SlideShare uma empresa Scribd logo
1 de 25
Seeing is Not
Believing: Camouflage
Attacks on Image
Scaling Algorithms
Junyaup Kim
20-03-11
TL DR
‱ This paper suggests image generation algorithm to form as convex optimization
to attack image scaling function. The objective of attack is
1. Make image 𝐮 to đ” when the 𝐮 is resized.
2. The distortion should be small enough that attack image should be almost looks
like 𝐮
‱ By this, we can assure that this attack is model-free. You can attack any model
that is using certain frame work and certain scaling function. And scaling
function is used in any code line
‱ They suggests effective querying process to reveal Cloud Vision API provider’s
scaling size
Prerequisite
What is scaling?
‱ Scaling function is resizing function that make input
image to match specific shape.
‱ Deep learning model is basically matrix calculation.
So we should make our input static (solid shape)
Prerequisite
Inconsistency in DL model input shape and camera size
Basic Camera resolution chart Deep learning model input shape
Image scaling function is essential to every deep learning model.
Prerequisite
Interpolation and sampling
Bilinear interpolation
Interpolation: A type of estimation, a method of
constructing new data points within the range of a
discrete set of known data points. [Inter + pole]
Linear InterpolationGiven set Spline Interpolation
Prerequisite
Interpolation and sampling
Sampling: sampling is the reduction of a
continuous-time signal to a discrete-time signal
Bit depth : Quantization of input signal
Sampling rate : Quantization of time segment
Prerequisite
The Nyquist theorem specifies that a sinusoidal function in time or
distance can be regenerated with no loss of information as long as it is
sampled at a frequency greater than or equal to twice per cycle.
Alias and Nyquist Theorem
Nyquist Theorem
Prerequisite
Nyquist Theorem
Let’s suppose that pixel values are the discrete signal.
When we scale down the input image, we have not sufficient information of original image
value. To prevent aliasing artifacts, we must use filter to erase the aliasing artifacts.
Without optical low-pass filter With optical low-pass filterWithout optical low-pass filter
Prerequisite conclusion
1. Pixels are discrete signal.
2. We need filter with coefficient to scale down the image.
3. Scaling the image can be considered at data under-sampling
4. Due to physical limitations, scaling is used almost every deep
learning model.
Main subject
1. Background
‱ A lot of DL Framework provide
their own image resize
method.
‱ Order of interpolation is
Horizonal to vertical.(element
wise to channel-wise)
Main subject
1. Background
‱ Even though you are not using
resize function, somewhere in
the framework might inferring
the resize function.
Main subject
2. Objective
‱ The objective of this goal is map
the perturbations on Source
image that after scaling function
𝑆𝑐𝑎𝑙𝑒đč𝑱𝑛𝑐(đ‘„) , the attack image
turns into target image.
𝑆𝑐𝑎𝑙𝑒đč𝑱𝑛𝑐(đ‘„)
Source Image
Attack Image Target Image
𝑆𝑐𝑎𝑙𝑒đč𝑱𝑛𝑐(đ‘„)
Source Image
Attack Image Target image
Main subject
3. Taxonomy
‱ Source image (𝑆 𝑚∗𝑛): the image that an
attacker wants the attack image to look like
‱ Attack image (𝐮 𝑚∗𝑛): the crafted image
eventually created and fed to the scaling
