general_process_define.py 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163
  1. """
  2. 水印通用流程定义
  3. """
  4. import os
  5. from watermark_verify import logger
  6. from watermark_verify.tools import secret_label_func, parse_qrcode_label_file
  7. from watermark_verify.tools.qrcode_tool import detect_and_decode_qr_code
  8. class WhiteBoxWatermarkProcessDefine:
  9. """
  10. 白盒水印通用处理流程定义
  11. """
  12. def __init__(self, model_filename):
  13. """
  14. 检查必要参数,参数检查成功后,初始化参数
  15. """
  16. root_dir = os.path.dirname(model_filename)
  17. logger.info(f"开始检测模型白盒水印, model_filename: {model_filename}, root_dir: {root_dir}")
  18. # 获取签名公钥信息,检查投影矩阵位置
  19. public_key_txt = os.path.join(root_dir, 'keys', 'public.key')
  20. x_random_file = os.path.join(root_dir, 'keys', 'key.npy')
  21. if not os.path.exists(x_random_file):
  22. logger.error(f"x_random_file={x_random_file}, 投影矩阵保存文件不存在")
  23. if not os.path.exists(public_key_txt):
  24. logger.error(f"public_key_txt={public_key_txt}, 签名公钥文件不存在")
  25. raise FileExistsError("签名公钥文件不存在")
  26. with open(public_key_txt, 'r') as file:
  27. public_key = file.read()
  28. logger.debug(f"x_random_file={x_random_file}, public_key_txt={public_key_txt}, public_key={public_key}")
  29. if not public_key or public_key == '':
  30. logger.error(f"获取的签名公钥信息为空, public_key={public_key}")
  31. raise RuntimeError("获取的签名公钥信息为空")
  32. self.model_filename = model_filename
  33. self.x_random_file = x_random_file
  34. self.public_key = public_key
  35. def extract_label(self, start, end):
  36. import onnx
  37. import numpy as np
  38. """
  39. 标签提取
  40. :return: 提取出的密码标签
  41. """
  42. model = onnx.load(self.model_filename) # 加载 ONNX 模型
  43. graph = model.graph # 获取模型图(graph)
  44. weights = []
  45. # 遍历图中的节点
  46. for node in graph.node:
  47. if node.op_type == "Conv": # 查找嵌入白盒水印的卷积层节点,卷积层名字可解析onnx文件后查找得到
  48. weight_name = node.input[1] # 通常第一个是输入x、第二个输入是权重w、第三个是偏置b
  49. for initializer in graph.initializer:
  50. if initializer.name == weight_name:
  51. # 获取权重数据
  52. weights.append(onnx.numpy_helper.to_array(initializer))
  53. weights = weights[start:end]
  54. weights = [np.transpose(weight, (2, 3, 1, 0)) for weight in
  55. weights] # 将onnx文件的权重格式由(out_channels, in_channels, kernel_height, kernel_width),转换为(kernel_height, kernel_width, in_channels, out_channels)
  56. x_random = np.load(self.x_random_file)
  57. # 计算嵌入的白盒水印
  58. w = np.concatenate(
  59. [np.mean(x, axis=3).reshape(-1) for x in weights]) # 处理传入的卷积层的权重参数,对卷积核进行按out_channels维度取平均,拉直
  60. mm = np.dot(x_random, w.reshape((w.shape[0], 1))) # 进行矩阵乘法
  61. sigmoid_mm = 1 / (1 + np.exp(-mm)) # 计算 Sigmoid 函数
  62. prob = sigmoid_mm.flatten() # 拉直运算结果
  63. decode = np.where(prob > 0.5, 1, 0) # 获取最终字节序列
  64. code_string = ''.join([str(x) for x in decode.tolist()]) # 转换为字节序列字符串,类似"0100010011111"
  65. # 将字节序列字符串转换为字符串
  66. secret_label = ''.join(chr(int(code_string[i:i + 8], 2)) for i in range(0, len(code_string), 8))
  67. return secret_label
  68. def verify_label(self, start=0, end=3) -> bool:
  69. """
  70. 标签验证
  71. :param start: 嵌入标签开始卷积层位置,包括起始位置
  72. :param end: 嵌入标签结束卷积层位置,不包括结束位置
  73. :return: 标签验证结果
  74. """
  75. secret_label = self.extract_label(start, end)
