Perceptual quality-preserving black-box attack against deep learning image classifiers

被引:20
作者
Gragnaniello, Diego [1 ]
Marra, Francesco [1 ]
Verdoliva, Luisa [2 ]
Poggi, Giovanni [1 ]
机构
[1] Univ Federico II Naples, Dept Elect Engn & Informat Technol, Via Claudio 21, I-80125 Naples, Italy
[2] Univ Federico II Naples, Dept Ind Engn, Via Claudio 21, I-80125 Naples, Italy
关键词
Image classification; Face recognition; Adversarial attacks; Black-box;
D O I
10.1016/j.patrec.2021.03.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep neural networks provide unprecedented performance in all image classification problems, including biometric recognition systems, key elements in all smart city environments. Recent studies, however, have shown their vulnerability to adversarial attacks, spawning intense research in this field. To improve system security, new countermeasures and stronger attacks are proposed by the day. On the attacker's side, there is growing interest for the realistic black-box scenario, in which the user has no access to the network parameters. The problem is to design efficient attacks which mislead the neural network without compromising image quality. In this work, we propose to perform the black-box attack along a high-saliency and low-distortion path, so as to improve both attack efficiency and image perceptual quality. Experiments on real-world systems prove the effectiveness of the proposed approach both on benchmark tasks and actual biometric applications. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:142 / 149
页数:8
相关论文
共 27 条
[1]  
[Anonymous], P IEEE C COMP VIS PA
[2]   Exact global histogram specification optimized for structural similarity [J].
Avanaki, Alireza Nasiri .
OPTICAL REVIEW, 2009, 16 (06) :613-621
[3]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[4]  
Chau D., 2018, P ACM SIGKDD INT C K
[5]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[6]  
Cisse M., 2017, arXiv preprint arXiv:1 707.05373, P1
[7]  
Duan Y., 2019, ARXIV PREPRINT ARXIV
[8]  
Goodfellow I., 2016, TRANSFERABILITY MACH
[9]  
Goodfellow I. J., 2014, 3 INT C LEARNING REP
[10]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778