function
‱ Output image (đ· 𝑚â€Č∗𝑛â€Č): the output image of
the scaling function
‱ Target image (𝑇 𝑚â€Č∗𝑛â€Č): the image that the
attacker wants the outImg to look like
‱ Scale function (ScaleFunc): The scaling function
of image.
𝑆 𝑚∗𝑛 + ∆1 = 𝐮 𝑚∗𝑛
∆1 = 𝐮 𝑚∗𝑛- 𝑆 𝑚∗𝑛
∆2 = đ· 𝑚â€Č∗𝑛â€Č - 𝑇 𝑚â€Č∗𝑛â€Č
Main subject
4. Attack method
‱ Strong attack form: we KNOW the source image
that wants to make it to attack image
‱ Weak attack: we DON’T know the source image
that wants to make it to attack image.
Unknown +
Example output image
=
Main subject
4.1 Strong attack form
‱ Strong attack form: we KNOW the source image
that wants to make it to attack image
‱ Weak attack: we DON’T know the source image
that wants to make it to attack image.
Objective function: min(| 𝐮 𝑚∗𝑛− 𝑆 𝑚∗𝑛 |2
)
Constraints: ||𝑇 𝑚â€Č∗𝑛â€Č - đ· 𝑚â€Č∗𝑛â€Č||∞ ≀ 𝜀 ∗ đŒđ‘ đ‘šđ‘Žđ‘„
Main subject
4.1 Coefficient analysis
‱ As we said before, we need filter matrix to
resize not to alias the image.
‱ And because of overlapping in filter
matrix(like CNN) we need to calculate
separately to make perturbation
Main subject
4.2 Coefficient analysis
‱ Horizontal scaling (𝑚 ∗ 𝑛 → 𝑚 ∗ 𝑛â€Č)
‱ Vertical scaling(𝑚 ∗ 𝑛â€Č → 𝑚â€Č ∗ 𝑛â€Č)
Coefficient matrix example
Vertical Horizontal
Craft sequence
Main subject
4.3 Strong attack form
‱ Constraints is a upper boundary of pixel
value(Constant function). So this constraints is
Linear.
‱ By that, we can calculate this as a convex form
Objective function: min(| 𝐮 𝑚∗𝑛− 𝑆 𝑚∗𝑛 |2
)
Constraints: ||𝑇 𝑚â€Č∗𝑛â€Č - đ· 𝑚â€Č∗𝑛â€Č||∞ ≀ 𝜀 ∗ đŒđ‘ đ‘šđ‘Žđ‘„
WLOG
Main subject
4.4 Strong attack form algorithm analysis
‱ Decomposition into sub matrix problem.
Main subject
4.5 Cloud inference attack(black box)
‱ We have to know the exact size of
cloud DL model input size.
‱ inferring model image serach space is
𝑂 𝑁4
= (𝑃𝑎𝑘𝑐𝑎𝑔𝑒 ∗
𝑆𝑐𝑎𝑙𝑖𝑛𝑔 𝑚𝑒𝑡ℎ𝑜𝑑 ∗ ℎ𝑒𝑖𝑔ℎ𝑡 ∗ đ‘€đ‘–đ‘‘đ‘Ąâ„Ž)
 setting range[201,300] in H, W
 Infer different class by k times at the same
time (k=4)
Main subject
5.1 Result
‱ Attack target: Azure, Baidu, Aliyun, Tencent
‱ Testing Dataset: 935 (Crafted)
 Class except Sheep or sheep-like animal
 Set as 800*600 image
 𝜀 = 0.01
 Target = Sheep
‱ Baidu , Aliyun ,Tencent got 100% success ratio
where as Azuzre is more complex
‱ CDF(cumulative distribution function) shows
that Tag and description is successfully attacked
by this algorithm.
Main subject
Main subject
5.2 Possible attack scenario
‱ Data poisoning on database.
‱ Detection evasion and Cloaking on CNN
based deep learning models.
‱ Fraud by Leveraging Inconsistencies
between Displays. (ex mobile)
Main subject
5.3 Detection of attack
‱ Color-histogram-based Detection
‱ Color-scattering-based Detection
Conclusion
6. Pros
‱ This attack is model-free attack. It means
that we can use this attack in any situation
(not only limited in Deep learning)
‱ This attack is more light-weight than
adversarial attack by deep learning.
‱ Attack success ratio & confidence is high.
6. Cons
‱ If the model do not use the resize method(such
as yolo based object detection). It cannot be
successful.
‱ Only can be applied on smaller attack image
‱ The perturbations are easily recognizable by
human. The key of this kind of attack is should
be out of human-eye. You can easily recognize
that this image is somewhat wrong.

