跳到主要导航 跳到搜索 跳到主要内容

Seeing is not believing: Camouflage attacks on image scaling algorithms

  • Qixue Xiao
  • , Yufei Chen
  • , Chao Shen
  • , Yu Chen
  • , Kang Li

科研成果: 书/报告/会议事项章节会议稿件同行评审

102 引用 (Scopus)

摘要

Image scaling algorithms are intended to preserve the visual features before and after scaling, which is commonly used in numerous visual and image processing applications. In this paper, we demonstrate an automated attack against common scaling algorithms, i.e. to automatically generate camouflage images whose visual semantics change dramatically after scaling. To illustrate the threats from such camouflage attacks, we choose several computer vision applications as targeted victims, including multiple image classification applications based on popular deep learning frameworks, as well as mainstream web browsers. Our experimental results show that such attacks can cause different visual results after scaling and thus create evasion or data poisoning effect to these victim applications. We also present an algorithm that can successfully enable attacks against famous cloud-based image services (such as those from Microsoft Azure, Aliyun, Baidu, and Tencent) and cause obvious misclassification effects, even when the details of image processing (such as the exact scaling algorithm and scale dimension parameters) are hidden in the cloud. To defend against such attacks, this paper suggests a few potential countermeasures from attack prevention to detection.

源语言英语
主期刊名Proceedings of the 28th USENIX Security Symposium
出版商USENIX Association
443-460
页数18
ISBN(电子版)9781939133069
出版状态已出版 - 2019
活动28th USENIX Security Symposium, USENIX Security 2019 - Santa Clara, 美国
期限: 14 8月 201916 8月 2019

出版系列

姓名Proceedings of the 28th USENIX Security Symposium

会议

会议28th USENIX Security Symposium, USENIX Security 2019
国家/地区美国
Santa Clara
时期14/08/1916/08/19

学术指纹

探究 'Seeing is not believing: Camouflage attacks on image scaling algorithms' 的科研主题。它们共同构成独一无二的指纹。

引用此