Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm

被引:0
|
作者
Liu, Xinhao [1 ]
Yang, Hao [1 ]
Yan, Qiao [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
来源
PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024 | 2024年
基金
中国国家自然科学基金;
关键词
deep learning; adversarial examples; CAPTCHA; differential evolution algorithm; ROBUSTNESS; EXAMPLES;
D O I
10.1109/CSCWD61410.2024.10580331
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Audio adversarial CAPTCHAs are commonly used on various websites and applications to distinguish human users from automated programs. However, recent advances in deep learning have given rise to several audio recognition methods that pose a challenge to the security of audio CAPTCHAs. In this paper, we propose DE ES, a novel approach based on the differential evolution algorithm, for generating audio adversarial CAPTCHAs. Our method utilizes a momentum probability update technique to add random noise to the examples and combines differential evolution with gradient estimation to enhance the success rate of attacks. We evaluate the similarity between the adversarial examples and the original examples using audio data visualization techniques. Moreover, we apply our method to generate adversarial CAPTCHAs for two usage scenarios of audio CAPTCHAs: input-based and selection-based, respectively, to demonstrate the feasibility of the proposed algorithm. Our experimental results demonstrate that DE ES outperforms other heuristic-based generation methods in terms of the success rate of generating audio adversarial examples, while maintaining a lower average editing distance. Thus, our method provides an effective solution for generating robust audio adversarial CAPTCHAs that can, to a certain extent, withstand the attacks of deep learning models, thereby improving the security of voice-based authentication systems.
引用
收藏
页码:1509 / 1514
页数:6
相关论文
共 50 条
  • [1] Generating Black-Box Adversarial Examples in Sparse Domain
    Zanddizari, Hadi
    Zeinali, Behnam
    Chang, J. Morris
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (04): : 795 - 804
  • [2] Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders
    Po-Hao Huang
    Yu, Honggang
    Panoff, Max
    Wang, Ting-Chi
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (03)
  • [3] GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
    Fan, Xinxin
    Li, Mengfan
    Zhou, Jia
    Jing, Quanliang
    Lin, Chi
    Lu, Yunfeng
    Bi, Jingping
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2038 - 2048
  • [4] Black-Box Audio Adversarial Example Generation Using Variational Autoencoder
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 142 - 160
  • [5] Black-box transferable adversarial attacks based on ensemble advGAN
    Huang S.-N.
    Li Y.-X.
    Mao Y.-H.
    Ban A.-Y.
    Zhang Z.-Y.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (10): : 2391 - 2398
  • [6] Physical Black-Box Adversarial Attacks Through Transformations
    Jiang, Wenbo
    Li, Hongwei
    Xu, Guowen
    Zhang, Tianwei
    Lu, Rongxing
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 964 - 974
  • [7] Black-Box Adversarial Attack via Overlapped Shapes
    Williams, Phoenix
    Li, Ke
    Min, Geyong
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2022, 2022, : 467 - 468
  • [8] Generating Black-Box Adversarial Examples for Text Classifiers Using a Deep Reinforced Model
    Vijayaraghavan, Prashanth
    Roy, Deb
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2019, PT II, 2020, 11907 : 711 - 726
  • [9] Besting the Black-Box: Barrier Zones for Adversarial Example Defense
    Mahmood, Kaleel
    Phuong Ha Nguyen
    Nguyen, Lam M.
    Nguyen, Thanh
    Van Dijk, Marten
    IEEE ACCESS, 2022, 10 : 1451 - 1474
  • [10] Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings
    YU Tingyue
    WANG Shen
    ZHANG Chunrui
    WANG Zhenbang
    LI Yetian
    YU Xiangzhan
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (05) : 866 - 875