Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm

被引:0
|
作者
Liu, Xinhao [1 ]
Yang, Hao [1 ]
Yan, Qiao [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
来源
PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024 | 2024年
基金
中国国家自然科学基金;
关键词
deep learning; adversarial examples; CAPTCHA; differential evolution algorithm; ROBUSTNESS; EXAMPLES;
D O I
10.1109/CSCWD61410.2024.10580331
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Audio adversarial CAPTCHAs are commonly used on various websites and applications to distinguish human users from automated programs. However, recent advances in deep learning have given rise to several audio recognition methods that pose a challenge to the security of audio CAPTCHAs. In this paper, we propose DE ES, a novel approach based on the differential evolution algorithm, for generating audio adversarial CAPTCHAs. Our method utilizes a momentum probability update technique to add random noise to the examples and combines differential evolution with gradient estimation to enhance the success rate of attacks. We evaluate the similarity between the adversarial examples and the original examples using audio data visualization techniques. Moreover, we apply our method to generate adversarial CAPTCHAs for two usage scenarios of audio CAPTCHAs: input-based and selection-based, respectively, to demonstrate the feasibility of the proposed algorithm. Our experimental results demonstrate that DE ES outperforms other heuristic-based generation methods in terms of the success rate of generating audio adversarial examples, while maintaining a lower average editing distance. Thus, our method provides an effective solution for generating robust audio adversarial CAPTCHAs that can, to a certain extent, withstand the attacks of deep learning models, thereby improving the security of voice-based authentication systems.
引用
收藏
页码:1509 / 1514
页数:6
相关论文
共 50 条
  • [41] Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition
    Chen, Jiefu
    Chen, Tong
    Xu, Xing
    Zhang, Jingran
    Yang, Yang
    Shen, Heng Tao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1547 - 1560
  • [42] PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
    Guo, Hanqing
    Wang, Guangjing
    Wang, Yuanda
    Chen, Bocheng
    Yan, Qiben
    Xiao, Li
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 366 - 380
  • [43] Black-box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples
    Zhang, Yuekai
    Jiang, Ziyan
    Villalba, Jesus
    Dehak, Najim
    INTERSPEECH 2020, 2020, : 4238 - 4242
  • [44] Black-box attacks against log anomaly detection with adversarial examples
    Lu, Siyang
    Wang, Mingquan
    Wang, Dongdong
    Wei, Xiang
    Xiao, Sizhe
    Wang, Zhiwei
    Han, Ningning
    Wang, Liqiang
    INFORMATION SCIENCES, 2023, 619 : 249 - 262
  • [45] Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
    Aithal, Manjushree B.
    Li, Xiaohua
    IEEE ACCESS, 2022, 10 : 12395 - 12411
  • [46] Simultaneously Optimizing Perturbations and Positions for Black-Box Adversarial Patch Attacks
    Wei, Xingxing
    Guo, Ying
    Yu, Jie
    Zhang, Bo
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (07) : 9041 - 9054
  • [47] Targeted Black-Box Adversarial Attack Method for Image Classification Models
    Zheng, Su
    Chen, Jialin
    Wang, Lingli
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [48] AKD: Using Adversarial Knowledge Distillation to Achieve Black-box Attacks
    Lian, Xin
    Huang, Zhiqiu
    Wang, Chao
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [49] Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware
    Demetrio, Luca
    Biggio, Battista
    Lagorio, Giovanni
    Roli, Fabio
    Armando, Alessandro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3469 - 3478
  • [50] A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization
    Suryanto, Naufal
    Kang, Hyoeun
    Kim, Yongsu
    Yun, Youngyeo
    Larasati, Harashta Tatimma
    Kim, Howon
    SENSORS, 2020, 20 (24) : 1 - 20