Mais conteĂșdo relacionado

Mais procurados

Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filtersA B Shinde
 
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...JaeJun Yoo
 
Digital image processing Tool presentation
Digital image processing Tool presentationDigital image processing Tool presentation
Digital image processing Tool presentationdikshabehl5392
 
Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...
Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...
Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...Jedha Bootcamp
 
An overview of gradient descent optimization algorithms
An overview of gradient descent optimization algorithms An overview of gradient descent optimization algorithms
An overview of gradient descent optimization algorithms Hakky St
 
Image Enhancement
Image Enhancement Image Enhancement
Image Enhancement Deven Sahu
 
Contrast enhancement in digital images
Contrast enhancement in digital imagesContrast enhancement in digital images
Contrast enhancement in digital imagesSakher BELOUADAH
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainDEEPASHRI HK
 
Image enhancement
Image enhancementImage enhancement
Image enhancementKuppusamy P
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filteringDeepikaT13
 
Super resolution in deep learning era - Jaejun Yoo
Super resolution in deep learning era - Jaejun YooSuper resolution in deep learning era - Jaejun Yoo
Super resolution in deep learning era - Jaejun YooJaeJun Yoo
 
JonathanWestlake_ComputerVision_Project1
JonathanWestlake_ComputerVision_Project1JonathanWestlake_ComputerVision_Project1
JonathanWestlake_ComputerVision_Project1Jonathan Westlake
 
Simultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesSimultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesCristina PĂ©rez Benito
 
Spatial enhancement
Spatial enhancement Spatial enhancement
Spatial enhancement abinarkt
 
Smoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainSmoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainMadhu Bala
 
Remote Sensing Lec 10
Remote Sensing Lec 10Remote Sensing Lec 10
Remote Sensing Lec 10polylsgiedx
 
image enhancement
 image enhancement image enhancement
image enhancementRajendra Prasad
 
Improved Alpha-Tested Magnification for Vector Textures and Special Effects
Improved Alpha-Tested Magnification for Vector Textures and Special EffectsImproved Alpha-Tested Magnification for Vector Textures and Special Effects
Improved Alpha-Tested Magnification for Vector Textures and Special Effectsナム-Nam Nguyễn
 

Mais procurados (20)

Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
 
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Anal...
 
Digital image processing Tool presentation
Digital image processing Tool presentationDigital image processing Tool presentation
Digital image processing Tool presentation
 
Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...
Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...
Faire de la reconnaissance d'images avec le Deep Learning - Cristina & Pierre...
 
An overview of gradient descent optimization algorithms
An overview of gradient descent optimization algorithms An overview of gradient descent optimization algorithms
An overview of gradient descent optimization algorithms
 
Image Enhancement
Image Enhancement Image Enhancement
Image Enhancement
 
Contrast enhancement in digital images
Contrast enhancement in digital imagesContrast enhancement in digital images
Contrast enhancement in digital images
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
 
Super resolution in deep learning era - Jaejun Yoo
Super resolution in deep learning era - Jaejun YooSuper resolution in deep learning era - Jaejun Yoo
Super resolution in deep learning era - Jaejun Yoo
 
JonathanWestlake_ComputerVision_Project1
JonathanWestlake_ComputerVision_Project1JonathanWestlake_ComputerVision_Project1
JonathanWestlake_ComputerVision_Project1
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Simultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesSimultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color Images
 
Spatial enhancement
Spatial enhancement Spatial enhancement
Spatial enhancement
 
Smoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainSmoothing Filters in Spatial Domain
Smoothing Filters in Spatial Domain
 
Remote Sensing Lec 10
Remote Sensing Lec 10Remote Sensing Lec 10
Remote Sensing Lec 10
 
image enhancement
 image enhancement image enhancement
image enhancement
 
Enhancement in Digital Image Processing
Enhancement in Digital Image ProcessingEnhancement in Digital Image Processing
Enhancement in Digital Image Processing
 
Improved Alpha-Tested Magnification for Vector Textures and Special Effects
Improved Alpha-Tested Magnification for Vector Textures and Special EffectsImproved Alpha-Tested Magnification for Vector Textures and Special Effects
Improved Alpha-Tested Magnification for Vector Textures and Special Effects
 

