Scaling Camouflage : Content Disguising Attack Against Computer Vision Applications
Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Pages (from-to) | 2017-2028 |
Journal / Publication | IEEE Transactions on Dependable and Secure Computing |
Volume | 18 |
Issue number | 5 |
Online published | 4 Feb 2020 |
Publication status | Published - Sep 2021 |
Link(s)
Abstract
Recently, deep neural networks have achieved state-of-the-art performance in multiple computer vision tasks, and become core parts of computer vision applications. In most of their implementations, a standard input preprocessing component called image scaling is embedded, in order to resize the original data to match the input size of pre-trained neural networks. This paper demonstrates content disguising attacks by exploiting the image scaling procedure, which cause machine's extracted content to be dramatically dissimilar with that before scaled. Different from previous adversarial attacks, our attacks happen in the data preprocessing stage, and hence they are not subject to specific machine learning models. To achieve a better deceiving and disguising effect, we propose and implement three feasible attack approaches with L0-, L2- and L∞-norm distance metrics. We have conducted a comprehensive evaluation on various image classification applications, including three local demos and two remote proprietary services. We also investigate the attack effects on a YOLO-v3 object detection demo. Our experimental results demonstrate successful content disguising against all of them, which validate our approaches are practical.
Research Area(s)
- adversarial examples, computer vision, Content disguising, deep learning, image scaling
Citation Format(s)
Scaling Camouflage : Content Disguising Attack Against Computer Vision Applications. / Chen, Yufei; Shen, Chao; Wang, Cong et al.
In: IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 5, 09.2021, p. 2017-2028.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review