DOME-T: Adversarial Computer Vision Attack on Deep Learning Models Based on Tchebichef Image Moments

被引:2
作者
Maliamanis, T. [1 ]
Papakostas, G. A. [1 ]
机构
[1] Int Hellen Univ, Dept Comp Sci, HUman MAchines INteract Lab HUMAIN Lab, Agios Loukas 65404, Kavala, Greece
来源
THIRTEENTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2020) | 2021年 / 11605卷
关键词
Adversarial computer vision attack; adversarial examples; discrete orthogonal image moments; Tchebichef moments; image moments reconstruction; deep learning;
D O I
10.1117/12.2587268
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a novel black box adversarial computer vision attack is proposed. The introduced attack is based on removing from images some components described by their Tchebichef discrete orthogonal moments, rather than to perturb them. The contribution of this work is focused on the addition of one more clue, supporting the critical hypothesis that computer vision systems fail because they support their decisions not only in robust features but also in others non-robust ones. In this, context non-robust image features described in terms of Tchebichef moments are excluded from the original images and the approximated reconstructed versions of them are used as adversarial examples in order to attack some popular deep learning models. The experiments justify the effectiveness of the proposed adversarial attack in terms of imperceptibility and recognition error rate of the deep learning classifiers. It is worth noting that the top-1 accuracy of the attacked models was degraded by a factor between 9.48%-70.89% for adversarial images of 65dB to 57dB PSNR values. The corresponding degradation of the top-5 models' accuracy was between 6.9% and 55.14% for the same quality images. Moreover, the proposed attack seems to have more strength than the Fast Gradient Sign Method (FGSM) attacking method traditionally applying in most cases. These results reveal that the proposed attack is able to exploit the vulnerability of the deep learning models' towards degrading their generalization abilities.
引用
收藏
页数:8
相关论文
共 24 条
[1]  
Agarwal P., 2018, INT J CURRENT ENG TE, V8, P104
[2]   The security of machine learning [J].
Barreno, Marco ;
Nelson, Blaine ;
Joseph, Anthony D. ;
Tygar, J. D. .
MACHINE LEARNING, 2010, 81 (02) :121-148
[3]  
Butte S, 2018, IEEE MIRCOELECT ELEC, P1
[4]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[5]  
Garcia-Rodriguez Jose., 2013, Robotic Vision: Technologies for Machine Learning and Vision Applications
[6]  
Goodfellow I.J., 2015, ARXIV14126572V3 STAT
[7]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[8]  
Hu J, 2018, PROC CVPR IEEE, P7132, DOI [10.1109/CVPR.2018.00745, 10.1109/TPAMI.2019.2913372]
[9]   VISUAL-PATTERN RECOGNITION BY MOMENT INVARIANTS [J].
HU, M .
IRE TRANSACTIONS ON INFORMATION THEORY, 1962, 8 (02) :179-&
[10]  
Iandola F. N., 2016, ARXIV160207360V4 CS