Semelhante a Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms Review

Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonAditya Bhattacharya
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
cvpresentation-190812154654 (1).pptx
cvpresentation-190812154654 (1).pptxcvpresentation-190812154654 (1).pptx
cvpresentation-190812154654 (1).pptxPyariMohanJena
 
ppt 20BET1024.pptx
ppt 20BET1024.pptxppt 20BET1024.pptx
ppt 20BET1024.pptxManeetBali
 
Computer Vision.pptx
Computer Vision.pptxComputer Vision.pptx
Computer Vision.pptxGDSCIIITDHARWAD
 
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakLearn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakPyData
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
Deceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsDeceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsLeonardoSalvucci1
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...
YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...
YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...JacobSilbiger1
 
Image De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural NetworkImage De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural Networkaciijournal
 
Image De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural NetworkImage De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural Networkaciijournal
 
IMAGE DE-NOISING USING DEEP NEURAL NETWORK
IMAGE DE-NOISING USING DEEP NEURAL NETWORKIMAGE DE-NOISING USING DEEP NEURAL NETWORK
IMAGE DE-NOISING USING DEEP NEURAL NETWORKaciijournal
 
BMVA summer school MATLAB programming tutorial
BMVA summer school MATLAB programming tutorialBMVA summer school MATLAB programming tutorial
BMVA summer school MATLAB programming tutorialpotaters
 
Convolutional Neural Network and Its Applications
Convolutional Neural Network and Its ApplicationsConvolutional Neural Network and Its Applications
Convolutional Neural Network and Its ApplicationsKasun Chinthaka Piyarathna
 

Semelhante a Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms Review (20)

cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
 
Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathon
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
cvpresentation-190812154654 (1).pptx
cvpresentation-190812154654 (1).pptxcvpresentation-190812154654 (1).pptx
cvpresentation-190812154654 (1).pptx
 
ppt 20BET1024.pptx
ppt 20BET1024.pptxppt 20BET1024.pptx
ppt 20BET1024.pptx
 
Computer Vision.pptx
Computer Vision.pptxComputer Vision.pptx
Computer Vision.pptx
 
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakLearn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
Deceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic SignsDeceiving Autonomous Cars with Toxic Signs
Deceiving Autonomous Cars with Toxic Signs
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...
YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...
YU CS Summer 2021 Project | TensorFlow Street Image Classification and Object...
 
Image De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural NetworkImage De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural Network
 
Image De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural NetworkImage De-Noising Using Deep Neural Network
Image De-Noising Using Deep Neural Network
 
IMAGE DE-NOISING USING DEEP NEURAL NETWORK
IMAGE DE-NOISING USING DEEP NEURAL NETWORKIMAGE DE-NOISING USING DEEP NEURAL NETWORK
IMAGE DE-NOISING USING DEEP NEURAL NETWORK
 
IMAGE PROCESSING
IMAGE PROCESSINGIMAGE PROCESSING
IMAGE PROCESSING
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
BMVA summer school MATLAB programming tutorial
BMVA summer school MATLAB programming tutorialBMVA summer school MATLAB programming tutorial
BMVA summer school MATLAB programming tutorial
 
OpenCV.pdf
OpenCV.pdfOpenCV.pdf
OpenCV.pdf
 
N046047780
N046047780N046047780
N046047780
 
Convolutional Neural Network and Its Applications
Convolutional Neural Network and Its ApplicationsConvolutional Neural Network and Its Applications
Convolutional Neural Network and Its Applications
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms Review

