fredrikson, Somesh Jha and Thomas Ristenpart, "Model inversion attacks that exploit confidence information and basic countermeasures", ACM Conference on Computer and Communications Security (CCS), 2015.
18.
Oran Gafni, Adam Polyak, Oron Ashual, Shelly Sheynin, Devi Parikh and Yaniv Taigman, "Make-a-scene: Scenebased text-to-image generation with human priors", 2022.
19.
Luca Guarnera, Oliver Giudice and Sebastiano Battiato, "Deepfake detection by analyzing convolutional traces", Proc. CVPR WS, pp. 666-667, 2020.
20.
Dan Hendrycks and Thomas Dietterich, "Benchmarking neural network robustness to common corruptions and perturbations", Proceedings of the International Conference on Learning Representations, 2019.
21.
Jonathan Ho, Ajay Jain and Pieter Abbeel, "Denoising diffusion probabilistic models", NeurIPS, vol. 33, pp. 6840-6851, 2020.
22.
Hailong Hu and Jun Pang, "Membership inference of diffusion models", 2023.
23.
Jeff Johnson, Matthijs Douze and Hervé Jégou, "Billionscale similarity search with GPUs", IEEE Transactions on Big Data, vol. 7, no. 3, pp. 535-547, 2019.
24.
Tero Karras, Samuli Laine and Timo Aila, "A style-based generator architecture for generative adversarial networks", CVPR, 2019.
25.
Tero Karras, Samuli Laine, Miika Aittala, Janne Hellsten, Jaakko Lehtinen and Timo Aila, "Analyzing and improving the image quality of stylegan", CVPR, 2020.
26.
Yann LeCun and Corinna Cortes, MNIST handwritten digit database, 2010.
27.
Bowen Li, Xiaojuan Qi, Philip HS Torr and Thomas Lukasiewicz, "Image-to-image translation with text guidance", 2020.
28.
Horniman Museum London, Ekila: The rules of sharing, 2014.
29.
Ghazal Mazaheri and Amit K Roy-Chowdhury, "Detection and localization of facial expression manipulations", Proc. WCACV, pp. 1035-1045, 2022.
30.
Eric Nguyen, Tu Bui, Vishy Swaminathan and John Collomosse, "Oscar-net: Object-centric scene graph attention for image attribution", Proc. ICCV, 2021.

Contact IEEE to Subscribe

References

References is not available for this document.