Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm

被引:0
|
作者
Liu, Xinhao [1 ]
Yang, Hao [1 ]
Yan, Qiao [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
来源
PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024 | 2024年
基金
中国国家自然科学基金;
关键词
deep learning; adversarial examples; CAPTCHA; differential evolution algorithm; ROBUSTNESS; EXAMPLES;
D O I
10.1109/CSCWD61410.2024.10580331
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Audio adversarial CAPTCHAs are commonly used on various websites and applications to distinguish human users from automated programs. However, recent advances in deep learning have given rise to several audio recognition methods that pose a challenge to the security of audio CAPTCHAs. In this paper, we propose DE ES, a novel approach based on the differential evolution algorithm, for generating audio adversarial CAPTCHAs. Our method utilizes a momentum probability update technique to add random noise to the examples and combines differential evolution with gradient estimation to enhance the success rate of attacks. We evaluate the similarity between the adversarial examples and the original examples using audio data visualization techniques. Moreover, we apply our method to generate adversarial CAPTCHAs for two usage scenarios of audio CAPTCHAs: input-based and selection-based, respectively, to demonstrate the feasibility of the proposed algorithm. Our experimental results demonstrate that DE ES outperforms other heuristic-based generation methods in terms of the success rate of generating audio adversarial examples, while maintaining a lower average editing distance. Thus, our method provides an effective solution for generating robust audio adversarial CAPTCHAs that can, to a certain extent, withstand the attacks of deep learning models, thereby improving the security of voice-based authentication systems.
引用
收藏
页码:1509 / 1514
页数:6
相关论文
共 50 条
  • [31] TAGA: A Transfer-based Black-box Adversarial Attack with Genetic Algorithms
    Huang, Liang-Jung
    Yu, Tian-Li
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22), 2022, : 712 - 720
  • [32] An Adversarial Network-based Multi-model Black-box Attack
    Lin, Bin
    Chen, Jixin
    Zhang, Zhihong
    Lai, Yanlin
    Wu, Xinlong
    Tian, Lulu
    Cheng, Wangchi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (02) : 641 - 649
  • [33] POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm
    Chen, Jinyin
    Su, Mengmeng
    Shen, Shijing
    Xiong, Hui
    Zheng, Haibin
    COMPUTERS & SECURITY, 2019, 85 : 89 - 106
  • [34] Black-box adversarial transferability: An empirical study in cybersecurity perspective
    Roshan, Khushnaseeb
    Zafar, Aasim
    COMPUTERS & SECURITY, 2024, 141
  • [35] HYBRID ADVERSARIAL SAMPLE CRAFTING FOR BLACK-BOX EVASION ATTACK
    Zheng, Juan
    He, Zhimin
    Lin, Zhe
    2017 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2017, : 236 - 242
  • [36] Evolutionary Multilabel Adversarial Examples: An Effective Black-Box Attack
    Kong L.
    Luo W.
    Zhang H.
    Liu Y.
    Shi Y.
    IEEE Transactions on Artificial Intelligence, 2023, 4 (03): : 562 - 572
  • [37] Black-box Adversarial Attack on License Plate Recognition System
    Chen J.-Y.
    Shen S.-J.
    Su M.-M.
    Zheng H.-B.
    Xiong H.
    Zidonghua Xuebao/Acta Automatica Sinica, 2021, 47 (01): : 121 - 135
  • [38] ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples
    Liu, Guanxiong
    Khalil, Issa
    Khreishah, Abdallah
    Algosaibi, Abdulelah
    Aldalbahi, Adel
    Alnaeem, Mohammed
    Alhumam, Abdulaziz
    Anan, Muhammad
    IEEE ACCESS, 2020, 8 : 197086 - 197096
  • [39] Sensitive region-aware black-box adversarial attacks
    Lin, Chenhao
    Han, Sicong
    Zhu, Jiongli
    Li, Qian
    Shen, Chao
    Zhang, Youwei
    Guan, Xiaohong
    INFORMATION SCIENCES, 2023, 637
  • [40] A New Black Box Attack Generating Adversarial Examples Based on Reinforcement Learning
    Xiao, Wenli
    Jiang, Hao
    Xia, Song
    2020 INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE (ICTC), 2020, : 141 - 146