  • 1. Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms Junyaup Kim 20-03-11
  • 2. TL DR ‱ This paper suggests image generation algorithm to form as convex optimization to attack image scaling function. The objective of attack is 1. Make image 𝐮 to đ” when the 𝐮 is resized. 2. The distortion should be small enough that attack image should be almost looks like 𝐮 ‱ By this, we can assure that this attack is model-free. You can attack any model that is using certain frame work and certain scaling function. And scaling function is used in any code line ‱ They suggests effective querying process to reveal Cloud Vision API provider’s scaling size
  • 3. Prerequisite What is scaling? ‱ Scaling function is resizing function that make input image to match specific shape. ‱ Deep learning model is basically matrix calculation. So we should make our input static (solid shape)
  • 4. Prerequisite Inconsistency in DL model input shape and camera size Basic Camera resolution chart Deep learning model input shape Image scaling function is essential to every deep learning model.
  • 5. Prerequisite Interpolation and sampling Bilinear interpolation Interpolation: A type of estimation, a method of constructing new data points within the range of a discrete set of known data points. [Inter + pole] Linear InterpolationGiven set Spline Interpolation
  • 6. Prerequisite Interpolation and sampling Sampling: sampling is the reduction of a continuous-time signal to a discrete-time signal Bit depth : Quantization of input signal Sampling rate : Quantization of time segment
  • 7. Prerequisite The Nyquist theorem specifies that a sinusoidal function in time or distance can be regenerated with no loss of information as long as it is sampled at a frequency greater than or equal to twice per cycle. Alias and Nyquist Theorem Nyquist Theorem
  • 8. Prerequisite Nyquist Theorem Let’s suppose that pixel values are the discrete signal. When we scale down the input image, we have not sufficient information of original image value. To prevent aliasing artifacts, we must use filter to erase the aliasing artifacts. Without optical low-pass filter With optical low-pass filterWithout optical low-pass filter
  • 9. Prerequisite conclusion 1. Pixels are discrete signal. 2. We need filter with coefficient to scale down the image. 3. Scaling the image can be considered at data under-sampling 4. Due to physical limitations, scaling is used almost every deep learning model.
  • 10. Main subject 1. Background ‱ A lot of DL Framework provide their own image resize method. ‱ Order of interpolation is Horizonal to vertical.(element wise to channel-wise)
  • 11. Main subject 1. Background ‱ Even though you are not using resize function, somewhere in the framework might inferring the resize function.
  • 12. Main subject 2. Objective ‱ The objective of this goal is map the perturbations on Source image that after scaling function 𝑆𝑐𝑎𝑙𝑒đč𝑱𝑛𝑐(đ‘„) , the attack image turns into target image. 𝑆𝑐𝑎𝑙𝑒đč𝑱𝑛𝑐(đ‘„) Source Image Attack Image Target Image 𝑆𝑐𝑎𝑙𝑒đč𝑱𝑛𝑐(đ‘„) Source Image Attack Image Target image
  • 13. Main subject 3. Taxonomy ‱ Source image (𝑆 𝑚∗𝑛): the image that an attacker wants the attack image to look like ‱ Attack image (𝐮 𝑚∗𝑛): the crafted image eventually created and fed to the scaling function ‱ Output image (đ· 𝑚â€Č∗𝑛â€Č): the output image of the scaling function ‱ Target image (𝑇 𝑚â€Č∗𝑛â€Č): the image that the attacker wants the outImg to look like ‱ Scale function (ScaleFunc): The scaling function of image. 𝑆 𝑚∗𝑛 + ∆1 = 𝐮 𝑚∗𝑛 ∆1 = 𝐮 𝑚∗𝑛- 𝑆 𝑚∗𝑛 ∆2 = đ· 𝑚â€Č∗𝑛â€Č - 𝑇 𝑚â€Č∗𝑛â€Č
  • 14. Main subject 4. Attack method ‱ Strong attack form: we KNOW the source image that wants to make it to attack image ‱ Weak attack: we DON’T know the source image that wants to make it to attack image. Unknown + Example output image =