  76. label_check_result = secret_label_func.verify_secret_label(secret_label=secret_label,
  77. public_key=self.public_key)
  78. return label_check_result
  79. class BlackBoxWatermarkProcessDefine:
  80. """
  81. 黑盒水印通用处理流程定义
  82. """
  83. def __init__(self, model_filename):
  84. """
  85. 检查必要参数,参数检查成功,返回所需验证参数
  86. :return: 验证所需参数元组
  87. """
  88. root_dir = os.path.dirname(model_filename)
  89. logger.info(f"开始检测模型水印, model_filename: {model_filename}, root_dir: {root_dir}")
  90. # 获取触发集目录,公钥信息
  91. trigger_dir = os.path.join(root_dir, 'trigger')
  92. public_key_txt = os.path.join(root_dir, 'keys', 'public.key')
  93. if not os.path.exists(trigger_dir):
  94. logger.error(f"trigger_dir={trigger_dir}, 触发集目录不存在")
  95. raise FileExistsError("触发集目录不存在")
  96. if not os.path.exists(public_key_txt):
  97. logger.error(f"public_key_txt={public_key_txt}, 签名公钥文件不存在")
  98. raise FileExistsError("签名公钥文件不存在")
  99. with open(public_key_txt, 'r') as file:
  100. public_key = file.read()
  101. logger.debug(f"trigger_dir={trigger_dir}, public_key_txt={public_key_txt}, public_key={public_key}")
  102. if not public_key or public_key == '':
  103. logger.error(f"获取的签名公钥信息为空, public_key={public_key}")
  104. raise RuntimeError("获取的签名公钥信息为空")
  105. qrcode_positions_file = os.path.join(trigger_dir, 'qrcode_positions.txt')
  106. if not os.path.exists(qrcode_positions_file):
  107. raise FileNotFoundError("二维码标签文件不存在")
  108. self.model_filename = model_filename
  109. self.trigger_dir = trigger_dir
  110. self.public_key = public_key
  111. def extract_label(self):
  112. """
  113. 从触发集中提取密码标签
  114. :return: 密码标签
  115. """
  116. # Initialize variables to store the paths
  117. image_folder_path = None
  118. qrcode_positions_file_path = None
  119. label = ''
  120. # Walk through the extracted folder to find the specific folder and file
  121. for root, dirs, files in os.walk(self.trigger_dir):
  122. if 'images' in dirs:
  123. image_folder_path = os.path.join(root, 'images')
  124. if 'qrcode_positions.txt' in files:
  125. qrcode_positions_file_path = os.path.join(root, 'qrcode_positions.txt')
  126. if image_folder_path is None:
  127. raise FileNotFoundError("触发集目录不存在images文件夹")
  128. if qrcode_positions_file_path is None:
  129. raise FileNotFoundError("触发集目录不存在qrcode_positions.txt")
  130. sub_image_dir_names = os.listdir(image_folder_path)
  131. for sub_image_dir_name in sub_image_dir_names:
  132. sub_pic_dir = os.path.join(image_folder_path, sub_image_dir_name)
  133. images = os.listdir(sub_pic_dir)
  134. for image in images:
  135. img_path = os.path.join(sub_pic_dir, image)
  136. watermark_box = parse_qrcode_label_file.load_watermark_info(qrcode_positions_file_path, img_path)
  137. label_part, _ = detect_and_decode_qr_code(img_path, watermark_box)
  138. if label_part is not None:
  139. label = label + label_part
  140. break
  141. return label
  142. def verify_label(self) -> bool:
  143. """
  144. 标签验证
  145. :return: 标签验证结果
  146. """
  147. secret_label = self.extract_label()
  148. label_check_result = secret_label_func.verify_secret_label(secret_label=secret_label,
  149. public_key=self.public_key)
  150. return label_check_result