When Deep Fool Meets Deep Prior: Adversarial Attack on Super-Resolution Network

被引:21
作者
Yin, Minghao [1 ]
Zhang, Yongbing [1 ]
Li, Xiu [1 ]
Wang, Shiqi [2 ]
机构
[1] Tsinghua Univ, Beijing, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Peoples R China
来源
PROCEEDINGS OF THE 2018 ACM MULTIMEDIA CONFERENCE (MM'18) | 2018年
关键词
Deep prior; super-resolution; adversarial attack; style transfer; image classification; caption;
D O I
10.1145/3240508.3240603
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the vulnerability of the deep prior used in deep learning based image restoration. In particular, the image super-resolution, which relies on the strong prior information to regularize the solution space and plays important roles in the image pre-processing for future viewing and analysis, is shown to be vulnerable to the well-designed adversarial examples. We formulate the adversarial example generation process as an optimization problem, and given super-resolution model three different types of attack are designed based on the subsequent tasks: (i) style transfer attack; (ii) classification attack; (iii) caption attack. Another interesting property of our design is that the attack is hidden behind the super-resolution process, such that the utilization of low resolution images is not significantly influenced. We show that the vulnerability to adversarial examples could bring risks to the pre-processing modules such as super-resolution deep neural network, which is also of paramount significance for the security of the whole system. Our results also shed light on the potential security issues of the pre-processing modules, and raise concerns regarding the corresponding countermeasures for adversarial examples.
引用
收藏
页码:1930 / 1938
页数:9
相关论文
共 32 条
[1]  
[Anonymous], P IEEE C COMP VIS PA
[2]  
[Anonymous], 2014, Advances in neural information processing systems
[3]  
[Anonymous], PROC CVPR IEEE
[4]  
[Anonymous], 2015, arXiv
[5]  
[Anonymous], ADV NEURAL INF PROCE
[6]  
[Anonymous], 2017, P IEEE C COMP VIS PA
[7]  
[Anonymous], P IEEE S SECUR PRIV
[8]  
[Anonymous], 2004, P ANN M ASS COMP LIN
[9]  
Chen H., 2017, ARXIV171202051
[10]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848