摘要 Abstract
音频水印被越来越多地用于验证人工智能生成内容的来源,支持检测人工智能生成的语音、保护音乐知识产权以及防范语音克隆等应用。为了有效发挥作用,音频水印必须能够抵抗旨在规避检测的去除攻击。尽管许多方案声称具有鲁棒性,但这些声明通常是在隔离条件下针对有限类型的攻击进行测试的。目前缺乏对多样化去除攻击的系统性评估,阻碍了实际部署。本文研究了声称具有鲁棒性的近期水印方案是否能够抵御广泛的去除攻击。首先,我们引入了一个涵盖22种音频水印方案的分类法。接着,我们总结了其底层技术和潜在漏洞。然后,我们进行了大规模的经验研究,以评估其鲁棒性。为此,我们构建了一个包含22种去除攻击(共计109种配置)的评估框架,包括信号级、物理级和人工智能诱导的失真。我们使用开源代码重现了9种水印方案,并发现了8种新的高效攻击方式,同时揭示了11个关键发现,这些发现暴露了这三种公共数据集上这些方法的根本局限性。我们的结果表明,没有一种被调查的方案能够抵御所有测试的失真。这项评估为当前水印方法在现实威胁下的表现提供了全面的视角。我们的演示和代码可在https://sokaudiowm.github.io/获取。
Audio watermarking is increasingly used to verify the provenance of AI-generated content, enabling applications such as detecting AI-generated speech, protecting music IP, and defending against voice cloning. To be effective, audio watermarks must resist removal attacks that distort signals to evade detection. While many schemes claim robustness, these claims are typically tested in isolation and against a limited set of attacks. A systematic evaluation against diverse removal attacks is lacking, hindering practical deployment. In this paper, we investigate whether recent watermarking schemes that claim robustness can withstand a broad range of removal attacks. First, we introduce a taxonomy covering 22 audio watermarking schemes. Next, we summarize their underlying technologies and potential vulnerabilities. We then present a large-scale empirical study to assess their robustness. To support this, we build an evaluation framework encompassing 22 types of removal attacks (109 configurations) including signal-level, physical-level, and AI-induced distortions. We reproduce 9 watermarking schemes using open-source code, identify 8 new highly effective attacks, and highlight 11 key findings that expose the fundamental limitations of these methods across 3 public datasets. Our results reveal that none of the surveyed schemes can withstand all tested distortions. This evaluation offers a comprehensive view of how current watermarking methods perform under real-world threats. Our demo and code are available at https://sokaudiowm.github.io/.