10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Robust Distortion-free Watermarks for Language Models

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We propose a methodology for planting watermarks in text from an autoregressive language model that are robust to perturbations without changing the distribution over text up to a certain maximum generation budget. We generate watermarked text by mapping a sequence of random numbers -- which we compute using a randomized watermark key -- to a sample from the language model. To detect watermarked text, any party who knows the key can align the text to the random number sequence. We instantiate our watermark methodology with two sampling schemes: inverse transform sampling and exponential minimum sampling. We apply these watermarks to three language models -- OPT-1.3B, LLaMA-7B and Alpaca-7B -- to experimentally validate their statistical power and robustness to various paraphrasing attacks. Notably, for both the OPT-1.3B and LLaMA-7B models, we find we can reliably detect watermarked text (\(p \leq 0.01\)) from \(35\) tokens even after corrupting between \(40\)-\(50\)\% of the tokens via random edits (i.e., substitutions, insertions or deletions). For the Alpaca-7B model, we conduct a case study on the feasibility of watermarking responses to typical user instructions. Due to the lower entropy of the responses, detection is more difficult: around \(25\%\) of the responses -- whose median length is around \(100\) tokens -- are detectable with \(p \leq 0.01\), and the watermark is also less robust to certain automated paraphrasing attacks we implement.

          Related collections

          Author and article information

          Journal
          28 July 2023
          Article
          2307.15593
          cba5a959-7fd4-423b-ac1e-993578b7364b

          http://creativecommons.org/licenses/by/4.0/

          History
          Custom metadata
          cs.LG cs.CL cs.CR

          Theoretical computer science,Security & Cryptology,Artificial intelligence
          Theoretical computer science, Security & Cryptology, Artificial intelligence

          Comments

          Comment on this article