Compositional Adversarial Training for Robust Visual Watermarking

University of Maryland

CAT is a plug-in training framework that replaces random augmentation with a learned sequential differentiable adversary, improving robust visual watermark capacity by up to 63.5%.

Conceptual overview of the CAT training pipeline

Overview of the CAT training pipeline. The embedder writes message m into image x to produce a watermarked image. The sequential adversarial augmenter then repeatedly observes the current image, uses a recurrent controller with frozen DINOv2 features to produce logits, and selects an attack family via straight-through Gumbel-Softmax. After T steps, the final attacked image is passed to the extractor, and the message loss drives updates to both the watermark model and the adversary. Entropy regularization keeps the attack policy diverse rather than collapsing to a single destructive sequence.

Results

Single-step augmentation training instability

(a) Single-step augmentation training

Compositional augmentation training instability

(b) Compositional augmentation training

Random augmentation creates unstable training due to inefficient augmentation allocations, whereas the learned adversary consistently targets the model's current weaknesses.

Single-Step Attack Results (T=1)

Even a single learned attack step improves robustness over random augmentation under a fair compute-matched comparison. The largest gains appear for VideoSeal 1.0 and PixelSeal, especially on difficult geometric and combined attacks.

SA-1B

Model (bits) Identity Value Compression Geometric Combined Overall
Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑
InvisMark (100) 0.99095.990.87672.90 0.95488.450.82863.25 0.86167.840.86971.01
TrustMark (100) 0.99698.920.95686.28 0.89879.090.75450.29 0.99397.900.88976.08
MBRS (256) 0.987242.600.915185.99 0.884190.520.65378.90 0.959217.480.834158.92
VideoSeal 0.0 (96) 0.99794.000.98488.69 0.98086.860.94575.58 0.99492.330.96181.06
+ CAT 0.99894.750.97886.93 0.98689.210.95378.60 0.99492.220.96682.85 ↑2.2%
VideoSeal 1.0 (256) 0.898135.170.879123.45 0.872118.960.82294.39 0.892130.600.846106.41
+ CAT 0.941175.630.857129.47 0.896146.110.835114.75 0.921160.390.854125.57 ↑18.0%
PixelSeal (128) 0.91876.460.89568.65 0.88063.890.81948.19 0.90270.270.84956.21
+ CAT 0.986117.730.956102.90 0.957102.960.90083.05 0.973109.360.92591.91 ↑63.5%

Compositional Attack Results (T=2)

The advantage of CAT becomes clearest in the compositional setting, where the adversary applies a two-step attack sequence and must model both attack identity and order. Gains are concentrated on harder mixed and repeated attack pairs.

SA-1B

Model (bits) Val+Val Val+Comp Val+Geom Comp+Comp Comp+Geom Geom+Geom Overall
Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑ Bit acc. ↑Cap. ↑
InvisMark (100) 0.89871.440.65227.15 0.87568.630.4740.85 0.60321.750.88870.52 0.81357.92
TrustMark (100) 0.95786.210.96588.49 0.78652.860.97490.92 0.77950.970.70836.58 0.83462.14
MBRS (256) 0.917182.870.836130.67 0.60241.860.77490.86 0.55415.810.4950.98 0.65360.74
VideoSeal 0.0 (96) 0.97283.440.98587.84 0.96178.080.99291.40 0.97482.790.93072.83 0.96177.79
+ CAT 0.98890.300.99593.28 0.97986.260.99995.34 0.99090.790.93578.05 0.97886.03 ↑10.6%
VideoSeal 1.0 (256) 0.875121.350.887127.69 0.82795.410.897134.39 0.858109.220.79986.78 0.82996.13
+ CAT 0.840121.570.891145.41 0.826109.690.938172.97 0.894141.660.825111.74 0.827108.30 ↑12.7%
PixelSeal (128) 0.964106.450.977112.06 0.954100.250.987117.75 0.968106.430.92293.04 0.95298.76
+ CAT 0.974113.810.990121.27 0.964107.650.998126.29 0.982116.190.928100.21 0.965107.73 ↑9.1%

Training Convergence

PixelSeal training convergence: CAT vs random augmentation

(a) PixelSeal

VideoSeal training convergence: CAT vs random augmentation

(b) VideoSeal

CAT substantially accelerates convergence for both PixelSeal and VideoSeal, reaching lower validation bit error earlier than random augmentation. This advantage persists from single-step to compositional training.

Image Quality

CAT preserves visual quality while improving robustness. All CAT-trained models remain very close to their compute-matched random-augmentation baselines on standard perceptual metrics.

Model SA-1B DIV2K
PSNR ↑SSIM ↑MS-SSIM ↑LPIPS ↓ PSNR ↑SSIM ↑MS-SSIM ↑LPIPS ↓
InvisMark48.770.99550.99640.001849.110.99430.99600.0016
TrustMark41.370.99430.99170.002941.190.99350.99190.0027
MBRS45.580.99590.99650.003245.220.99540.99660.0034
VideoSeal 0.042.500.99340.99490.004942.110.99100.99440.0057
+ CAT42.210.99350.99530.004041.810.99110.99470.0046
VideoSeal 1.042.580.99360.99500.004642.190.99130.99450.0053
+ CAT42.170.99340.99510.003941.750.99090.99460.0045
PixelSeal43.220.99580.99650.002142.710.99400.99610.0023
+ CAT42.640.99560.99630.002142.170.99370.99580.0024

Autoregressive Watermarking

We evaluate CAT in the autoregressive image-generation setting using the WMAR framework on Taming and RAR-XL generators. Robustness is measured via TPR@FPR=1% under no attack, value perturbations, geometric perturbations, adversarial purification, and neural compression.

Taming

Method NoneValueGeometric Adv. Purif.Neural Comp.
Finetune1.000.260.010.690.71
Random Aug.1.000.940.380.920.90
Random Aug.+Sync0.990.900.740.920.89
CAT1.000.940.520.890.87
CAT+Sync0.990.890.710.890.87

RAR-XL

Method NoneValueGeometric Adv. Purif.Neural Comp.
Finetune1.000.530.040.630.77
Random Aug.0.990.970.251.001.00
Random Aug.+Sync0.990.950.381.001.00
CAT1.000.920.350.990.98
CAT+Sync1.000.860.720.990.97

TPR@FPR=1% — higher is better. Values below 0.50 indicate failed detection.

Taming: continuous attack sweeps

(a) Taming: continuous attack sweeps

RAR-XL: continuous attack sweeps

(b) RAR-XL: continuous attack sweeps

Taming: ROC curves

(c) Taming: ROC curves

RAR-XL: ROC curves

(d) RAR-XL: ROC curves

Qualitative Results

Watermarked images under single-step and compositional attacks. CAT (Ours) consistently recovers more bits than random augmentation across all attack types while maintaining imperceptible watermarks.

Qualitative results example 1

BibTeX

@article{satheesh2026cat,
  author    = {Satheesh, Anirudh and Panaitescu-Liess, Michael-Andrei and Xu, Andrew and Milis, Georgios and Huang, Heng and Cai, Zikui and Huang, Furong},
  title     = {Compositional Adversarial Training for Robust Visual Watermarking},
  year      = {2026},
}