  • 15. Main subject 4.1 Strong attack form ‱ Strong attack form: we KNOW the source image that wants to make it to attack image ‱ Weak attack: we DON’T know the source image that wants to make it to attack image. Objective function: min(| 𝐮 𝑚∗𝑛− 𝑆 𝑚∗𝑛 |2 ) Constraints: ||𝑇 𝑚â€Č∗𝑛â€Č - đ· 𝑚â€Č∗𝑛â€Č||∞ ≀ 𝜀 ∗ đŒđ‘ đ‘šđ‘Žđ‘„
  • 16. Main subject 4.1 Coefficient analysis ‱ As we said before, we need filter matrix to resize not to alias the image. ‱ And because of overlapping in filter matrix(like CNN) we need to calculate separately to make perturbation
  • 17. Main subject 4.2 Coefficient analysis ‱ Horizontal scaling (𝑚 ∗ 𝑛 → 𝑚 ∗ 𝑛â€Č) ‱ Vertical scaling(𝑚 ∗ 𝑛â€Č → 𝑚â€Č ∗ 𝑛â€Č) Coefficient matrix example Vertical Horizontal Craft sequence
  • 18. Main subject 4.3 Strong attack form ‱ Constraints is a upper boundary of pixel value(Constant function). So this constraints is Linear. ‱ By that, we can calculate this as a convex form Objective function: min(| 𝐮 𝑚∗𝑛− 𝑆 𝑚∗𝑛 |2 ) Constraints: ||𝑇 𝑚â€Č∗𝑛â€Č - đ· 𝑚â€Č∗𝑛â€Č||∞ ≀ 𝜀 ∗ đŒđ‘ đ‘šđ‘Žđ‘„ WLOG
  • 19. Main subject 4.4 Strong attack form algorithm analysis ‱ Decomposition into sub matrix problem.
  • 20. Main subject 4.5 Cloud inference attack(black box) ‱ We have to know the exact size of cloud DL model input size. ‱ inferring model image serach space is 𝑂 𝑁4 = (𝑃𝑎𝑘𝑐𝑎𝑔𝑒 ∗ 𝑆𝑐𝑎𝑙𝑖𝑛𝑔 𝑚𝑒𝑡ℎ𝑜𝑑 ∗ ℎ𝑒𝑖𝑔ℎ𝑡 ∗ đ‘€đ‘–đ‘‘đ‘Ąâ„Ž)  setting range[201,300] in H, W  Infer different class by k times at the same time (k=4)
  • 21. Main subject 5.1 Result ‱ Attack target: Azure, Baidu, Aliyun, Tencent ‱ Testing Dataset: 935 (Crafted)  Class except Sheep or sheep-like animal  Set as 800*600 image  𝜀 = 0.01  Target = Sheep ‱ Baidu , Aliyun ,Tencent got 100% success ratio where as Azuzre is more complex ‱ CDF(cumulative distribution function) shows that Tag and description is successfully attacked by this algorithm.
  • 23. Main subject 5.2 Possible attack scenario ‱ Data poisoning on database. ‱ Detection evasion and Cloaking on CNN based deep learning models. ‱ Fraud by Leveraging Inconsistencies between Displays. (ex mobile)
  • 24. Main subject 5.3 Detection of attack ‱ Color-histogram-based Detection ‱ Color-scattering-based Detection
  • 25. Conclusion 6. Pros ‱ This attack is model-free attack. It means that we can use this attack in any situation (not only limited in Deep learning) ‱ This attack is more light-weight than adversarial attack by deep learning. ‱ Attack success ratio & confidence is high. 6. Cons ‱ If the model do not use the resize method(such as yolo based object detection). It cannot be successful. ‱ Only can be applied on smaller attack image ‱ The perturbations are easily recognizable by human. The key of this kind of attack is should be out of human-eye. You can easily recognize that this image is somewhat wrong.

Notas do Editor

  1. So image scaling is basically a interpolation between the adjacent pixel matrix. Gaussian process 도 있지만 we will skip that.
  2. So what is sampling? We know sampling in statistical way. It is almost same semantic meaning in Signal processing area. We cannot know continuous values so we split the each time line (called sampling rate) and represent the signal amplitude(진폭) Let’s think
  3. If we are digging this part too far, we will be buried at mathematical equations so let me just brifly go over this. If we decompose the signal into really small time, we can see this kind of sin graph. But if our sampling rate
  4. So what is sampling? We know sampling in statistical way. It is almost same semantic meaning in Signal processing area. We cannot know continuous values so we split the each time line (called sampling rate) and represent the signal amplitude(진폭)
  5. So what is sampling? We know sampling in statistical way. It is almost same semantic meaning in Signal processing area. We cannot know continuous values so we split the each time line (called sampling rate) and represent the signal amplitude(진폭)